China’s rare earth export controls threaten enterprise IT hardware supply chains

China’s rare earth export controls threaten enterprise IT hardware supply chains

“AI-first infrastructure rollouts — particularly those involving GPUs, edge accelerators, and high-efficiency cooling — are directly in the crosshairs,” Gogia noted. “So are quantum computing R&D efforts and high-reliability storage systems where thermal and magnetic materials matter.” China, responsible for 70% of global rare earth mining output and 87% of refined supply, poses a serious threat to enterprise IT hardware supply chains with these restrictions — especially for companies with AI-optimized server lines. AI chip…

Read More

Data's dark secret: Why poor quality cripples AI and growth

Data's dark secret: Why poor quality cripples AI and growth

Data is the foundation of innovation, agility and competitive advantage in today’s digital economy. As technology and business leaders, your strategic initiatives, from AI-powered decision-making to predictive insights and personalized experiences, are all fueled by data. Yet, despite growing investments in advanced analytics and AI, organizations continue to grapple with a persistent and often underestimated challenge: poor data quality. Your role in addressing this challenge is crucial to the success of your organization.   Fragmented systems,…

Read More

Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges

Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges

Critical digital transformation projects are being delayed and halted due to a perceived increase in the risk of state-sponsored cyber-attacks, according to Armis. The security vendor’s 2025 Armis Cyberwarfare Report is based on a study of over 1800 global IT decision-makers (ITDMs), including 501 from the UK, and proprietary data from Armis Labs. It found that 49% of responding UK organizations have experienced disruption to digital projects due to the threat of “cyber warfare” attacks….

Read More

From Firewalls to AI: The Evolution of Real-Time Cyber Defense

From Firewalls to AI: The Evolution of Real-Time Cyber Defense

The traditional Intrusion Detection Systems (IDS) have depended on rule-based or signature-based detection, which are challenged by evolving cyber threats. Through the introduction of Artificial Intelligence (AI), real-time intrusion detection has become more dynamic and efficient. Today we’re going to discuss the various AI algorithms that can be investigated to identify what works best when it comes to identifying anomalies and threats in firewall security. Exploring AI Algorithms for Intrusion Detection Random Forest (RF) is a machine learning algorithm that generates several decision trees and aggregates their predictions in order to classify network traffic as malicious or normal. RF is extremely popular in IDS due to its fast processing, interpretability, and ability…

Read More

How Cisco’s Focus On Talent Transformed My Tech Career

How Cisco’s Focus On Talent Transformed My Tech Career

This post was authored by Khushi Saxena, a technical consulting engineer intern on the Customer Experience Team. I never imagined that a global giant like Cisco would notice someone like me — yet here I am, living proof that skills matter more than background. Coming from an entirely non-technical background, my first year of college felt like stepping into a completely different world. While others seemed to have a head start, talking about data structures,…

Read More

CISA Warns of CrushFTP Vulnerability Exploitation in the Wild

CISA Warns of CrushFTP Vulnerability Exploitation in the Wild

The US top cybersecurity agency has confirmed that the critical vulnerability in file transfer solution provider CrushFTP’s product is being exploited in the wild. The authentication bypass vulnerability, CVE-2025-31161, was added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog on April 7. “These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,” said the security advisory. CISA strongly urged all…

Read More

7 risk management rules every CIO should follow

7 risk management rules every CIO should follow

“In fact, CIOs often confuse risk management with compliance or cybersecurity, yet risk is much broader,” she says, advising IT leaders designate an enterprise risk officer who can serve as the CIO’s best ally, helping to navigate risks, accelerate strategic initiatives, and provide guidance on where caution is needed versus where speed is possible. Risk management is among the most misunderstood yet valuable aspects of leadership, Saibene observes. When CIOs embrace risk frameworks, they can…

Read More

Decision-making 101: How to get consensus right

Decision-making 101: How to get consensus right

Next up: Figure out which alternatives are both best and most likely to be accepted by most of the group. Schedule a second round of one-on-one conversations, whose purpose is to nudge everyone toward the most likely alternative — the one most likely to be sufficiently agreeable to everyone involved. Yes, this is a lot of work. Consensus decision-making is, as noted, expensive and time-consuming, which is one reason it should be saved for when…

Read More

Boards Urged to Follow New Cyber Code of Practice

Boards Urged to Follow New Cyber Code of Practice

A new government initiative launched today aims to improve cyber-resilience across UK organizations by providing new guidance for boards. The Cyber Governance Code of Practice describes the actions company directors and board members need to take to ensure cyber-risk is managed effectively. The government argued that improving oversight at this level is vital to growing the economy, given that 74% of large and 70% of medium-sized firms experienced attacks and breaches in the past year….

Read More

IT job postings lowest in over a decade

IT job postings lowest in over a decade

Postings for IT jobs are on the wane, having dropped considerably from pandemic peaks. Perhaps more concerning for IT pros is the sense that demand for their services may be at a 10-year low. A recent study from Dice found that 2024 saw 2.24 million IT positions posted, a sharp drop from the 4.08 million IT roles that were posted in 2022, and lower than any previous year going back to 2014 when 2.20 million…

Read More
1 46 47 48 49 50 3,971