IA generativa en 2025: de la experimentación a la práctica real

IA generativa en 2025: de la experimentación a la práctica real

La encuesta de NTT se alinea con una nueva encuesta encargada por IBM, que concluyó que el 62% de las empresas planean aumentar sus presupuestos de IA en 2025. Aun así, a pesar del cansancio de los pilotos, más de una cuarta parte de los encuestados afirma que sus empresas planean lanzar más de 20 pilotos de IA en 2025. Aunque la experimentación continuará, es probable que muchas organizaciones se centren en proyectos que les…

Read More

Hackers Leak Rhode Island Citizens’ Data on Dark Web

Hackers Leak Rhode Island Citizens’ Data on Dark Web

Cybercriminals have begun publishing stolen personal data of Rhode Island citizens, the US state has confirmed. In an update on December 30, Rhode Island governor Dan McKee revealed the state had been informed by its vendor, Deloitte, that some files containing citizens’ data have been released on the dark web. McKee said the state had been prepared for this scenario since being informed that cybercriminals had likely obtained files with personally identifiable information (PII) from…

Read More

Dozens of Chrome Browser Extensions Hijacked by Data Thieves

Dozens of Chrome Browser Extensions Hijacked by Data Thieves

Security researchers have warned users of Google Chrome extensions to be on their guard after uncovering a major campaign focused on data theft. At least 36 compromised Chrome extensions have been detected to date, potentially exposing as many as 2.6 million end users, according to ExtensionTotal. The campaign first came to light in late December, when the extension for cybersecurity startup Cyberhaven was hijacked, putting at risk its 400,000 users. According to ExtensionTotal, a Cyberhaven…

Read More

Gen AI in 2025: Playtime is over, time to get practical

Gen AI in 2025: Playtime is over, time to get practical

Generative AI playtime may be over, as organizations cut down on experimentation and pivot toward achieving business value, with a focus on fewer, more targeted use cases. Nearly nine out of 10 senior decision-makers said they have gen AI pilot fatigue and are shifting their investments to projects that will improve business performance, according to a recent survey from NTT DATA. Organizations will still experiment with new gen AI pilots, but a more targeted approach…

Read More

Seis formas de fracasar en la gestión del cambio

Seis formas de fracasar en la gestión del cambio

Se pierde de vista el objetivo general y no se respetan las preocupaciones de los empleados En lugar de ver la gestión del cambio como un conjunto de procesos estáticos, hay que hacerlo como una capacidad dinámica que fomenta la agilidad y la resiliencia. “A medida que evolucionan las tecnologías de IA, las organizaciones pueden utilizar marcos para medir el ROI a corto plazo de las iniciativas de IA en función de los indicadores clave…

Read More

Advice for Exponential Organizations: Intersecting Agile and Incident

Advice for Exponential Organizations: Intersecting Agile and Incident

While Exponential Organizations (ExOs) are transforming industries beyond the tech space, that doesn’t mean that they are not susceptible to an increasing number of cyber threats. As ExOs harness innovative and cutting-edge technologies to drive transformative growth, the ability to respond effectively and proactively to cyber incidents becomes increasingly vital. Recent statistics from the 2024 IBM Cost of a Data Breach Report point to the global average cost being upwards of $4.88 million, with one in…

Read More

Tractor Supply’s Rob Mills on the CIO as chief growth officer

Tractor Supply’s Rob Mills on the CIO as chief growth officer

Rob Mills has been instrumental in driving Tractor Supply Co.’s rapid growth, profitability, and world-class customer experience. Mills joined Tractor Supply a decade ago as its CIO, and within four years, his role, influence, and impact had expanded significantly. Now, as executive vice president and chief technology, digital, and corporate strategy officer, Mills has cemented himself as a key business leader at the $14 billion rural lifestyle retailer, which has come a long way since its humble…

Read More

US Treasury Computers Accessed by China in Supply Chain Attack

US Treasury Computers Accessed by China in Supply Chain Attack

Chinese state-backed hackers have compromised US Treasury computers and accessed unclassified information, after targeting a third-party cybersecurity vendor, it has emerged. The Treasury confirmed the news in a letter to the Senate Committee on Banking, Housing and Urban Affairs, dated December 30 and shared widely on X (formerly Twitter). “On December 8, 2024, Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to a key used by…

Read More

Understanding AI in Network Security

Understanding AI in Network Security

Cyber threats are more sophisticated, pervasive, and frequent than ever before. As a result, traditional methods for network security are becoming obsolete. These solutions simply cannot handle the extraordinary scale and complexity of network traffic inherent in modern IT environments. AI-driven solutions, however, can. How to Use AI for Network Security Modern networks generate a massive amount of data. Login attempts, device connections, data transfers, application access logs, and other such events contribute to massively…

Read More

Ser CIO en 2025: estos serán los principales desafíos tecnológicos

Ser CIO en 2025: estos serán los principales desafíos tecnológicos

Anticipar cuáles serán las tendencias en tecnología para el próximo año tiene un poco de bola de cristal: su propio carácter disruptivo hace que en ocasiones entre en juego una herramienta que hasta entonces no había destacado. Cuando además se trata de adaptarlas a la propia empresa, el equilibrio es mayor: ¿está ya la tendencia lo suficientemente madura para incorporarla o realizar casos de uso? ¿Es preferible esperar a que se exploren en profundidad? Esto,…

Read More
1 26 27 28 29 30 3,538