IDC launches TechMatch to help businesses select software vendors

IDC launches TechMatch to help businesses select software vendors

However, Carter noted, “the way that IDC frames the world is often not how our buyers categorize things. And so we’re learning that we need to maybe have more knowledge — what we call a knowledge graph orientation — towards this, where they can pick and choose different options, and they define their requirements a bit more dynamically, as opposed to falling into our traditional categories as we’ve done as a research house over the…

Read More

Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems

Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems

Companies are being warned that malicious hackers are using a novel technique to break into businesses – by pretending to offer audits of the company’s cybersecurity. With ransomware and other cybersecurity threats high in the mind of many business owners, it is all too easy to imagine how many companies might react positively to an invitation to have the security of their networks tested. But computer crime fighters in Belgium and Ukraine have warned that…

Read More

Software Vulnerabilities Take Almost Nine Months to Patch

Software Vulnerabilities Take Almost Nine Months to Patch

The average fix time for software security vulnerabilities has risen to eight and a half months, a 47% increase over the past five years, according to Veracode’s latest State of Software Security (SoSS) report. The average fix time is also 327% higher compared to 15 years ago, largely as a result of increased reliance on third-party code and use of AI generated code. Half (50%) of all organizations have critical security debt – defined as…

Read More

TI basada en productos: seis pasos clave para ejecutar el cambio

TI basada en productos: seis pasos clave para ejecutar el cambio

5. Transformar la TI en KPI digitales El número de métricas vinculadas a Agile, DevOps, ITSM, proyectos y productos es abrumador. La transformación digital de las organizaciones de TI y la adopción de disciplinas de gestión de productos deben basarse en datos. Sin embargo, los CIO que dirigen organizaciones que se centran excesivamente en los plazos, la productividad y otras métricas operativas deberían considerar una revisión holística de los indicadores de rendimiento del departamento al…

Read More

Can AI live up to its promise?

Can AI live up to its promise?

This is one of the questions that has been on our minds for some time now every time we read about the latest advances and promises of artificial intelligence (AI). The bombardment of information about the progress of AI is continuous and comes from many fronts with different objectives; either conveying excessive optimism (e.g. superintelligent, conscious AI, etc.) or, on the contrary, drawing dystopian scenarios (e.g. AI that will exterminate humanity). In either case, often…

Read More

Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

High-profile campaigns like Volt Typhoon and Salt Typhoon made headlines in the past year, but they likely represent only a fraction of the extensive Chinese cyber espionage activity that has been unfolding in the shadows. According to CrowdStrike’s 2025 Global Threat Report, released on February 27, 2025, a staggering 150% surge in Chinese-backed cyber espionage operations across the world was observed in 2024. Critical industries saw up to a 300% spike in targeted attacks. The…

Read More

Sierra Nevada se digitaliza en plena temporada de esquí

Sierra Nevada se digitaliza en plena temporada de esquí

En plena temporada alta de esquí, Sierra Nevada apuesta por la digitalización con el fin de brindar la mejor experiencia a los usuarios. La estación de esquí ubicada en Granada ha desplegado una ambiciosa iniciativa de la mano de Servinform; en el marco de la misma, Sierra Nevada contará con un sistema integral que combina la experiencia de un equipo humano altamente capacitado con el potencial de la inteligencia artificial (IA). Tal y como se…

Read More

OpenSSF Publishes Security Framework for Open Source Software

OpenSSF Publishes Security Framework for Open Source Software

The Open Source Security Foundation (OpenSSF) has claimed a “significant milestone” after releasing a new set of best practices designed to improve the security posture of open source projects. The Open Source Project Security (OSPS) Baseline outlines the various tasks, processes, artifacts and configurations that developers need to put in place to mitigate risk, enhance trust and improve compliance with global regulations like the EU’s Cyber Resilience Act (CRA). It is also aligned with other…

Read More

Grupo Volkswagen apuesta por una unidad de desarrollo para proyectos de digitalización

Grupo Volkswagen apuesta por una unidad de desarrollo para proyectos de digitalización

Grupo Volkswagen y la firma de consultoría CGI amplían su acuerdo de colaboración global. Una alianza con la que aspiran a reforzar las capacidades a largo plazo del fabricante de automóviles en materia de infraestructura TI con el fin de adaptarse a futuros requisitos. Como parte de sus esfuerzos conjuntos, ambas partes han lanzado la nueva entidad, MARV1N, que actuará como una unidad de desarrollo internacional para proyectos de digitalización de todo el Grupo y…

Read More

FBI Confirms North Korea’s Lazarus Group as Bybyit Hackers

FBI Confirms North Korea’s Lazarus Group as Bybyit Hackers

A notorious state-sponsored North Korean APT group was behind the world’s largest cryptocurrency heist late last week, the FBI has confirmed. A brief Public Service Announcement (PSA) issued by the law enforcement agency on Febrary 26 attributed the attack on cryptocurrency exchange Bybit to the “TraderTraitor” group (aka Lazarus, APT38, BlueNoroff, and Stardust Chollima). “TraderTraitor actors are proceeding rapidly and have converted some of the stolen assets to Bitcoin and other virtual assets dispersed across…

Read More
1 13 14 15 16 17 2,643