IBM delivers agentic AI orchestration to drive a productivity edge

IBM delivers agentic AI orchestration to drive a productivity edge

As the initial frenzy around Generative AI shifts to new agentic and automation use cases, enterprises must embrace a holistic and orchestrated approach to achieve meaningful productivity gains.  Enterprises are adapting and deploying GenAI and AI agents across the enterprise. Gartner estimates that by 2028, 33% of enterprise software will include agentic AI, up from less than 1% in 2024. This means 15% of day-to-day work decisions could be made autonomously, according to the research.  …

Read More

How to scale AI agents for business

How to scale AI agents for business

When meeting with business leaders, there is excitement around the potential of what agentic AI can do for an organization. There is also a clear need to answer the question of how business leaders can effectively and efficiently deploy agentic AI. New research from the IBM Institute for Business Value shows the buy-in and excitement from business leaders: 86% of those surveyed expect process automation and workflow reinvention to be more effective with AI agents…

Read More

Implementing Effective AI Guardrails: A Cybersecurity Framework

Implementing Effective AI Guardrails: A Cybersecurity Framework

As organizations race to implement AI solutions, security leaders face the challenge of enabling progress while protecting sensitive data. Grand Canyon Education (GCE), which serves 22 university partners, recently confronted this exact dilemma when deploying an AI chatbot platform for thousands of students and staff. We spoke with Sourabh Satish, a cybersecurity veteran with over 25 years of experience and more than 260 issued patents, about the lessons learned from this implementation and how similar approaches…

Read More

New Wiper Malware Targets Ukrainian Infrastructure

New Wiper Malware Targets Ukrainian Infrastructure

A new wiper malware known as PathWiper has been used in a destructive cyber-attack against a Ukrainian critical infrastructure organization. The attack was executed using a legitimate endpoint management tool, suggesting the attackers had access to the administrative console, which they used to push malicious commands to connected systems. PathWiper represents an evolution in destructive malware, with capabilities that enable it to erase critical system data across multiple storage volumes. Cisco Talos, which uncovered and…

Read More

How to Use Risk Management to Strengthen Business Cybersecurity

How to Use Risk Management to Strengthen Business Cybersecurity

Cybersecurity is a massive point of emphasis for most businesses in the modern age. You must work diligently to protect your company from hackers, scams, phishing emails, and data loss. However, it can be difficult to know where to start, what to do, and how to help your team stay abreast of the current landscape. Using these pointers, you can create a risk management plan that focuses entirely on cybersecurity. While you may not know the outcome,…

Read More

Hong Kong’s massive pension project grapples with technical glitches

Hong Kong’s massive pension project grapples with technical glitches

To address these issues before larger trustee migrations, MPFA said it launched a comprehensive improvement program, which included simplified biometric registration, doubling the number of support personnel, a redesigned user interface, localized employer assistance teams, and expanding physical service access points across Hong Kong’s districts. These measures, shaped by early user feedback, aim to ensure stability as the platform targets full implementation by the end of 2025. Contractors address ongoing issues While authorities focus on…

Read More

Trump Administration Revises Cybersecurity Rules, Replaces Biden Order

Trump Administration Revises Cybersecurity Rules, Replaces Biden Order

US President Donald Trump has issued a new cybersecurity-related Executive Order that supersedes or revises previous orders issued by Barack Obama in April 2015 (EO 13694) and Joe Biden in January 2021 (EO 14144). Notably, the new order limits the application of cyber sanctions only to foreign malicious actors, reversing broader authorities under the previous Biden and Obama policies. This decision was made in a move to “prevent misuse against domestic political opponents and clarify…

Read More

Asisa se apoya en la transformación digital para prestar un mejor servicio a los pacientes

Asisa se apoya en la transformación digital para prestar un mejor servicio a los pacientes

Dicho esto, continúa el máximo responsable de tecnología de la aseguradora, “somos conscientes de que trabajamos con datos que son sensibles y que requieren una protección extrema. Para ello, utilizamos tecnologías avanzadas (data lake, cloud, IA, etc.) con herramientas punteras en el mercado y con el soporte de proveedores con alta cualificación y experiencia. Para nosotros, la protección de los datos es una cuestión crítica a la que dedicamos tiempo y recursos”.  En los últimos…

Read More

IT leaders’ top 5 barriers to AI success

IT leaders’ top 5 barriers to AI success

Artificial intelligence — and generative AI in particular — is fast proving to be a useful solution for increasing productivity across the enterprise but several common barriers to success remain. The sooner IT leaders can identify and overcome these issues, the faster they will enable their organizations to get more value from AI-based systems. Here are some of the more challenging barriers that enterprises need to knock down and how IT leaders can go about…

Read More

US Tries to Claw Back $7m Taken by North Korean IT Workers

US Tries to Claw Back m Taken by North Korean IT Workers

The Department of Justice (DoJ) has filed a civil forfeiture complaint alleging that North Korean IT workers illegally gained employment with US companies, amassing millions for their government in violation of sanctions. The $7.7m in funds were originally seized by the government in 2023 in a case involving Sim Hyon Sop – a staffer at the North Korean Foreign Trade Bank (FTB) who allegedly conspired with the IT workers in a bid to launder the money…

Read More
1 8 9 10 11 12 2,808