<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description></description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Mon, 16 Mar 2026 16:52:02 GMT</lastBuildDate>
        <link>https://www.techtarget.com/iotagenda</link>
        <managingEditor>editor@techtarget.com</managingEditor>
        <item>
            <body>&lt;p&gt;DevOps shapes the way engineers build and deploy software. But it's not an engineering role in and of itself. It's an operating model that is powered by a variety of distinct roles.&lt;/p&gt; 
&lt;p&gt;This is why simply creating positions with titles such as &lt;a href="https://www.techtarget.com/searchitoperations/definition/DevOps-engineer"&gt;&lt;i&gt;DevOps engineer&lt;/i&gt;&lt;/a&gt; is often not enough on its own to implement an effective DevOps strategy. Instead, businesses seeking to launch and scale DevOps initiatives must invest in a variety of roles to address the skills required to sustain DevOps.&lt;/p&gt; 
&lt;p&gt;Indeed, without clearly defined DevOps job roles and responsibilities, organizations risk falling into the trap of saying they "do DevOps" without actually implementing DevOps effectively. The result is that the business misses out on the important benefits that effective DevOps offers, such as faster time to market, more efficient software development processes, better ROI from software and higher-quality software releases.&lt;/p&gt; 
&lt;p&gt;Read on for details as we unpack the key DevOps roles that a typical organization should target, along with descriptions of the responsibilities and &lt;a href="https://www.techtarget.com/searchitoperations/tip/DevOps-engineer-skills-needed-for-continuous-deployment"&gt;skills associated with each&lt;/a&gt;. This article also explains how to structure DevOps roles so that team members with diverse areas of expertise can work together effectively toward the shared goal of faster, more efficient software releases.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="12 core DevOps roles and responsibilities"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;12 core DevOps roles and responsibilities&lt;/h2&gt;
 &lt;p&gt;DevOps roles can vary somewhat from one organization to another.&lt;/p&gt;
 &lt;p&gt;For example, for a business that relies heavily on cloud-based software release pipelines, cloud architects are an important component of effective DevOps. This wouldn't be the case for an organization that builds and deploys software on-premises.&lt;/p&gt;
 &lt;p&gt;That said, the following 12 key roles and their associated responsibilities are foundational to most DevOps strategies.&lt;/p&gt;
 &lt;h3&gt;1. Software developers&lt;/h3&gt;
 &lt;p&gt;Code is at the core of &lt;a href="https://www.techtarget.com/searchitoperations/tip/Demystify-the-DevOps-process-step-by-step"&gt;DevOps processes&lt;/a&gt;, and the people who write code are at the core of a DevOps organization. Hence, software developers play a key role in DevOps.&lt;/p&gt;
 &lt;p&gt;Developers' key responsibilities within DevOps include these tasks:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Helping to formulate high-level plans for application architecture and features.&lt;/li&gt; 
  &lt;li&gt;Implementing and updating applications by writing code.&lt;/li&gt; 
  &lt;li&gt;Fixing code to address problems detected by IT, QA or security engineers -- such as performance bugs or security vulnerabilities.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Ideally, your DevOps strategy is powered by developers who have two main traits. First, they are flexible in their &lt;a href="https://www.techtarget.com/searchapparchitecture/tip/9-low-code-development-tools-to-know"&gt;development tool set&lt;/a&gt;. They know a variety of programming languages and are familiar with different app development strategies, including Agile methodologies. This flexibility helps your team adjust and improve continuously.&lt;/p&gt;
 &lt;p&gt;Second, developers who support DevOps must have at least a working understanding of what happens to code after it's deployed, as the core focus of DevOps is bridging the gap between software development and post-deployment software management. Developers don't need to be system administration experts, but they should know how to manage production environments and recognize the challenges IT teams face as they manage code after deployment. This knowledge is required to break down the silo structure that separates development from IT operations.&lt;/p&gt;
 &lt;h3&gt;2. IT operations engineers&lt;/h3&gt;
 &lt;p&gt;IT operations engineers -- sometimes called &lt;i&gt;IT engineers&lt;/i&gt; -- are the &lt;i&gt;ops&lt;/i&gt; in DevOps. Their core responsibilities under a DevOps operating model include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Provisioning and deploying the infrastructure necessary to host software.&lt;/li&gt; 
  &lt;li&gt;Deploying new software releases.&lt;/li&gt; 
  &lt;li&gt;Monitoring and observing software in production environments to detect issues and, where necessary, collaborating with developers to fix them.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;DevOps requires IT engineers who are competent in IT operations, but ideally, they are more than that. They understand the &lt;a href="https://www.techtarget.com/searchsoftwarequality/tip/The-stages-of-the-SDLC-explained"&gt;software development process&lt;/a&gt; workflows and can collaborate with developers to reduce the friction that occurs when developers hand off code for deployment.&lt;/p&gt;
 &lt;p&gt;Look for IT engineers who know how to code. Ideally, they have experience writing not just simple system administration scripts but also application code. This knowledge will enable more effective collaboration with developers.&lt;/p&gt;
 &lt;p&gt;Key roles in a successful DevOps team span coding, security and UX expertise, as well as nontechnical areas.&lt;/p&gt;
 &lt;h3&gt;3. DevOps engineer&lt;/h3&gt;
 &lt;p&gt;Although simply hiring DevOps engineers is hardly enough to excel in DevOps, this role is vital because it helps implement the tools and infrastructure that enable DevOps processes.&lt;/p&gt;
 &lt;p&gt;To this end, DevOps these are engineers' key areas of responsibility:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Implementing and managing &lt;a href="https://www.techtarget.com/searchsoftwarequality/CI-CD-pipelines-explained-Everything-you-need-to-know"&gt;CI/CD pipelines&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Building automations to help streamline application releases and infrastructure management, often with the help of infrastructure-as-code frameworks.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Coding is an essential skill for DevOps engineers, but typically, they write automation code rather than application code.&lt;/p&gt;
 &lt;p&gt;Good DevOps engineers also have a strong understanding of infrastructure design principles and the ability to work with a wide variety of infrastructure platforms -- such as Kubernetes and the various public clouds that an organization might use.&amp;nbsp;&lt;/p&gt;
 &lt;h3&gt;4. Systems architects&lt;/h3&gt;
 &lt;p&gt;DevOps doesn't require a specific architecture. Success isn't determined by whether you host workloads on-premises or in the cloud, nor will it necessarily matter which OSes you use. Still, a team that wants to design a DevOps-friendly architecture should keep certain goals in mind -- which is where systems architects come in.&lt;/p&gt;
 &lt;p&gt;The core responsibilities of systems architects under DevOps include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Assessing various options for hosting DevOps tools, such as &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Evaluate-these-9-multi-cloud-management-platforms"&gt;different cloud environments&lt;/a&gt;, and deciding which best meet business needs.&lt;/li&gt; 
  &lt;li&gt;Planning and overseeing the implementation of integrations among DevOps tools.&lt;/li&gt; 
  &lt;li&gt;Managing and monitoring CI/CD pipelines to help keep DevOps processes running smoothly.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Systems architects' roles are similar to those of DevOps engineers, as both focus on managing the tools and infrastructure that power DevOps processes. The difference is that systems architects specialize in the high-level design of DevOps tools and infrastructure, whereas DevOps engineers usually focus more on the implementation.&lt;/p&gt;
 &lt;p&gt;That said, the overlap between these roles means that some organizations combine them by writing job descriptions that are broad enough for DevOps engineers to cover systems architect responsibilities, and vice versa.&lt;/p&gt;
 &lt;h3&gt;5. QA engineers&lt;/h3&gt;
 &lt;p&gt;Although developers have become more directly involved in software testing in recent years, QA engineers still play a valuable DevOps role. They assist with these essential tasks:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Designing and writing &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/automated-software-testing"&gt;automated tests&lt;/a&gt; that check software releases for performance and reliability before they are deployed.&lt;/li&gt; 
  &lt;li&gt;Running manual tests in cases where automated testing isn't possible or practical, such as when testing a specialized type of application that isn't supported by an automated testing framework.&lt;/li&gt; 
  &lt;li&gt;Assessing the results of software tests and working with developers to address bugs detected during testing.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;QA engineers focus specifically on defining quality standards for performance, reliability and other factors before software is pushed into production. It's their responsibility to design and run tests that assess whether each new release meets those requirements as it flows through the CI/CD pipeline.&lt;/p&gt;
 &lt;p&gt;In some ways, the work performed by QA engineers might seem at odds with other DevOps goals. Inefficient software testing introduces delays to the CI/CD process, which hampers the fundamental DevOps goal of CD. To support DevOps most effectively, QA engineers should understand how to maintain software quality and minimize disruptions to other DevOps processes. There are several ways to do this.&lt;/p&gt;
 &lt;p&gt;One technique is to embrace &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/shift-right-testing"&gt;shift-right testing&lt;/a&gt; for noncritical features. This enables some tests to run after code is deployed, reducing the number of tests that run pre-deployment and getting new releases into production faster. This strategy would be inappropriate for critical features -- those should be tested &lt;i&gt;before&lt;/i&gt; deployment -- but it works well for testing smaller application components that won't cause serious problems if they fail a post-deployment test.&lt;/p&gt;
 &lt;p&gt;Good QA engineers can also write efficient tests that run quickly and automatically. They should know the ins and outs of &lt;a href="https://www.techtarget.com/searchsoftwarequality/tip/The-basics-of-implementing-an-API-testing-framework"&gt;test automation frameworks&lt;/a&gt;, such as Selenium, and be skilled at writing tests that cover a lot of ground without taking a long time to run. They must also know how to interpret test results quickly and communicate to developers how to fix whatever caused the failure. Effective communication between developers and QA engineers in this regard is essential to maintaining the CI/CD pipeline flow even when a test fails.&lt;/p&gt;
 &lt;h3&gt;6. UX engineers&lt;/h3&gt;
 &lt;p&gt;A UX engineer isn't necessarily a DevOps role that immediately comes to mind. An expert who can ensure that software pleases end users, though, adds value to your DevOps process by addressing the following responsibilities:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Collaborating with developers during the software design process to ensure that user needs and expectations remain front and center.&lt;/li&gt; 
  &lt;li&gt;Prototyping and testing user interfaces.&lt;/li&gt; 
  &lt;li&gt;Interfacing with end users to determine whether existing interface capabilities best meet their needs and expectations, and if not, devising ways to improve.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;UX work is especially important because it's easy to fixate on the technical aspects of DevOps, such as how often a team releases software or how many tests it runs per release cycle. The goal of DevOps shouldn't be merely to deliver software quickly and efficiently; you also want software that delights users. UX engineers can help the rest of the DevOps team maintain that focus.&lt;/p&gt;
 &lt;h3&gt;7. Security engineers&lt;/h3&gt;
 &lt;p&gt;Security engineers -- specifically, ones who &lt;a href="https://www.techtarget.com/searchitoperations/feature/5-DevSecOps-best-practices-to-prioritize"&gt;understand DevSecOps&lt;/a&gt; and can put its tenets into practice -- are another core part of a DevOps organization. They bring a specific and important set of skills to the process:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Coordinating with developers to plan secure application architectures.&lt;/li&gt; 
  &lt;li&gt;Coordinating with IT engineers to design secure infrastructure environments.&lt;/li&gt; 
  &lt;li&gt;Testing applications for security risks and collaborating with developers and IT engineers to mitigate them.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;To implement DevSecOps, an organization must establish tools and processes that enable developers, security engineers and IT professionals to collaborate on security operations. All three stakeholder groups should have visibility into security issues so they can address them efficiently. Likewise, developers should be prepared to communicate with security engineers early and often to help design code that is secure from the start. IT engineers should work closely with the security team to ensure that their deployment and management processes follow best practices regarding application and infrastructure security.&lt;/p&gt;
 &lt;h3&gt;8. DevOps evangelists&lt;/h3&gt;
 &lt;p&gt;Not everyone will understand what DevOps means or why the organization should invest in the new tools, processes and people necessary to support it. A DevOps evangelist can help smooth over objections to the technology and organizational changes that DevOps adoption demands by covering the following areas of responsibility:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Providing general guidance on what it takes to &lt;a href="https://www.techtarget.com/searchitoperations/tip/Target-tangible-IT-goals-during-a-DevOps-culture-shift"&gt;build a DevOps-centric culture&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Explaining to engineers how DevOps makes their work more efficient.&lt;/li&gt; 
  &lt;li&gt;Serving as a bridge between business leaders and technical staff when planning and implementing DevOps strategy.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Although some organizations hire dedicated DevOps evangelists, it's also common for businesses to select team members from other DevOps roles to serve as &lt;i&gt;DevOps champions&lt;/i&gt;.&lt;/p&gt;
 &lt;h3&gt;9. Site reliability engineer&lt;/h3&gt;
 &lt;p&gt;One can debate whether a site reliability engineer (&lt;a href="https://www.techtarget.com/searchitoperations/definition/site-reliability-engineering-SRE"&gt;SRE&lt;/a&gt;) is a core DevOps role or merely a complement to DevOps. Either way, it's hard to deny that having SREs on hand is a good thing for DevOps. SREs can accelerate DevOps by covering these responsibilities:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Working with developers and IT engineers to design stable, high-performing applications and infrastructure.&lt;/li&gt; 
  &lt;li&gt;Monitoring production environments for performance issues.&lt;/li&gt; 
  &lt;li&gt;Taking the lead in incident response by mitigating failures efficiently.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;To an extent, these responsibilities overlap with other DevOps roles, such as IT engineers (who also play a role in application monitoring) and QA engineers (who run tests to detect performance issues). An important difference, however, is that SREs usually rely heavily on code-based automation to perform their work. This can help make the work of assessing and managing reliability more scalable and efficient, which shows how SREs can add value even in organizations that already have their core DevOps responsibilities covered.&lt;/p&gt;
 &lt;h3&gt;10. Cloud engineer&lt;/h3&gt;
 &lt;p&gt;As noted above, organizations that depend heavily on cloud computing might choose to include &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/cloud-engineer"&gt;cloud engineers&lt;/a&gt; within their DevOps teams. Cloud engineers bear primary responsibility for these tasks:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Administering cloud environments.&lt;/li&gt; 
  &lt;li&gt;Deploying applications to the cloud and managing them when they are there.&lt;/li&gt; 
  &lt;li&gt;Integrating the disparate tools and services that exist between clouds in a multi-cloud strategy.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;This work can overlap substantially with that of IT engineers, who also deploy and manage applications. However, cloud engineers bring distinct expertise with cloud environments and tools, which more general types of IT engineers sometimes lack.&lt;/p&gt;
 &lt;h3&gt;11. Automation engineer&lt;/h3&gt;
 &lt;p&gt;An &lt;a href="https://www.techtarget.com/searchitoperations/definition/automation-engineer"&gt;automation engineer&lt;/a&gt; is another potential type of DevOps role that can be helpful for some organizations. It includes the following key responsibilities:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Designing and implementing automated workflows.&lt;/li&gt; 
  &lt;li&gt;Optimizing automated processes to make them more efficient and mitigate risk.&lt;/li&gt; 
  &lt;li&gt;Troubleshooting and mitigating disruptions to automated workflows.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;In the context of DevOps, these responsibilities can overlap with those of DevOps engineers and systems architects, both of whom also focus on automation. But an automation engineer can be a broader role that drives automation across all workflows, not just those specifically related to DevOps. In this way, automation engineers can help bridge the gap between DevOps processes and other workflows that the business depends on.&lt;/p&gt;
 &lt;p&gt;Note, too, that automation engineers can be especially valuable for organizations experimenting with new types of automation tools, such as AI agents. These have not traditionally featured in DevOps workflows, where automation has conventionally depended on scripts instead, but automation engineers versed in applying emerging technology can help organizations take advantage of cutting-edge automation solutions such as agentic AI.&lt;/p&gt;
 &lt;h3&gt;12. AI DevOps engineer&lt;/h3&gt;
 &lt;p&gt;Speaking of AI, some organizations are now creating AI DevOps engineer roles, whose main responsibilities include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Using AI to automate CI/CD pipelines.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchenterpriseai/tip/Top-generative-AI-tool-categories"&gt;Implementing and managing AI tools&lt;/a&gt; that can accelerate core DevOps processes, such as software development.&lt;/li&gt; 
  &lt;li&gt;Helping to ensure that the DevOps team's use of AI tools remains compliant and secure.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Whether it's necessary to devote a DevOps role specifically to AI is debatable; these responsibilities could also be addressed by other engineers, who are increasingly integrating AI into their workflows. But given the complexity of modern AI -- and the deep compliance and security challenges it presents -- a dedicated AI DevOps engineer position can make sense.&lt;/p&gt;
&lt;/section&gt;                                                                
&lt;section class="section main-article-chapter" data-menu-title="Structuring DevOps roles in your organization"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Structuring DevOps roles in your organization&lt;/h2&gt;
 &lt;p&gt;Once you've identified the roles that enable DevOps, you need to combine or coordinate them into an actual DevOps team. This can be a major challenge because the DevOps philosophy makes no specific recommendations about how to structure DevOps teams or integrate DevOps into existing teams.&lt;/p&gt;
 &lt;p&gt;Most businesses choose one of the following approaches to structuring DevOps personnel:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Replace dev and ops with DevOps.&lt;/b&gt; Eliminate separate development and IT operations departments entirely and replace them with a dedicated DevOps team. The new team can include stakeholders from other domains, such as QA, or you can manage roles other than dev and ops as their own teams. This approach works well if you want to structure your entire organization around DevOps and never look back, but it requires a major organizational overhaul. You must also convince all your developers and IT engineers to embrace a new identity as DevOps specialists, which can be culturally jarring.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Run DevOps alongside dev and ops.&lt;/b&gt; Keep your existing development and IT operations teams intact, with a separate DevOps team that operates alongside them and coordinates activities. With this approach, developers and engineers &lt;a target="_blank" href="https://www.devopsbay.com/blog/it-vs-dev-ops-understanding-key-differences-and-similarities" rel="noopener"&gt;retain their identities&lt;/a&gt; and independence as you integrate DevOps into the overall organization. However, you'll have to build a new DevOps team from scratch and convince other teams to work with it.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Embed DevOps engineers into other teams.&lt;/b&gt; This hybrid approach embeds DevOps specialists into your existing dev and ops departments. It requires minimal organizational or cultural change -- but sprinkling DevOps engineers across existing teams might not be enough to fully embrace DevOps. You might end up with an organization that does &lt;i&gt;DevOps lite&lt;/i&gt; instead of a total DevOps transformation.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Conclusion: The importance of a clear DevOps role definition"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Conclusion: The importance of a clear DevOps role definition&lt;/h2&gt;
 &lt;p&gt;A large part of DevOps' success boils down to defining the right roles. The DevOps roles an organization needs can vary somewhat depending on factors such as the technologies it uses and how broad or narrow it makes certain job descriptions. Ultimately, the goal should be to ensure that all key DevOps responsibilities -- software development and deployment, QA, security, tool management and infrastructure management -- are covered within a holistic operating model.&lt;/p&gt;
 &lt;p&gt;Note as well that leadership alignment is critical to translating DevOps roles into a collaborative DevOps team. Business leaders must clearly define each role's responsibilities and how it complements others. They must also set clear goals and priorities for DevOps team members to pursue. This can be done, for example, by articulating how extensively the business chooses to &lt;a href="https://www.techtarget.com/searchitoperations/tip/What-to-expect-as-AI-for-DevOps-advances-in-the-enterprise"&gt;integrate AI into its workflows&lt;/a&gt; or determining the balance it seeks between software reliability and release velocity.&lt;/p&gt;
 &lt;p&gt;Finally, it's important to keep in mind that DevOps roles should evolve as organizations mature. Smaller companies, or those that develop and manage a small number of applications, often don't require so many distinct DevOps roles. They might, for instance, fold QA engineering responsibilities into developer roles, because they don't need to perform enough software tests to justify a dedicated QA engineering role.&lt;/p&gt;
 &lt;p&gt;But over time, as DevOps processes scale up and become more complex, it's common for organizations to build out their DevOps team structure to include all key roles.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Chris Tozzi is a freelance writer, research adviser, and professor of IT and society. He has previously worked as a journalist and Linux systems administrator.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>More than most IT initiatives, DevOps is built around people. Involve the right professionals, and get those people primed to work in concerted ways.</description>
            <image>https://cdn.ttgtmedia.com/visuals/searchOracle/applications/oracle_article_001.jpg</image>
            <link>https://www.techtarget.com/searchitoperations/feature/Know-the-key-DevOps-roles-and-responsibilities-for-team-success</link>
            <pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate>
            <title>DevOps roles explained: Key jobs, responsibilities and skills</title>
        </item>
        <item>
            <body>&lt;p&gt;Rural and community hospitals often operate under &lt;a href="https://jamanetwork.com/journals/jamanetworkopen/fullarticle/2803940"&gt;tighter margins&lt;/a&gt; than their urban counterparts, making large technology investments difficult to justify. Despite these constraints, some smaller health systems are turning to clinical AI tools to &lt;a href="https://www.techtarget.com/searchhealthit/feature/AI-healthcare-trends-to-watch"&gt;address operational pressures&lt;/a&gt;.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;San Juan Regional Medical Center, a community-owned hospital serving a largely rural population across the Four Corners region of New Mexico, Arizona, Utah and Colorado, recently adopted &lt;a href="https://www.wellsheet.com/"&gt;Wellsheet&lt;/a&gt;, a clinical AI platform aimed at improving how clinicians access and interpret patient information. For hospital leaders, the decision was less about chasing innovation than a necessity.&lt;/p&gt; 
&lt;p&gt;"We don't have enough nurses. We're never going to have enough nurses. We don't have enough physicians," said Carlo Hallak, M.D., physician executive of information services at San Juan Regional. "So we need tools that allow for better patient care decisions by surfacing this data."&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Operational pressures drive AI investment decisions"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Operational pressures drive AI investment decisions&lt;/h2&gt;
 &lt;p&gt;Like many regional hospitals, San Juan Regional's challenge was not a lack of clinical data but the difficulty of using it efficiently. Hallak said clinicians often navigate multiple screens and external resources to find necessary information, which can delay care decisions and affect patient flow.&lt;/p&gt;
 &lt;p&gt;Hallak described the longstanding challenge facing IT leaders: "How can we present the right data at the right moment to the right level of care?" he said.&lt;/p&gt;
 &lt;p&gt;That challenge ultimately led the hospital to adopt an AI-based clinical workflow platform, starting in January 2026.&lt;/p&gt;
 &lt;p&gt;Hallak emphasized the hospital's investment was not driven by excitement around AI itself.&lt;/p&gt;
 &lt;p&gt;"It is not a hype," he said. "It has solved a problem that we've been trying to solve for many years as clinicians."&lt;/p&gt;
 &lt;p&gt;San Juan Regional is not alone in exploring this approach. In a &lt;a href="https://www.prnewswire.com/news-releases/wellsheet-continues-momentum-with-health-systems-across-us-brings-ai-to-san-juan-medical-center-302692097.html"&gt;press release&lt;/a&gt;, Wellsheet reported that its platform is now deployed in more than 100 hospitals nationwide, reflecting growing interest in workflow-integrated clinical AI tools.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Fitting in with existing workflows"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Fitting in with existing workflows&lt;/h2&gt;
 &lt;p&gt;Hallak said his team evaluated potential tools based largely on how well they would support clinicians within their &lt;a href="https://www.techtarget.com/searchhealthit/answer/How-EHR-Clinical-Workflow-Driven-Design-Enhances-Health-IT-Usability"&gt;existing workflows&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;According to Hallak, the AI software's integration with &lt;a href="https://www.wolterskluwer.com/en/solutions/uptodate/pro/uptodate?utm_source=google&amp;amp;utm_medium=cpc&amp;amp;utm_campaign=CBHV_MKXX_PRUTD_GE0B_LAENXX_PLGO_CTSE_KPPO_AUPR_DVAL_TABR_MTXX_FNLO_BOEC_THIND-UTD-Brand-USCAN&amp;amp;utm_content=&amp;amp;utm_term=uptodate&amp;amp;bu=individual&amp;amp;gad_source=1&amp;amp;gad_campaignid=22901278492&amp;amp;gbraid=0AAAAACm31zolnpfelBEfB8dtM-bB7xXiQ&amp;amp;gclid=Cj0KCQiAwYrNBhDcARIsAGo3u33QO13f2OqDZpWHYZHDvEmvNK5BWLzppZu7nGUF1y-ujxKuKFD6Zd0aAhbBEALw_wcB"&gt;UpToDate&lt;/a&gt; -- a widely used, evidence-based clinical decision support resource relied on by clinicians for current research and treatment guidance -- became a major deciding factor during the selection process.&lt;/p&gt;
 &lt;p&gt;Traditionally, providers consult such references separately from the EHR, manually applying patient data to clinical guidance. Wellsheet streamlines that workflow by connecting UpToDate with the EHR.&lt;/p&gt;
 &lt;p&gt;By presenting guidance in the context of an individual patient, clinicians can review relevant evidence without leaving the patient's chart.&lt;/p&gt;
 &lt;p&gt;"Physicians don't have to get outside of the EHR and read an article that is not in the context of the patient," Hallak said. "It's based on that patient and their information."&lt;/p&gt;
 &lt;p&gt;The platform summarizes chart information and links clinical pathways, decision-support calculators and other reference material using patient-specific information from the medical record. Rather than directing treatment, the system organizes information, Hallak emphasized.&lt;/p&gt;
 &lt;p&gt;It's an approach that builds on traditional clinical decision support models, in which evidence informs care while responsibility remains with the clinician.&lt;/p&gt;
 &lt;p&gt;"I'm giving you the right information to make the right decisions," Hallak said.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="Patient outcomes, clinician satisfaction will indicate success"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Patient outcomes, clinician satisfaction will indicate success&lt;/h2&gt;
 &lt;p&gt;San Juan Regional plans to evaluate the investment using operational and clinical metrics, including discharge efficiency and length of stay. Hallak said they also hope to see earlier identification of patient deterioration.&lt;/p&gt;
 &lt;p&gt;"I'm looking for better clinical and operational efficiency -- being able to discharge the patient at the right time safely," Hallak said. "Hopefully, in six months, down the road, we will report great outcomes."&lt;/p&gt;
 &lt;p&gt;He said the hospital is also paying attention to how the technology affects &lt;a href="https://www.techtarget.com/searchhealthit/news/366577964/EHR-Information-Overload-Adds-to-Clinician-Burnout-Stress"&gt;day-to-day clinician experience&lt;/a&gt;. By reducing the need to search through multiple screens for information, leaders hope the platform will make workflows feel more manageable.&lt;/p&gt;
 &lt;p&gt;"It's about physician and care team satisfaction -- not struggling to search for data, but bringing back some joy to practicing medicine and using technology," Hallak said.&lt;/p&gt;
 &lt;p&gt;San Juan Regional's experience reflects a broader shift among community hospitals seeking operational efficiency amid mounting pressures. Ultimately, health systems with limited resources will have to judge clinical AI by its ability to improve efficiency and patient care alongside the cost of the technology.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Elizabeth Stricker, BSN, RN, comes from a nursing and healthcare leadership background, and covers health technology and leadership trends for B2B audiences.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>For one rural hospital, improving access to clinical information drove the move toward AI implementation.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/5.jpg</image>
            <link>https://www.techtarget.com/healthtechanalytics/feature/Clinical-AI-gains-ground-in-a-resource-constrained-hospital</link>
            <pubDate>Tue, 17 Mar 2026 09:30:00 GMT</pubDate>
            <title>Clinical AI gains ground in a resource-constrained hospital</title>
        </item>
        <item>
            <body>&lt;p&gt;Everpure has announced Evergreen One for AI, a performance-backed consumption model for artificial intelligence (AI) that extends to use of its &lt;a href="https://www.computerweekly.com/news/366620538/Pure-aims-at-AI-beyond-the-enterprise-with-FlashBlade-Exa"&gt;FlashBlade//Exa&lt;/a&gt; &lt;a href="https://www.computerweekly.com/resources/Flash-storage-and-solid-state-drives-SSDs"&gt;high-performance storage&lt;/a&gt;. Meanwhile, the company – &lt;a href="https://www.computerweekly.com/news/366639189/Pure-Storage-rebrands-to-Everpure-as-storage-makers-business-expands-focus-to-data-management"&gt;known as Pure Storage until recently&lt;/a&gt; – has announced the beta release of its Datastream automated AI pipeline appliance.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Evergreen One for AI differs from existing flexible capacity offers in the Everpure range by providing use of FlashBlade//Exa and service-level agreements (SLA) based on graphics processing unit (GPU) count. The aim here is to ensure that the storage environment provides the throughput to keep GPU resources fully utilised.&lt;/p&gt; 
&lt;p&gt;FlashBlade//Exa, Everpure’s highest-performance platform, was previously excluded from the &lt;a href="https://www.computerweekly.com/feature/Pures-storage-as-a-service-We-can-offer-what-others-cant"&gt;Evergreen One consumption model&lt;/a&gt;.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Exa aims at AI and high-performance computing (HPC) workloads that demand extremely high throughput, likely in customers between large enterprise users of AI and the hyperscalers.&lt;/p&gt; 
&lt;p&gt;At its launch, FlashBlade//Exa introduced an architecture to the Pure product line in which metadata and bulk storage are disaggregated with different hardware and protocols in use.&lt;/p&gt; 
&lt;p&gt;Kaycee Lai, vice-president for AI with Everpure, said Evergreen One for AI shifted the financial and operational risk away from the customer. “Specifically, we have an offering which we call Evergreen One for AI,” he said. “The big difference for AI is that we set the performance level of the offering based on the number of GPUs that you have … it is an SLA-backed performance guarantee.”&lt;/p&gt; 
&lt;p&gt;Evergreen One and Flex are Pure Storage’s pay-as-you-go procurement models, while Forever involves upfront purchase with built-in upgrades.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Automating the RAG pipeline"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Automating the RAG pipeline&lt;/h2&gt;
 &lt;p&gt;Everpure also announced the beta availability of Datastream. First previewed in late 2024, Datastream is a “single SKU” appliance that integrates Nvidia GPUs with Everpure storage. It is designed to tackle the “data readiness” challenge, said Lai. This refers to the oft-cited statistic that data teams spend 80% of their time preparing unstructured data for use.&lt;/p&gt;
 &lt;p&gt;The appliance automates the &lt;a href="https://www.computerweekly.com/feature/RAG-AI-Do-it-yourself-says-NYC-data-scientist"&gt;retrieval-augmented generation&lt;/a&gt; (RAG) pipeline, which includes ingest, curation and vectorisation of data. By providing an integrated hardware and software stack, Everpure aims to provide an “easy button” for enterprises building chatbots or autonomous agents, he said.&lt;/p&gt;
 &lt;p&gt;The software capability behind Datastream was built in-house, though it can connect to third-party data sources including Dell, HP and NetApp environments, as well as cloud-resident data. This flexibility allows the appliance to act as a central hub for AI readiness regardless of where the data lives.&lt;/p&gt;
 &lt;p&gt;“Today, people run RAG pipelines … they do the chunking, the embedding, the indexing to make sure that the data is going to be accurate and relevant so that chatbot agents can consume them in a specific format,” said Lai. “That takes up about 80% of most data teams’ time because there’s no standard tool.”&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Underpinning performance"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Underpinning performance&lt;/h2&gt;
 &lt;p&gt;To support these launches, Everpure revealed new benchmarks intended to validate its hardware under AI stress. In MLPerf 2.0 testing, the company claimed the top spot for checkpointing – a critical function for saving the state of a model during long training runs – reporting results up to two times better than competitors such as Huawei and Vast.&lt;/p&gt;
 &lt;p&gt;The company also cited Spec Storage AI image benchmarks, where it outperformed NetApp’s AFX platform by approximately 20%, he said.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about storage and AI&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/feature/Storage-technology-explained-AI-and-the-data-storage-it-needs"&gt;Storage technology explained: AI and data storage&lt;/a&gt;: In this guide, we examine the data storage needs of artificial intelligence, the demands it places on data storage, the suitability of cloud and object storage for AI, and key AI storage products.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/feature/Storage-technology-explained-Vector-databases-at-the-core-of-AI"&gt;Storage technology explained: Vector databases at the core of AI&lt;/a&gt;: We look at the use of vector data in AI and how vector databases work, plus vector embedding, the challenges for storage of vector data and the key suppliers of vector database products.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Nvidia GTC is the occasion for beta launch of its Datastream appliance that marries software to ingest and manage AI data pipelines with Everpure storage and GPU resources</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/Cambridge-1-GPU-CREDIT-NVIDIA-hero.jpg</image>
            <link>https://www.computerweekly.com/news/366640415/Everpures-Evergreen-One-for-AI-brings-Exa-flash-and-GPU-based-service-level-agreements</link>
            <pubDate>Mon, 16 Mar 2026 16:30:00 GMT</pubDate>
            <title>Everpure’s Evergreen One for AI brings Exa flash and GPU-based service-level agreements</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;span style="font-weight: 400"&gt;Nutanix is positioning its agentic AI solution as a full software stack, purpose-built for real-world enterprise deployments.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: 400"&gt;The company thinks we have now hit &lt;/span&gt;&lt;span style="font-weight: 400"&gt;a tipping point where the barrier to success is no longer the model or building individual agents, but the complexity of managing the infrastructure required to securely run thousands of agents at scale.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: 400"&gt;Nutanix (as an infrastructure specialist) would be likely to say that, but, in fairness, this is absolutely the narrative that we’re hearing from the rest of the industry.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: 400"&gt;Now focused on providing infrastructure and platform teams with the tools to “build and operate AI factories” today, Nutanix says it will focus on performance, security&lt;/span&gt;&lt;span style="font-weight: 400"&gt; and compliance with sovereignty requirements.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is an AI factory?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;span style="font-weight: 400"&gt;What is an AI factory?&lt;/span&gt;&lt;/h2&gt;
 &lt;p&gt;&lt;span style="font-weight: 400"&gt;We can define an AI factory as a collection of platform-level and infrastructure-level technologies and toolsets that work to continuously ingest data and train machine learning models on a continuous basis. Rather than coal or any other form of fuel, this factory runs on data and its machinery is aligned to process intelligence, predictions and autonomous decisions through interconnected compute functions, data pipelines and algorithmic logic. The AI factory ultimately delivers and deploys AI-powered outputs with the scope to scale once any given AI service enjoys widespread user uptake.&lt;/span&gt;&lt;/p&gt;
 &lt;p&gt;&lt;span style="font-weight: 400"&gt;We’re now hearing firms talk about how data scientists and agentic AI developers expect easy access to tools and services to run and fine-tune models, build agents and securely connect them to enterprise data… and this is the channel that Nutanix aims to flow in.&lt;/span&gt;&lt;/p&gt;
 &lt;blockquote&gt;
  &lt;p&gt;&lt;span style="font-weight: 400"&gt;“Enterprise AI becomes economically viable when the infrastructure around it is engineered for scale. By integrating orchestration, models and data services into a single stack, Nutanix is moving enterprise AI from isolated agents to operational ‘AI factories’,” said &lt;/span&gt;&lt;a href="https://www.linkedin.com/in/markvigoroso/"&gt;&lt;span style="font-weight: 400"&gt;Mark Vigoroso&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400"&gt;, founder &amp;amp; CEO of B2B tech catalyst, The Enterprise Edge.&lt;/span&gt;&lt;/p&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;&lt;a href="https://www.linkedin.com/in/thomas-cornely-811610/"&gt;&lt;span style="font-weight: 400"&gt;Thomas Cornely&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400"&gt;, executive vice president of product management at Nutanix says that in contrast to AI infrastructure for model training (which was optimised to run ‘one big job’), we need to realise that production agentic AI infrastructure needs to handle scale and high rates of change for thousands of AI services, agents and concurrent users and developers.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Cloud ops model for AI factories"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;span style="font-weight: 400"&gt;Cloud ops model for AI factories&lt;/span&gt;&lt;/h2&gt;
 &lt;p&gt;&lt;span style="font-weight: 400"&gt;Nutanix Agentic AI extends AHV hypervisor, Flow Virtual Networking, Nutanix Kubernetes Platform and Nutanix Enterprise AI to create a cloud operating model for enterprise AI factories, enabling infrastructure and platform teams to simply build, operate and govern.&lt;/span&gt;&lt;/p&gt;
 &lt;p&gt;&lt;span style="font-weight: 400"&gt;According to Cornley, the technology on offer here integrates with Nvidia AI Enterprise at the Agent Builder layer and orchestrates the Nvidia-certified ecosystem of AI factories for supported configurations. It provides dynamic, multiuser AI environments to build, run and protect agentic AI applications with a full suite of infrastructure orchestration and security software coupled with AI Platform Services (PaaS) and Models-as-a-Service (MaaS) for data scientists and agentic AI developers.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
 &lt;blockquote&gt;
  &lt;p&gt;&lt;span style="font-weight: 400"&gt;“Nutanix’s Agentic AI stack removes much of the infrastructure friction that can slow down enterprise AI projects. By bringing the layers together – from Models-as-a-Service at the top, to an AI platform built on a standardised Kubernetes distribution, down to GPU-aware hypervisors and DPU-accelerated networking – organisations get a more coherent AI stack, enabling AI factories that deliver strong performance and security while driving down the cost per token,” said &lt;/span&gt;&lt;a href="https://www.linkedin.com/in/srmcdowell/"&gt;&lt;span style="font-weight: 400"&gt;Steve McDowell&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400"&gt;, chief analyst, Nand Research.&lt;/span&gt;&lt;/p&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;&lt;span style="font-weight: 400"&gt;Nutanix says its Agentic AI (CAPS used to denote branded service) reduces complexity, delivers optimised performance and security and is designed to enable lower, predictable token costs by providing the agentic AI services and a Kubernetes platform.&lt;/span&gt;&lt;/p&gt;
 &lt;p&gt;&lt;span style="font-weight: 400"&gt;This AI PaaS and Kubernetes native software layer consists of:&lt;/span&gt;&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li style="font-weight: 400"&gt;&lt;b&gt;An Advanced AI Gateway and Model-as-a-Service: &lt;/b&gt;&lt;span style="font-weight: 400"&gt;The latest release of Nutanix Enterprise AI (NAI), version 2.6, now includes an AI Gateway service for unified policy control over cloud-hosted and private LLMs. New support for the Model Context Protocol (MCP) server and Fine Tuning extends its existing robust MaaS capabilities to enable agents to securely connect to enterprise tools and data sources. NAI also now includes support for the NVIDIA Nemotron family of open-source AI models, datasets and training tools designed to help developers build agentic AI systems that can reason, securely access tools and complete complex multistep tasks independently.&lt;/span&gt;&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li style="font-weight: 400"&gt;&lt;b&gt;An Open Kubernetes Platform With a Rich AI Catalogue:&lt;/b&gt;&lt;span style="font-weight: 400"&gt; Nutanix simplifies the path to Agentic AI by extending its CNCF-compliant Nutanix Kubernetes Platform with a rich catalog of pre-built open source AI developer tools, including Notebooks, Vector Databases, MLOps workflow engines and Agentic frameworks. Because it is fully integrated with Nvidia AI Enterprise software, developers can instantly deploy Nvidia NIM microservices, including Nemotron, to accelerate the development of high-performance AI applications in production.&lt;/span&gt;&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;span style="font-weight: 400"&gt;Also, here we find infrastructure optimisation and security. In the early access version of Nvidia topology-aware AHV, the Nutanix AHV hypervisor has been enhanced to automatically optimise allocation of physical resources to virtual machines on GPU-dense servers and help maximise performance.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
 &lt;p&gt;&lt;span style="font-weight: 400"&gt;The Nutanix Flow Virtual Networking service has been enhanced to offload the network dataplane to Nvidia BlueField, delivering high-performance networking while reducing host CPU and memory consumption. These enhanced capabilities bring all the benefits of virtual machines for workload and tenant isolation, day 2 operations and infrastructure resilience to Agentic AI workloads with maximum performance, security and resource utilisation to help achieve a lower cost per token.&lt;/span&gt;&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Foundational data services for AI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;span style="font-weight: 400"&gt;Foundational data services for AI&lt;/span&gt;&lt;/h2&gt;
 &lt;p&gt;&lt;span style="font-weight: 400"&gt;Agentic AI applications require foundational Data Services. As a solution built on the Nvidia AI Data Platform reference design, Nutanix Unified Storage delivers linearly scalable read/write performance for thousands of GPU clients. By providing a high-capacity tier for KV Cache offloading and support for S3 over RDMA and NFS over RDMA, Nutanix provides a scalable, low-latency data fabric that maximises GPU efficiency across all enterprise AI workloads.&lt;/span&gt;&lt;/p&gt;
 &lt;p&gt;&lt;span style="font-weight: 400"&gt;The Nutanix Agentic AI service works in line with Nvidia-certified AI factories and users can deploy AI factories on hardware from Cisco, Dell and Supermicro, supported with joint validation by Nutanix and Nvidia.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
 &lt;p&gt;&lt;img loading="lazy" decoding="async" class="wp-align alignnone size-full wp-image-11658" src="https://itknowledgeexchange.techtarget.com/cwdn/files/2026/03/1-3.png" alt="" width="580" height="265" srcset="https://itknowledgeexchange.techtarget.com/cwdn/files/2026/03/1-3.png 580w, https://itknowledgeexchange.techtarget.com/cwdn/files/2026/03/1-3-300x137.png 300w" sizes="(max-width: 580px) 100vw, 580px"&gt; &lt;img loading="lazy" decoding="async" class="wp-align alignnone size-full wp-image-11659" src="https://itknowledgeexchange.techtarget.com/cwdn/files/2026/03/2.jpg" alt="" width="580" height="360" srcset="https://itknowledgeexchange.techtarget.com/cwdn/files/2026/03/2.jpg 580w, https://itknowledgeexchange.techtarget.com/cwdn/files/2026/03/2-300x186.jpg 300w" sizes="(max-width: 580px) 100vw, 580px"&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Nutanix is positioning its agentic AI solution as a full software stack, purpose-built for real-world enterprise deployments. The company thinks we have now hit a tipping point where the barrier to ...</description>
            <link>https://www.computerweekly.com/blog/CW-Developer-Network/Nutanix-Agentic-AI-bids-to-stoke-up-enterprise-AI-factories</link>
            <pubDate>Mon, 16 Mar 2026 16:28:17 GMT</pubDate>
            <title>Nutanix Agentic AI bids to stoke up enterprise AI factories</title>
        </item>
        <item>
            <body>&lt;p&gt;Mobile device management gives IT the control, security and visibility necessary to protect modern workplaces.&lt;/p&gt; 
&lt;p&gt;Mobile devices are especially vulnerable to loss, theft and unauthorized access, which complicates data security and regulatory compliance for most organizations. IT administrators need to think about&amp;nbsp;getting devices to a securely managed and productive state&amp;nbsp;while ensuring the onboarding process is simple, minimally invasive and streamlined for end users. Mobile device management is not only a tactical IT chore but a strategic issue.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is mobile device management (MDM)?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is mobile device management (MDM)?&lt;/h2&gt;
 &lt;p&gt;Mobile device management (&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management"&gt;MDM&lt;/a&gt;) software enables IT to control, secure and enforce policies on mobile devices such as smartphones, tablets and laptops.&lt;/p&gt;
 &lt;p&gt;It provides administrators with tools to apply consistent security settings, deploy updates, monitor device health and remotely lock or wipe devices if they are lost, stolen or noncompliant. MDM is a foundational &lt;a href="https://www.techtarget.com/searchenterprisedesktop/feature/Understand-how-UEM-EMM-and-MDM-differ-from-one-another"&gt;element of enterprise mobility management and unified endpoint management&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;An MDM platform can manage various devices, including iOS, Android, Windows, macOS and even ChromeOS, in some cases. MDM is a flexible tool that gives admins many controls to ensure devices are secured and properly supported. Additionally, IT can consider programs such as Apple Business Manager and Android Enterprise, which integrate with MDM to give organizations more privileges on a device. Admins can then enforce higher-level security configurations, including advanced restrictions and settings controls, home screen layout, single app mode, multi-user and shared modes, and zero-touch enrollments.&lt;/p&gt;
 &lt;h3&gt;BYOD and MDM&lt;/h3&gt;
 &lt;p&gt;Device ownership is an important factor in MDM. In particular, BYOD policies can add a layer of complexity to management. Under these policies, employees store corporate data and carry out work tasks on personal devices. The challenge with BYOD is that user devices are unmanaged by default, which can expose the organization to security and compliance risks.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-successfully-implement-MDM-for-BYOD"&gt;MDM platforms help organizations manage BYOD endpoints&lt;/a&gt; using containerization mechanisms that enable app‑level controls and the separation of personal and work data. Admins can configure an MDM platform to define acceptable use, privacy boundaries and enforcement policies for devices based on their ownership status. This balances flexibility and security.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="1. Manage mobile devices with an MDM policy"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. Manage mobile devices with an MDM policy&lt;/h2&gt;
 &lt;p&gt;An MDM platform is only as effective as the policies that are configured and enforced by the organization using it. An &lt;a href="https://www.techtarget.com/searchmobilecomputing/feature/Why-a-mobile-security-policy-is-a-must-have-corporate-policy"&gt;MDM policy framework&lt;/a&gt; should define device enrollment requirements, security configuration standards and compliance monitoring procedures. Rather than implementing MDM as a purely technical tool, the strongest device management strategies establish clear, documented MDM policies that align technical controls with organizational security objectives.&lt;/p&gt;
 &lt;p&gt;MDM's role is to provide the organization with the ability to enforce security compliance controls on devices. Figure 1 shows an example of these controls for an iOS device.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/Mobile_sec_best_practices_figure_1.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/Mobile_sec_best_practices_figure_1_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/Mobile_sec_best_practices_figure_1_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/Mobile_sec_best_practices_figure_1.jpg 1280w" alt="Compliance policies for iOS." data-credit="Michael Goad" height="303" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. Device compliance policies that IT admins can enforce for iOS devices through MDM.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Some of the most common profile and compliance settings include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;PIN code and device encryption.&lt;/li&gt; 
  &lt;li&gt;Certificate-based&amp;nbsp;authentication.&lt;/li&gt; 
  &lt;li&gt;Email configuration.&lt;/li&gt; 
  &lt;li&gt;Wi-Fi configuration.&lt;/li&gt; 
  &lt;li&gt;Device feature permissions and restrictions.&lt;/li&gt; 
  &lt;li&gt;Blocklist and allowlist applications.&lt;/li&gt; 
  &lt;li&gt;Single sign-on (SSO).&lt;/li&gt; 
  &lt;li&gt;Enforcement and automation of iOS and Android updates.&lt;/li&gt; 
  &lt;li&gt;Data loss prevention (DLP) configurations.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchmobilecomputing/answer/Whats-the-difference-between-jailbreaking-and-rooting"&gt;Jailbreak/root detection&lt;/a&gt; and remediation.&lt;/li&gt; 
  &lt;li&gt;Remote lock and device wipe capabilities for lost or compromised devices.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="2. Manage authentication and access"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Manage authentication and access&lt;/h2&gt;
 &lt;p&gt;Access management on mobile devices should include strong PIN and multifactor authentication (MFA) controls, enforced through MDM.&lt;/p&gt;
 &lt;h3&gt;PIN code management&lt;/h3&gt;
 &lt;p&gt;The PIN often serves as a password for mobile devices, preventing bad actors from gaining unauthorized access to a device. Organizations should enforce a PIN policy, which might include minimum length standards or require automatic lock after a short period of inactivity. Using MDM, IT can enforce these settings consistently across corporate-owned and BYOD devices enrolled in the environment.&lt;/p&gt;
 &lt;h3&gt;Multifactor authentication&lt;/h3&gt;
 &lt;p&gt;Once a device leaves the corporate network, it's exposed to untrusted networks and higher risk conditions that IT can't fully control. MFA provides more comprehensive protection by confirming that the end user logging on is who they claim to be. It requires two or more authentication methods, which can include PIN or password, SMS verification and biometric authentication. An admin can then set parameters for when to require MFA based on the device's trust and risk conditions.&lt;/p&gt;
 &lt;p&gt;MDM can distribute and enforce these MFA requirements by integrating with the organization&lt;span dir="RTL"&gt;'&lt;/span&gt;s identity and access management (&lt;a href="https://www.techtarget.com/searchsecurity/definition/identity-access-management-IAM-system"&gt;IAM&lt;/a&gt;) platform during enrollment and device compliance checks. This approach aligns mobile authentication with the broader zero-trust and IAM strategy.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="3. Enable data loss prevention policies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. Enable data loss prevention policies&lt;/h2&gt;
 &lt;p&gt;Users rely on multiple apps on their mobile devices to get work done, so IT admins must ensure any corporate data is not copied to, or accessed from, unmanaged or untrusted applications. App protection and &lt;a href="https://www.techtarget.com/searchdatamanagement/tip/Steps-to-create-a-data-loss-prevention-policy"&gt;DLP policies&lt;/a&gt; can prevent corporate data from being saved locally to the device storage or exported to personal locations. IT admins can also restrict data transfer -- for example, the &lt;i&gt;Open in&lt;/i&gt; or &lt;i&gt;Share&lt;/i&gt; options -- to only approved or managed apps, and limit specific capabilities such as copy, paste, download or local file export. Figure 2 shows an example of these settings for an Android device with a work profile.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/Mobile_sec_best_practices_figure_2.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/Mobile_sec_best_practices_figure_2_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/Mobile_sec_best_practices_figure_2_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/Mobile_sec_best_practices_figure_2.jpg 1280w" alt="Work profile device controls." data-credit="Michael Goad" height="438" width="558"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 2. Capabilities that IT admins can limit on personally owned devices with a work profile.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Platforms such as Microsoft Intune can even &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/How-to-use-Intune-app-protection-without-MDM-enrollment"&gt;apply app protection policies to Microsoft apps&lt;/a&gt; without requiring admins to enroll devices in an MDM. For devices enrolled in an organization's MDM, the MDM is the mechanism to create and enforce these security restrictions to ensure data loss protection.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="4. Set corporate and BYOD remote lock, device wipe policies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Set corporate and BYOD remote lock, device wipe policies&lt;/h2&gt;
 &lt;p&gt;What happens if an employee loses a device or leaves the company? Every business should&amp;nbsp;develop a corporate-owned and &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/BYOD-policy-basics-Defining-and-enforcing-a-successful-policy"&gt;BYOD policy&lt;/a&gt; to handle device loss and data wipes.&lt;/p&gt;
 &lt;p&gt;Under this type of policy,&amp;nbsp;whenever a mobile device is lost or stolen, the organization can take actions to secure data, including a data wipe, reset or device lock.&lt;/p&gt;
 &lt;p&gt;This type of policy gets messy with BYOD environments; not every user likes the idea of giving IT this type of control over their devices. However, both Google and Apple have addressed this issue with capabilities in their platforms. On Apple devices, User Enrollment limits what an MDM platform can do on a personal iPhone or iPad, focusing management on the work container. For Android devices, Google's&amp;nbsp;&lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/How-to-create-a-work-profile-on-Android-devices"&gt;Android Enterprise work profile feature&lt;/a&gt; enables users to keep work and personal apps and data distinct from each other. Each profile is entirely separate; the organization manages the work apps and data, while the end user's apps, data and usage remain untouched. This restricts invasive management tasks, such as factory resets.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/what_mdm_can_see-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/what_mdm_can_see-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/what_mdm_can_see-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/what_mdm_can_see-f.png 1280w" alt="What MDM can and can't see on Apple and Android devices." data-credit="Informa TechTarget" height="297" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="5. Enable remote access management and monitoring"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. Enable remote access management and monitoring&lt;/h2&gt;
 &lt;p&gt;Remote access management lets IT troubleshoot and control devices remotely, without physical access. Monitoring uses centralized dashboards to provide real-time visibility into compliance, OS version, security status and other indicators of device posture, such as location, usage and threats.&lt;/p&gt;
 &lt;p&gt;These capabilities support enterprise security by enabling rapid incident response. IT can lock geofenced devices, quarantine threats or remotely wipe lost assets.&lt;/p&gt;
 &lt;p&gt;Implementation requires strong security measures to protect sensitive data and ensure functionality. Use secure channels with Transport Layer Security encryption, certificate authentication and MFA for admins. Cross-platform support must cover iOS, Android, Windows and macOS. Role-based access control (RBAC) limits admin access to sensitive actions, reducing the risk of accidental or unauthorized changes, such as wiping devices or locking them remotely. Security information and event management (&lt;a href="https://www.techtarget.com/searchsecurity/definition/security-information-and-event-management-SIEM"&gt;SIEM&lt;/a&gt;) systems integrate with remote access tools to monitor and log security events, detect anomalies and provide real-time alerts about potential threats. Together, these measures ensure that remote access management is secure and effective across devices.&lt;/p&gt;
 &lt;p&gt;Other best practices include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Enforce the principle of least privilege for admin access.&lt;/li&gt; 
  &lt;li&gt;Automate alerts for noncompliance or jailbreak detection.&lt;/li&gt; 
  &lt;li&gt;Be transparent about &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/What-can-organizations-do-to-address-BYOD-privacy-concerns"&gt;BYOD privacy&lt;/a&gt; and monitor only corporate data.&lt;/li&gt; 
  &lt;li&gt;Set up regular compliance reporting for audits.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="6. Keep BYOD and corporate devices updated"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;6. Keep BYOD and corporate devices updated&lt;/h2&gt;
 &lt;p&gt;Keeping devices updated isn't an easy task, but it's extremely important. Mobile devices are a growing target for malware and other attacks, and one of the best ways to fight against that is to ensure that all managed devices are fully up to date.&lt;/p&gt;
 &lt;p&gt;There are plenty of different approaches IT admins can take to keep devices updated in a timely manner. Asking users to implement updates is a simple approach, but it's not always a successful one. A better approach is to enforce controls through the MDM. For devices enrolled with an MDM platform,&amp;nbsp;an IT admin can schedule a mobile OS update&amp;nbsp;for all users -- ideally during a low-use time, such as the middle of the night. On corporate-only devices, IT can take that a step further, and the MDM can schedule, download and auto-install the updates.&lt;/p&gt;
 &lt;p&gt;With BYOD environments, it can be a bit trickier. Mobile IT admins can schedule a prompt for the user to download and install the update, but it's still up to the end user to trigger the process. However, there are mechanisms IT can put in place through MDM. One &lt;a target="_blank" href="https://learn.microsoft.com/en-us/intune/intune-service/protect/compliance-policy-create-ios" rel="noopener"&gt;mechanism&lt;/a&gt; is a compliance policy, which enables admins to create an "if this, then that" automation for devices.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Asking users to implement updates is a simple approach, but it's not always a successful one. 
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;An example of this would be a compliance policy that targets devices with a specific version of iOS. IT can create an action that would send a notification to a user to update; then, after two days, if that device hasn't updated, an admin can take steps such as quarantine or removal of corporate email and access from the device. These restrictions would remain in place until the user updates the device OS.&lt;/p&gt;
 &lt;p&gt;These compliance policies help keep corporate data safe while also encouraging end users to stay up to date. The same approach applies to Android, ChromeOS and Windows devices, with platform-specific grace periods and remediation actions defined in the organization's MDM policy.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="7. Integrate MDM with other IT and IAM systems"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;7. Integrate MDM with other IT and IAM systems&lt;/h2&gt;
 &lt;p&gt;IAM is a system that manages user identities and controls user access. It includes features like SSO and RBAC. Integrating IAM with MDM synchronizes user identity with device compliance for unified security across endpoints.&lt;/p&gt;
 &lt;p&gt;This integration can help enable conditional access, which is critical for effective MDM policy. With conditional access, only MDM-enrolled, compliant devices associated with verified user identities can access corporate email, VPN or SaaS apps. It can also help automate user provisioning and deprovisioning. New hires get compliant devices instantly, offboarded users lose access and corporate data is selectively wiped.&lt;/p&gt;
 &lt;p&gt;Implementation involves API connectors between MDM and IAM platforms. &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/Understanding-Android-certificate-management"&gt;Device certificates&lt;/a&gt; and unique identifiers establish trust, while continuous device posture feeds into IAM risk decisions.&lt;/p&gt;
 &lt;p&gt;Beyond IAM, MDM integrates with email servers, SIEM tools and endpoint detection platforms to help provide visibility and automated response across IT systems.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="8. Monitor device compliance and automate with mobile threat defense"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;8. Monitor device compliance and automate with mobile threat defense&lt;/h2&gt;
 &lt;p&gt;MDMs provide device-level security controls, but they can lack the ability to detect and prevent attacks from malicious apps, networks and phishing campaigns. To keep mobile data secure, organizations should supplement MDM with mobile threat defense (&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Mobile-Threat-Defense-MTD"&gt;MTD&lt;/a&gt;).&lt;/p&gt;
 &lt;p&gt;MTD platforms detect man-in-the-middle attacks over Wi-Fi, identify suspicious behavior on a device and proactively search for malware, harmful applications and&amp;nbsp;mobile phishing attacks. It can then remediate issues with various methods, such as killing the device's Wi-Fi or cellular connection to prevent further data leakage, or working in tandem with an MDM to quarantine a device. At a high level, an MTD platform can perform the following functions:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Monitor a device's activity to detect cyberattacks in real time.&lt;/li&gt; 
  &lt;li&gt;Monitor device applications for suspicious behavior that might leak user data to untrusted sources.&lt;/li&gt; 
  &lt;li&gt;Monitor for OS vulnerabilities and kernel exploits.&lt;/li&gt; 
  &lt;li&gt;Monitor device networking activity for man-in-the-middle, Secure Sockets Layer (SSL) stripping and SSL decryption attempts.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Together, MTD and MDM platforms provide stronger security for mobile devices and users. MTD threat signals feed MDM compliance policies, automatically marking high-risk devices as noncompliant and blocking corporate access until remediation. This provides continuous threat detection with automated policy enforcement.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="9. Keep your end users informed"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;9. Keep your end users informed&lt;/h2&gt;
 &lt;p&gt;IT admins can put as much technology as they want toward fixing a problem, but end users hold the keys to success. It is vital to train end users and keep them informed on current threats and vulnerabilities.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/Building-mobile-security-awareness-training-for-end-users"&gt;Mobile security training&lt;/a&gt; should emphasize the importance of updates, recognizing phishing attempts, using MFA and securing devices on public Wi-Fi. This empowers users to make security-conscious decisions that protect both personal and corporate data.&lt;/p&gt;
 &lt;p&gt;Helping end users understand the importance of updates -- and how they can affect corporate data -- should help them make the right decisions related to device security.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;i&gt;This article was originally written by Michael Goad and updated by Sean Michael Kerner to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Sean Michael Kerner is an IT consultant, technology enthusiast and tinkerer. He has pulled Token Ring, configured NetWare and been known to compile his own Linux kernel. He consults with industry and media organizations on technology issues.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Michael Goad is a freelance writer and solutions architect with experience handling mobility in an enterprise setting.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Organizations can't deploy mobile devices without accounting for their management complexity. IT should follow these nine best practices to manage mobile devices in the enterprise.</description>
            <image>https://cdn.ttgtmedia.com/visuals/searchWindowsServer/op_systems_microsoft_apps/windowsserver_article_011.jpg</image>
            <link>https://www.techtarget.com/searchmobilecomputing/feature/7-mobile-device-security-best-practices-for-businesses</link>
            <pubDate>Mon, 16 Mar 2026 16:03:00 GMT</pubDate>
            <title>9 mobile device management best practices for businesses</title>
        </item>
        <item>
            <body>&lt;p&gt;One of the most vital tasks for any data center is environmental monitoring and management. High temperatures and humidity levels can damage IT equipment, leading to failures. Such conditions can also create discomfort for personnel working inside the data center.&lt;/p&gt; 
&lt;p&gt;Fortunately, many systems and technologies can help monitor and manage data center cooling to maintain optimal &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Data-center-temperature-and-humidity-guidelines"&gt;temperature and humidity levels&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is data center cooling?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is data center cooling?&lt;/h2&gt;
 &lt;p&gt;Data centers consume a lot of power, which generates heat. The more equipment in a facility, the more heat it generates. Data center cooling involves the tools, systems, techniques and processes used to maintain ideal temperatures and humidity levels inside a data center.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchdatacenter/tip/How-to-calculate-data-center-cooling-requirements"&gt;Proper data center cooling&lt;/a&gt; ensures the entire facility has sufficient ventilation, humidity control and cooling to keep all equipment within the desired temperature ranges.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Why is data center cooling important?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why is data center cooling important?&lt;/h2&gt;
 &lt;p&gt;High temperatures and humidity levels are undesirable conditions for IT and electrical equipment. Most IT devices and equipment generate heat and need to get rid of it quickly to avoid performance degradation.&lt;/p&gt;
 &lt;p&gt;Facilities and equipment setups should be designed to minimize excess heat and humidity because these conditions can damage devices and equipment, causing them to malfunction or stop working. Worse, damaged equipment increases the facility's fire risk and other safety issues for on-site staff. These risks raise operational costs, as equipment must be repaired or replaced more often.&lt;/p&gt;
 &lt;p&gt;As most data centers run ASHRAE Class A1 and A2 equipment, facility managers must ensure their cooling systems are up to the task. The need to buy additional or up-to-date equipment to meet cooling requirements explains why the global cooling market will grow by nearly &lt;a href="https://www.astuteanalytica.com/industry-report/data-center-cooling-market" target="_blank" rel="noopener"&gt;14% annually&lt;/a&gt; until 2033, according to Astute Analytica.&lt;/p&gt;
 &lt;p&gt;The U.S. cooling market alone is expected to reach &lt;a href="https://www.researchandmarkets.com/reports/5311271/u-s-data-center-cooling-market-landscape-2024" target="_blank" rel="noopener"&gt;$8.24 billion&lt;/a&gt; in spending by 2029, according to Research and Markets.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How does data center cooling work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does data center cooling work?&lt;/h2&gt;
 &lt;p&gt;Data center cooling transfers heat away from equipment and the air, replacing it with cooler air. This is typically done in one of several ways:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Airflow strategies to maximize the removal of hot air and circulation of colder air, such as &lt;a href="https://www.techtarget.com/searchdatacenter/definition/hot-cold-aisle"&gt;hot and cold aisle&lt;/a&gt; design, raised-floor cool air delivery, &lt;a href="https://www.techtarget.com/whatis/definition/adiabatic-cooling"&gt;adiabatic cooling&lt;/a&gt; that uses air pressure differentials to regulate temperatures, such as &lt;a href="https://www.techtarget.com/searchdatacenter/definition/free-cooling"&gt;free cooling&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;Equipment cooling options that aim to cool directly onto hot components, such as direct-to-chip liquid cooling, immersion cooling, rear-door heat exchangers and microchannel heat exchangers.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;Cooling or heating the facility to the highest recommended temperature and replacing equipment once it fails. Using this heat-cooling, or close-coupled cooling, method can be cheaper, as it might cost significantly less than equipment replacement.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Current data center cooling systems and technologies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Current data center cooling systems and technologies&lt;/h2&gt;
 &lt;p&gt;Air and liquid cooling are two of the most popular data center cooling methods, each with several approaches.&lt;/p&gt;
 &lt;h3&gt;Air cooling&lt;/h3&gt;
 &lt;p&gt;Air cooling has been the standard for data centers since nearly the beginning. It is a well-understood technology and strategy, and when combined with other options such as raised floors and hot- and cold-aisle designs, it can be adequate for smaller facilities or those handling typical workloads.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;In a raised-floor setup, when the computer room AC (&lt;a href="https://www.techtarget.com/searchdatacenter/definition/computer-room-air-conditioning-unit"&gt;CRAC&lt;/a&gt;) unit or computer room air handler (&lt;a href="https://www.techtarget.com/searchdatacenter/definition/computer-room-air-handler-CRAH"&gt;CRAH&lt;/a&gt;) sends cold air, the pressure below the raised floor increases, forcing the cold air into the equipment inlets. The cold air displaces the hot air, which is then returned to the CRAC or CRAH, where it's cooled and recirculated.&lt;/p&gt;
 &lt;p&gt;In-row cooling units offer a more focused approach by placing them closer to the heat sources, improving cooling efficiency and response times to alerts or monitoring system changes.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;A CRAH is more efficient than a CRAC, as it draws outside air in and cools it using chilled water instead of refrigerant. A CRAC functions like a residential AC unit, using refrigerants to cool the air. CRAC units are better suited to small data center closets because they can't keep up with the demands of enterprise-level data centers.&lt;/p&gt;
 &lt;h3&gt;Hot and cold aisle layouts&lt;/h3&gt;
 &lt;p&gt;With this air-based cooling strategy, &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Avoid-common-server-racking-issues"&gt;server cabinets and racks are arranged&lt;/a&gt; in rows, with each row facing the opposite direction from the one in front. The &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Explore-hot-and-cold-aisle-containment-for-your-data-center"&gt;hot and cold air aisles increase the efficiency&lt;/a&gt; of the cooling systems by enabling more targeted placement of intake and exhaust vents. Hot air is vented from the hot aisle, and cool air is pumped through the cold aisle. This prevents hot and cold air from mixing, allowing the cooling system to work more efficiently.&lt;/p&gt;
 &lt;p&gt;Add doors, walls or partitions to the layout to further direct airflow for hot and cold aisles. &lt;a href="https://www.techtarget.com/searchdatacenter/tip/How-to-understand-advancements-in-modern-data-centers"&gt;Cabinets should be as full as possible&lt;/a&gt; to avoid the empty spaces, gaps and cable openings that can leak hot or cold air into the opposite aisle, causing the cooling system to work overtime.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/data_center_with_hot_and_cold_aisles-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/data_center_with_hot_and_cold_aisles-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/data_center_with_hot_and_cold_aisles-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/data_center_with_hot_and_cold_aisles-f.png 1280w" alt="Diagram of a data center set up for hot and cold aisle cooling." height="450" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;This diagram illustrates how hot and cold air circulates to maintain optimal temperature levels in the data center.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Liquid cooling&lt;/h3&gt;
 &lt;p&gt;Liquid cooling options are evolving as server workloads and density increase, especially with AI workloads. They are more efficient than air cooling because they transfer heat more effectively from the hottest components in the equipment. &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Liquid-and-dry-cooling-in-a-water-stressed-world"&gt;Liquid cooling&lt;/a&gt; is more cost-effective because it can be installed directly on the devices that need it the most. It can also support greater equipment densities and items that generate higher-than-average heat, such as high-density and edge-computing data centers.&lt;/p&gt;
 &lt;p&gt;There are two main types of liquid cooling:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Direct-to-chip liquid cooling.&lt;/b&gt; This method uses flexible tubes to deliver nonflammable &lt;a href="https://www.datacenterknowledge.com/data-center-chips/direct-to-chip-cooling-everything-data-center-operators-should-know"&gt;dielectric fluid directly to the processing chip&lt;/a&gt; or motherboard component that generates the most heat, such as the CPU or GPU. The fluid absorbs the heat by turning it into vapor, which carries the heat out of the equipment through the same tube.&lt;/li&gt; 
  &lt;li style="text-align: left;"&gt;&lt;b&gt;Liquid immersion cooling.&lt;/b&gt; This method &lt;a href="https://www.techtarget.com/searchdatacenter/feature/Liquid-coolings-moment-comes-courtesy-of-AI"&gt;places the entire electrical device into dielectric fluid&lt;/a&gt; in a closed system. The fluid absorbs the heat emitted by the device, turns it into vapor and condenses it, helping the device cool down.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;An additional cooling method is rear-door heat exchangers (RDHx). This method is typically combined with liquid cooling and adds a specialized door at the rear of server racks to chill the hot air expelled by the servers. At the same time, coolant transports the absorbed heat to a secondary cooling system. It can be passive RDHx, where the expelling airflow is generated by the server's internal fans, or active RDHx, where fans are added to the racks to assist in pulling exhaust air out of the racks and through the secondary cooling system.&amp;nbsp;&lt;/p&gt;
 &lt;h3&gt;Secondary cooling system equipment&lt;/h3&gt;
 &lt;p&gt;Beyond the main cooling systems and options, there are other systems and equipment needed to ensure a reliable and efficient cooling system, including:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Sensors&lt;/b&gt;. Temperature, humidity and airflow.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Monitoring applications&lt;/b&gt;. &lt;a href="https://www.techtarget.com/searchdatacenter/feature/A-close-look-at-DCIM-software-and-the-broad-vendor-options"&gt;Alerting software&lt;/a&gt; or modules that provide real-time feedback to data center operators before issues happen.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Ducting systems and other physical equipment&lt;/b&gt;. Properly maintained ducting, heat exhaust/ingestion vents, hoses, raised floors and server racks are all necessary to preserve the cooling system's integrity, efficiency and uptime.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;                   
&lt;section class="section main-article-chapter" data-menu-title="Importance of energy efficiency in data center cooling"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Importance of energy efficiency in data center cooling&lt;/h2&gt;
 &lt;p&gt;Cooling systems should be part of a data center's overall energy-efficiency strategy. As hyperscale and AI-driven workloads increase, data center facilities will face ever-increasing energy bills, reaching nearly &lt;a href="https://mitsloan.mit.edu/ideas-made-to-matter/ai-has-high-data-center-energy-costs-there-are-solutions" target="_blank" rel="noopener"&gt;21% of global energy&lt;/a&gt; demand by 2030, according to MIT Sloan School of Management.&lt;/p&gt;
 &lt;p&gt;Ensuring the facility's infrastructure, such as HVAC and power systems, is in good repair is a good first step. Next, operators can review the IT hardware they use to ensure it remains optimally functioning. Replacement and sunsetting processes can help by introducing more modern, efficient technologies as needed.&lt;/p&gt;
 &lt;p&gt;Exploring new cooling technologies is another way to manage energy efficiency. New and evolved technologies, such as free cooling and liquid cooling systems, can greatly reduce cooling needs and &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Four-ways-to-reduce-data-center-power-consumption"&gt;increase energy consumption efficiency&lt;/a&gt; across the facility.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/data_center_energy_efficiency_activities-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/data_center_energy_efficiency_activities-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/data_center_energy_efficiency_activities-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/data_center_energy_efficiency_activities-f.png 1280w" alt="Diagram of an energy-efficient data center." height="487" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Data centers are using technology such as energy-efficient HVAC systems and equipment racks with cooling systems to manage energy consumption.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Future data center cooling systems and technologies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Future data center cooling systems and technologies&lt;/h2&gt;
 &lt;p&gt;Although liquid cooling is still relatively new, other data center cooling technologies are on the horizon, such as geothermal cooling methods, smart technologies that use AI and machine learning to better monitor and manage cooling, and evaporative cooling.&lt;/p&gt;
 &lt;h3&gt;Striving for carbon-neutral data center cooling&lt;/h3&gt;
 &lt;p&gt;Here are some ways data centers can use nature to cool their facilities:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/whatis/definition/geothermal-cooling"&gt;Geothermal cooling&lt;/a&gt; uses the near-constant temperature of the Earth's crust to provide cooling. It's a centuries-old idea, once used to keep food cold, adapted to our modern era. In data centers, geothermal cooling uses a closed-loop piping system with water or another coolant that runs through underground vertical wells filled with a heat-transfer fluid. Iron Mountain's western Pennsylvania data center, Verne Global in Iceland and Green Mountain in Norway &lt;a href="https://www.techtarget.com/searchdatacenter/tip/The-pros-and-cons-of-geothermal-energy-use"&gt;use geothermal&lt;/a&gt; cooling.&lt;/li&gt; 
  &lt;li&gt;Evaporative cooling, or swamp cooling, takes advantage of the drop in temperature that occurs when water is exposed to moving air and begins to vaporize and change to a gas. A fan draws warm data center air through a water- or coolant-moistened pad, and as the liquid evaporates, the air is chilled and returned to the data center. It can cost a fraction of an air-cooled HVAC system and works best in low-humidity climates.&lt;/li&gt; 
  &lt;li&gt;Solar cooling converts heat from the sun into cooling that can be used in data center air cooling systems. The system collects solar power and uses a thermally driven cooling process to lower the building's air temperature. This is useful in areas with a lot of sunlight or for data centers looking to supplement their current cooling with a more environmentally friendly method.&lt;/li&gt; 
  &lt;li&gt;Kyoto Cooling is an enhancement of the free-cooling method that uses a thermal wheel to control airflow between hot and cold zones in the data center. Internal hot air is vented to the outside as the wheel rotates. The outside air then cools the wheel and the air that is drawn back into the facility. It uses between 75% to 92% less power to run than other CRAH systems, reduces carbon dioxide emissions and eliminates the need for water in the cooling system. The technology is used by United Airlines' data center outside Chicago and by HP's data center outside of Toronto.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Making data center cooling smarter&lt;/h3&gt;
 &lt;p&gt;Because many newer data center cooling technologies require significant investment from facility owners, smart technology has become popular. Data center smart assistants, AI and machine learning technologies can &lt;a href="https://www.techtarget.com/searchdatacenter/answer/How-can-I-build-AI-capabilities-for-the-data-center"&gt;monitor facilities more efficiently&lt;/a&gt; and make real-time adjustments to ensure optimal temperatures and humidity levels. Google, for example, uses smart temperature controls to reduce heat output and cooling usage.&lt;/p&gt;
 &lt;p&gt;Data center cooling robots can move within the facility, monitoring temperatures and humidity levels in specific server cabinets. One challenge with manually monitoring cabinet temperatures is that conditions change as soon as the cabinet is opened. Companies such as OneNeck IT Solutions have developed a robot sensor probe that fits into standard cabinets. The robot moves up and down a belt-driven rail inside the cabinet to collect temperature data for each rack. It then transmits the data using Bluetooth to connected devices so data center pros can create a full heat map of the cabinet.&lt;/p&gt;
 &lt;h3&gt;Improving heat exchange technology&lt;/h3&gt;
 &lt;p&gt;Most technology includes a heat exchange feature, and as data centers handle increasing computer workloads, this technology is improving too. Server microchannel heat exchangers are evolving to use larger channels and different fluids, enabling more efficient heat transfer. They also use less cooling refrigerant than traditional exchange options, increasing their overall performance.&lt;/p&gt;
 &lt;p&gt;Data center demand will only increase, so facility owners and their customers must look to more efficient, cost-effective cooling solutions -- whether that's less environmentally harmful options, such as geothermal and free cooling, or investing in and combining newer technologies, such as liquid immersion cooling for high-powered servers.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; This article was updated in March 2026 to reflect new statistics, data center cooling practices and to enhance the reader's experience.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Julia Borgini is a freelance technical copywriter, content marketer, content strategist and geek. She writes about B2B tech, SaaS, DevOps, the cloud and other tech topics.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Extreme heat and cold can keep equipment from operating at peak efficiency. Explore cost-efficient and cost-effective cooling technologies and smart options for your facility.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/storage_g1197646065.jpg</image>
            <link>https://www.techtarget.com/searchdatacenter/tip/Data-center-cooling-systems-and-technologies-and-how-they-work</link>
            <pubDate>Mon, 16 Mar 2026 14:45:00 GMT</pubDate>
            <title>Data center cooling systems and technologies and how they work</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;a href="https://www.gov.uk/government/organisations/companies-house" target="_blank" rel="noopener"&gt;Companies House&lt;/a&gt;, the UK’s business registrar, has successfully rebooted its online WebFiling service after it emerged that a previously-unknown cyber security issue exposed various data on companies and people associated with them to other logged-in users.&lt;/p&gt; 
&lt;p&gt;The flaw – which appears to have arisen during a WebFiling update last year – was never accessible to the general public and only logged-in users in possession of an authorised code could have exploited it, Companies House pulled WebFiling offline at lunchtime on Friday 13 March in order to investigate and remediate.&lt;/p&gt; 
&lt;p&gt;Companies House found the data exposed included dates of birth, residential addresses and company addresses. It also discovered that it may have been possible for people to make unauthorised actions – such as changing directors or even filing accounts.&lt;/p&gt; 
&lt;p&gt;It stressed that no credentials or data used for identity verification such as passport information, and neither could any existing filed documents have been altered.&lt;/p&gt; 
&lt;p&gt;Companies House chief executive Andy King said: “We are asking all companies to check their registered details and filing history to make sure everything appears correct. If a company has a concern, please&amp;nbsp;&lt;a href="https://www.gov.uk/government/organisations/companies-house/about/complaints-procedure" target="_blank" rel="noopener"&gt;raise a complaint&lt;/a&gt;&amp;nbsp;and include evidence to describe the concern.&lt;/p&gt; 
&lt;p&gt;“I recognise that this incident will have caused concern and inconvenience to many of the companies and individuals who rely on our services. I am sorry for that.&lt;/p&gt; 
&lt;p&gt;“Companies House takes its responsibility to protect the data entrusted to us extremely seriously. We have taken swift action to secure and restore our service, and are committed to doing everything in our power to support those affected and to making sure that our services continue to merit the trust placed in them,” said King.&lt;/p&gt; 
&lt;p&gt;The incident has been reported to both the Information Commissioner’s Office (ICO) and the National Cyber Security Centre (NCSC). King said that the registrar was still actively analysing its data to try to identify any anomalies. He added: “If we find evidence that anyone has used this issue to access or change another company’s details without authorisation, we will take firm action.”&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Simple vulnerability"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Simple vulnerability&lt;/h2&gt;
 &lt;p&gt;The issue was first reported to Companies House by Dan Neidle, of non-profit thinktank &lt;a href="https://taxpolicy.org.uk/" target="_blank" rel="noopener"&gt;Tax Policy Associates&lt;/a&gt;, on behalf of John Hewitt, operations director at &lt;a href="https://ghostmail.co.uk/" target="_blank" rel="noopener"&gt;Ghost Mail&lt;/a&gt;, a provider of mailing address services.&lt;/p&gt;
 &lt;p&gt;Writing online Neidle said the vulnerability was “incredibly simple” to exploit. All a logged-in user needed to do was click through the ‘file for another company’ option – which would usually prompt for an authentication code to stop unauthorised access. However, if the logged-in user hit their backspace key a few times they would be sent back not to their own dashboard, but to the ‘target’ company’s.&lt;/p&gt;
 &lt;p&gt;Neidle said that the two men were able to use the vulnerability to view the private dashboard of another individual – with permission from them – and to successfully modify his own registered address at Companies House. “I was incredulous at what John showed me,” he said.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Was the bug exploited?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Was the bug exploited?&lt;/h2&gt;
 &lt;p&gt;It is unclear if the bug was ever exploited, but in Companies House’s view it was also highly unlikely that any systematic access to company records or large-scale data exfiltration took place because any access that did occur would have been limited to individual company records, viewed one at a time, by a registered user.&lt;/p&gt;
 &lt;p&gt;Neidle noted that the flaw had been live and exploitable since October 2025, which meant there is a distinct policy that it was discovered by a threat actor. He said that if this had been the case, it was likely used “carefully, selectively and for profit” because broad exploitation would have been swiftly discovered.&lt;/p&gt;
 &lt;p&gt;William Wright, CEO of &lt;a href="https://www.cdsec.co.uk/" target="_blank" rel="noopener"&gt;Closed Door Security&lt;/a&gt;, said the ability to access and edit company details presented a huge amount of leeway for both explicit and subtle fraud, and had caused serious uncertainty around a system used by the vast majority of UK companies.&lt;/p&gt;
 &lt;p&gt;“Company directors and C-suite are already lucrative targets for phishing and fraudsters: these individuals typically have privileged access in company systems and are privy to sensitive and valuable information,” said Wright.&lt;/p&gt;
 &lt;p&gt;“Being able to acquire details like home addresses, etc. makes targeted attacks like spear phishing against these individuals far more viable and increases the potential for many other kinds of fraud and targeted harassment. This is to mention nothing of the GDPR implications were information to be exposed.”&lt;/p&gt;
 &lt;p&gt;He continued: “That companies’ registration details could also be modified presents obvious problems. Companies can be penalised in various ways for providing inaccurate information when filing, and this can lead in some instances to serious accusations of fraud. The fact details could be modified by anyone without authorisation could raise serious problems for future investigations, especially if there’s any suspicion of tampering.”&lt;/p&gt;
 &lt;p&gt;Wright added that the length of time for which the flaw went undetected also raises more serious questions for Companies House as it suggests the body tasked with providing the public with an single, transparent source of accurate information on British businesses, lacked appropriate auditing, logging or testing procedures that might have spotted it sooner, and without outside help.&lt;/p&gt;
 &lt;p&gt;“If the government and Companies House's current security testing processes were fit for purpose, flaws like this should not have occurred,” said Wright. “Given that many companies are required by law to use these services, basic testing and data protection are absolutely critical, especially if the government wants to retain its credibility with the business community.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about data breaches&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;Details of over 70 million customers of US sportswear giant Under Armour were leaked following a supposed ransomware attack &lt;a href="https://www.computerweekly.com/news/366637595/Sportswear-firm-Under-Armour-falls-victim-to-data-breach" target="_blank" rel="noopener"&gt;by the Everest gang&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Synnovis, the pathology lab services provider hit by a Qilin ransomware attack in 2024, is notifying its NHS partners that their patient data was compromised, &lt;a href="https://www.computerweekly.com/news/366634454/Synnovis-to-notify-NHS-of-data-breach-after-nearly-18-months" target="_blank" rel="noopener"&gt;following a lengthy investigation&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Many more data breaches at the MoD's Arap programme to relocate at-risk Afghan citizens to Britain have emerged &lt;a href="https://www.computerweekly.com/news/366629784/Scale-of-MoD-Afghan-data-breaches-widens-dramatically" target="_blank" rel="noopener"&gt;following an FoI request by BBC journalists.&lt;/a&gt;&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Companies House was forced to pull its WebFiling service offline at the weekend after it emerged that a flawed update was putting data at risk of exposure.</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/Data-breach-hacker-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366640295/Companies-House-restarts-online-services-following-cyber-breach</link>
            <pubDate>Mon, 16 Mar 2026 14:35:00 GMT</pubDate>
            <title>Companies House restarts online services following cyber breach</title>
        </item>
        <item>
            <body>&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h2&gt;Executive Summary&lt;/h2&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;b&gt;Financial disruptions become operational crises fast.&lt;/b&gt; The SVB collapse showed how quickly payroll systems, payment platforms and vendor integrations can stall when banking access is cut off.&lt;/li&gt; 
   &lt;li&gt;&lt;b&gt;Technology leaders now play a role in financial resilience.&lt;/b&gt; CIOs must help map financial dependencies, monitor risk signals and ensure systems that move money remain operational.&lt;/li&gt; 
   &lt;li&gt;&lt;b&gt;Resilience requires redundancy and visibility.&lt;/b&gt; Diversified banking relationships, real time financial data and crisis simulations help prevent single points of failure.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;On March 10, 2023, &lt;a href="https://www.techtarget.com/whatis/feature/Silicon-Valley-Bank-collapse-explained-What-you-need-to-know"&gt;Silicon Valley Bank collapsed&lt;/a&gt; after depositors withdrew $42 billion in a single day. At the time of the collapse, the bank held $209 billion in assets and ranked as the 16th-largest in the U.S. It failed not because its portfolio was worthless, but because rising interest rates had eroded the market value of its long-duration bond holdings, and its venture-capital-heavy deposit base moved faster than management could respond.&lt;/p&gt; 
&lt;p&gt;U.S. regulators moved quickly to contain the fallout. On March 12, 2023, the Treasury Department, the Federal Reserve and the FDIC invoked the systemic risk exception, guaranteeing all SVB deposits beyond the $250,000 FDIC limit. The Federal Reserve simultaneously launched the Bank Term Funding Program to shore up liquidity at other institutions and prevent wider contagion. The intervention ultimately stabilized the system, but it was not guaranteed to do so. In the critical window after the bank's failure, many companies that relied on SVB for payroll and operational liquidity temporarily lost access to their funds.&lt;/p&gt; 
&lt;p&gt;"What made the failure exceptional was velocity," Rishabh Shah, chief technology and innovation officer for financial services at Capgemini, said. "Once concerns circulated among interconnected depositors, billions in withdrawal requests arrived within hours, outpacing any manual intervention or escalation process the bank had in place."&lt;/p&gt; 
&lt;p&gt;Three years after the SVB bank failure, the concentration risks, liquidity gaps and contingency planning failures SVB exposed remain largely unaddressed.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Lessons learned by businesses"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Lessons learned by businesses&lt;/h2&gt;
 &lt;p&gt;The SVB collapse produced clear lessons about cash management, banking concentration and crisis preparedness. Three years on, most businesses have yet to act on them.&lt;b&gt;&lt;br&gt;&lt;br&gt;&lt;/b&gt;The FDIC limit is a real constraint&lt;/p&gt;
 &lt;p&gt;According to Ampersand's 2025 &lt;a href="https://trustampersand.com/the-ampersand-2025-cfo-cash-confidence-report/" target="_blank" rel="noopener"&gt;Cash Confidence Survey&lt;/a&gt;, 86% of corporate financial decision-makers carry more than $250,000 at a single bank. The same survey found that companies could operate for an average of less than three months if their primary bank failed.&lt;/p&gt;
 &lt;p&gt;"The lesson of 2023 was not that banks can fail. We already knew that," CEO of Ampersand Kelly Brown said. "The real lesson is whether businesses are finally willing to treat cash as king and protect it accordingly."&lt;/p&gt;
 &lt;p&gt;Despite knowing the FDIC limit, most businesses have not restructured their deposits accordingly. Brown said deposit management remains an afterthought for most companies, crowded out by growth and operational priorities.&lt;/p&gt;
 &lt;h3&gt;Concentration risk extends beyond capital&lt;/h3&gt;
 &lt;p&gt;Most organizations assume multiple vendor relationships mean diversification. Manish Jain, principal research director at Info-Tech Research, said SVB proved otherwise.&lt;/p&gt;
 &lt;p&gt;"Most companies still think they have many partners, but when trouble arrives, they discover they've really been banking on just one," Jain said. He drew a direct parallel to cloud infrastructure, noting that organizations with &lt;a href="https://www.techtarget.com/searchcio/feature/AWS-cloud-outage-reveals-vendor-concentration-risk"&gt;single cloud providers had seen the same pattern&lt;/a&gt; when AWS, Microsoft or &lt;a href="https://www.techtarget.com/whatis/feature/Explaining-the-largest-IT-outage-in-history-and-whats-next"&gt;CrowdStrike went down&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;Bank monitoring must be continuous&lt;/h3&gt;
 &lt;p&gt;SVB's problems were visible in its balance sheet well before the run began. Shah said periodic board reviews and quarterly stress tests are designed for a slower-moving system and are insufficient when liquidity can drain in a single business day. Effective banking risk management now requires ongoing monitoring of counterparty health, deposit concentration and interest rate exposure.&lt;/p&gt;
 &lt;h3&gt;Digital-age bank runs outpace traditional playbooks&lt;/h3&gt;
 &lt;p&gt;The speed of SVB's collapse was unlike anything the banking industry had seen. Businesses that lacked pre-established backup banking relationships and clear fund transfer protocols discovered those gaps within hours of the collapse.&lt;/p&gt;
 &lt;p&gt;"The SVB crisis was the fastest run on a bank, amplified by digital infrastructure and social networks," Jain said.&lt;/p&gt;
&lt;/section&gt;             
&lt;section class="section main-article-chapter" data-menu-title="Exposures that make businesses susceptible to losses"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Exposures that make businesses susceptible to losses&lt;/h2&gt;
 &lt;p&gt;The SVB collapse surfaced vulnerabilities that remain common across businesses today. Four stand out.&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Uninsured deposits risk. &lt;/b&gt;The $250,000 FDIC limit applies per depositor, per institution, per account ownership category. "Many businesses still keep large deposits at a single institution, often well above FDIC insurance limits," Brown said.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Insufficient contingency planning.&lt;/b&gt; Most businesses run technology disaster recovery simulations, but few run the equivalent for a banking failure scenario.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;VC over-dependence&lt;/b&gt;. Businesses with both operating accounts and VC relationships at SVB had no fallback when access to their accounts was cut off. Without alternative revenue streams or liquidity buffers, exposure was total.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Banking concentration risk&lt;/b&gt;. Specialized banks offer attractive services but can lack the diversification of larger institutions. Jain said the SVB episode showed how dangerously concentrated operational dependencies can become, whether the dependency is a bank, a payment rail or a cloud platform.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;"When SVB failed, companies realized within hours that a financial issue could quickly become an operational one," Melanie Quandt, senior director of trust and safety at Highspring, said.&lt;/p&gt;
 &lt;p&gt;Quandt added that recent stress in private credit markets and rapid capital flows into AI infrastructure echo conditions that preceded SVB's failure, a reminder that financial cycles can shift fast.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="The role of CIOs and IT leaders in financial resilience"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The role of CIOs and IT leaders in financial resilience&lt;/h2&gt;
 &lt;p&gt;Financial resilience is no longer purely a finance function. CIOs have a direct role, both in keeping systems operational during a crisis and in spotting risk before it becomes one.&lt;/p&gt;
 &lt;h3&gt;Operational continuity is the CIO's mandate in a crisis&lt;/h3&gt;
 &lt;p&gt;While the SVB incident was a financial one, it also affected CIOs.&lt;br&gt;&lt;br&gt;"The CFO manages capital and liquidity strategy, but the CIO ensures the digital infrastructure that moves money, such as payroll systems, payment platforms, vendor integrations and cloud environments, remains stable and accessible," Quandt said.&lt;br&gt;&lt;br&gt;Jain went a step further, emphasizing the critical nature of the situation for a CIO.&lt;/p&gt;
 &lt;p&gt;"When the money stops moving, the systems stop breathing, and that's when CIOs, like their executive peers, must become the emergency room doctors for the business," Jain said.&lt;/p&gt;
 &lt;h3&gt;Technology is a core tool for financial risk management&lt;/h3&gt;
 &lt;p&gt;Organizations that cannot see their financial data in real time cannot respond to risk in real time. That gap is precisely what made SVB's failure so damaging to its depositors.&lt;/p&gt;
 &lt;p&gt;"In most organizations, data is still trapped in silos, processed in batch cycles, and often requires significant manual enrichment. Information moves faster outside an enterprise than within it," Shah said.&lt;/p&gt;
 &lt;h3&gt;Cybersecurity risk spikes during financial crises&lt;/h3&gt;
 &lt;p&gt;Both Quandt and Jain noted that financial disruptions trigger increases in phishing, payment fraud and account takeover attacks. Brown specifically pointed to &lt;a href="https://www.techtarget.com/searchsecurity/feature/AI-powered-attacks-What-CISOSs-need-to-know-now"&gt;AI-driven fraud&lt;/a&gt;, including deepfakes used to attempt payment fraud or to &lt;a href="https://www.techtarget.com/searchcio/tip/How-executives-can-counter-AI-impersonation"&gt;impersonate executives&lt;/a&gt;. The systems that move money become a target precisely when organizations are most distracted.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Actionable strategies to mitigate financial exposures"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Actionable strategies to mitigate financial exposures&lt;/h2&gt;
 &lt;p&gt;Three years of inaction have a cost. CIOs who move now on financial resilience have a clear playbook to follow.&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Map how money moves&lt;/b&gt;. Treat financial dependencies like technology architecture -- inventory every banking relationship, payment rail, payroll system and vendor integration before a crisis forces the audit. "If you don't know how and where your money flows, you're just hoping it flows somehow," Jain said. He also recommended running financial crisis simulations alongside standard disaster recovery tests.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Build redundancy into the financial stack.&lt;/b&gt; Visibility into dependencies is step one. Eliminating single points of failure is step two. Quandt said resilience then becomes a design decision: diversify banking relationships, strengthen identity and access controls and implement monitoring across financial workflows.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Apply rigorous treasury management strategies&lt;/b&gt;. A single banking relationship, no matter how established, is not a treasury strategy. "You can't just trust a big name. You need multiple backup providers, regular stress tests and alternative liquidity sources," said Jerry Shu, co-founder and CTO of Daylit. He also recommended building a peer network to compare real-world performance, since financial tools rarely deliver in practice what they promise in sales conversations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Prepare a financial crisis playbook. &lt;/b&gt;Define communication protocols for financial emergencies, establish clear decision-making authority when fund access is interrupted and ensure rapid fund transfer capabilities can be executed in hours. Brown said CIOs should also participate in leadership-level reviews of cyber and crime insurance coverage.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Verify FDIC coverage.&lt;/b&gt; Most businesses assume their deposits are covered. The details matter more than the assumption. Confirm limits across all corporate accounts by institution and account category. Excess FDIC insurance products and reciprocal deposit arrangements are available for businesses that need coverage beyond $250,000. The FDIC's &lt;a href="https://www.fdic.gov/resources/resolutions/bank-failures/" target="_blank" rel="noopener"&gt;Business and Industry resources&lt;/a&gt; and the Financial Stability Oversight Council's &lt;a href="https://home.treasury.gov/policy-issues/financial-markets-financial-institutions-and-fiscal-service/fsoc/studies-and-reports" target="_blank" rel="noopener"&gt;annual reports&lt;/a&gt; offer additional guidance on bank failure protection and business deposit protection.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Conduct regular risk assessments.&lt;/b&gt; Point-in-time reviews are not adequate for risks that can materialize in hours. Shah argued that automated monitoring is the foundation -- continuous evaluation of deposit concentration, liquidity coverage ratios and duration mismatch removes reliance on periodic assessments. Structured human reviews remain necessary to ensure leadership acts on what systems detect.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Build a culture of financial awareness&lt;/b&gt;. Financial risk cannot be managed only within finance."Organizations that treat resilience as an ongoing governance practice rather than a reaction to crisis tend to navigate economic cycles much more effectively," Quandt said.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;i&gt;This article is not financial advice. Readers should consult qualified financial and legal advisors for guidance specific to their organization.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Sean Michael Kerner is an IT consultant, technology enthusiast and tinkerer. He has pulled Token Ring, configured NetWare and been known to compile his own Linux kernel. He consults with industry and media organizations on technology issues.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The Silicon Valley Bank collapse revealed financial and operational risks for businesses. Three years later, CIOs still play a critical role in strengthening resilience.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/money_g522019766.jpg</image>
            <link>https://www.techtarget.com/searchcio/feature/Silicon-Valley-Bank-collapse-Lessons-three-years-later</link>
            <pubDate>Mon, 16 Mar 2026 14:26:00 GMT</pubDate>
            <title>Silicon Valley Bank collapse: Lessons three years later</title>
        </item>
        <item>
            <body>&lt;p&gt;While the goal of every team is to keep possession, they often must hold the line, defend the goal and mount a comeback to win the game.&lt;/p&gt; 
&lt;p&gt;This is as true in cybersecurity as it is in sports.&lt;/p&gt; 
&lt;p&gt;Take high-profile events such as the Olympics or World Cup, for example. History has shown that these events, which draw billions of viewers, are ripe targets for the offense: cyberattackers.&lt;/p&gt; 
&lt;p&gt;Past events have been marred by &lt;a href="https://www.techtarget.com/searchsecurity/feature/How-to-avoid-phishing-hooks-A-checklist-for-your-end-users"&gt;phishing attacks&lt;/a&gt;, malware-ridden apps, fake social media accounts and spoofed domains, as well as DDoS attacks, hacktivism, state-sponsored attacks and infrastructure disruptions. The opening ceremony of the PyeongChang 2018 Olympics, for example, was notably &lt;a target="_blank" href="https://www.darkreading.com/cyberattacks-data-breaches/cyberattack-aimed-to-disrupt-opening-of-winter-olympics" rel="noopener"&gt;disrupted&lt;/a&gt; by the Olympic Destroyer malware, which targeted Wi-Fi networks, ticketing systems and broadcasting infrastructure. The Milano Cortina 2026 Olympics were no exception. Italy confirmed it blocked a series of cyberattacks targeting its foreign ministry offices, Olympics websites and hotels in the Cortina d'Ampezzo area days before the games opened.&lt;/p&gt; 
&lt;p&gt;Yet history has also shown that defense wins championships -- a defense built by training consistently, keeping strategies sharp and warming up before the big event. In cybersecurity, this means preparing for when, not if, a cyberattack will occur -- i.e., having effective &lt;a href="https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-and-why-is-it-important"&gt;risk management&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchsecurity/definition/incident-response"&gt;incident response&lt;/a&gt; programs in place.&lt;/p&gt; 
&lt;p&gt;In this Reporters' Notebook video, Tara Seals, managing editor of news at Dark Reading, David Jones, reporter at Cybersecurity Dive, and Sharon Shea, executive editor of TechTarget SearchSecurity, discussed the prevalence of cyberattacks on global events and how the challenges these events face are the same as those of everyday organizations.&lt;/p&gt; 
&lt;p&gt;Watch now for insights on Dark Reading's and Cybersecurity Dive's coverage of global event cybersecurity, as well as the risk management and incident response lessons CISOs from organizations of all shapes and sizes can learn from such attacks, from &lt;a href="https://www.techtarget.com/searchsecurity/feature/5-critical-steps-to-creating-an-effective-incident-response-plan"&gt;preparing an incident response plan&lt;/a&gt; to &lt;a href="https://www.techtarget.com/searchsecurity/tip/Phases-of-the-third-party-risk-management-lifecycle"&gt;managing third-party risks&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;And remember, as nine-time Olympic swimmer Mark Spitz said, "If you fail to prepare, you're prepared to fail."&lt;/p&gt; 
&lt;p&gt;For more coverage on cyberattacks on large events:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;a target="_blank" href="https://www.darkreading.com/remote-workforce/winter-olympics-podium-cyberattackers" rel="noopener"&gt;Cyber threats loom over 2026 Winter Olympics&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a target="_blank" href="https://www.darkreading.com/cybersecurity-operations/crowds-drones-world-cup-cyber-challenges" rel="noopener"&gt;2026 FIFA World Cup poses significant cyber challenges&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a target="_blank" href="https://www.darkreading.com/cyberattacks-data-breaches/trial-ddos-attacks-on-french-sites-portend-greater-olympics-threats" rel="noopener"&gt;'Trial' DDoS attacks on French sites portend greater Olympics threats&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a target="_blank" href="https://www.darkreading.com/threat-intelligence/russia-cyber-operations-summer-olympics" rel="noopener"&gt;Russia aims cyber operations at Summer Olympics&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a target="_blank" href="https://www.darkreading.com/vulnerabilities-threats/paris-olympics-cybersecurity-at-risk-via-attack-surface-gaps" rel="noopener"&gt;Paris Olympics cybersecurity at risk via attack surface gaps&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a target="_blank" href="https://www.cybersecuritydive.com/news/cisa-secure-our-world-super-bowl/707119/" rel="noopener"&gt;CISA blitzes Super Bowl with cyber campaign as businesses fumble security&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;For more on risk management and incident response best practices:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/feature/5-critical-steps-to-creating-an-effective-incident-response-plan"&gt;How to build an incident response plan, with examples, template&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Incident-response-How-to-implement-a-communication-plan"&gt;Incident response: How to create a communication plan, with template&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-conduct-incident-response-tabletop-exercises"&gt;Incident response tabletop exercises: Guide and template&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Counter-third-party-risk-with-continuous-vendor-monitoring"&gt;Counter third-party risk with continuous vendor monitoring&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-build-an-effective-third-party-risk-assessment-framework"&gt;How to build an effective third-party risk assessment framework&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-create-a-third-party-risk-management-policy"&gt;How to create a third-party risk management policy&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;em&gt;Sharon Shea is executive editor of TechTarget Security.&lt;/em&gt;&lt;/p&gt; 
&lt;transcript&gt; 
 &lt;p&gt;&lt;strong&gt;Editor's note:&lt;/strong&gt;&lt;em&gt; The following transcript has been lightly edited for length and clarity.&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;strong&gt;Dark&lt;/strong&gt;&lt;b&gt; Reading's Tara Seals:&lt;/b&gt; Hello, everybody. Thank you for joining us for the latest installment of Reporters' Notebook, featuring editors and reporters from Cybersecurity Dive, TechTarget SearchSecurity and Dark Reading. I'm Tara Seals, managing editor for news at Dark Reading. I am joined here by:&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;TechTarget SearchSecurity's Sharon Shea:&lt;/b&gt; I'm Sharon Shea, executive editor at TechTarget SearchSecurity.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Cybersecurity Dive's David Jones:&lt;/b&gt; David Jones, reporter at Cybersecurity Dive.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Seals:&lt;/b&gt; Great, thanks for joining. The Winter Olympics just concluded in Milan and Cortina, and now we're looking ahead to the World Cup this summer in North America. These high-profile events draw billions of viewers worldwide, lots of visitors and involve many moving parts to make them happen. That makes them an attractive target for cyberattacks, and there's a history of attacks on these events over the years.&lt;/p&gt; 
 &lt;p&gt;In Milan, for instance, this time, the Italian government said they thwarted some attacks, though they didn't detail them publicly.&lt;/p&gt; 
 &lt;p&gt;While it might seem like these events have little in common with everyday businesses, I think there are valuable incident response lessons to be learned.&lt;/p&gt; 
 &lt;p&gt;Dave, I know you've done a lot of reporting on some of the risks around these big events. That might be a good place to start.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Jones:&lt;/b&gt; Thanks, Tara. There are a couple of issues at play here, given the current global climate, including the conflict in Iran and challenges with key adversaries overseas. Events like these require careful consideration of the venue and coordination with allies to prepare and respond to potential incidents.&lt;/p&gt; 
 &lt;p&gt;These events involve a wide range of potential disruptions, from physical security to digital security. You want attendees, including diplomats, celebrities and political leaders, to feel safe and welcome without turning the event into a stifling police operation.&lt;/p&gt; 
 &lt;p&gt;One major attraction for attackers is the ability to make a broad statement to millions of people through disruptions, such as interrupting broadcasts or delaying live coverage. We've seen attempts at this during previous Olympic Games. Ensuring these events proceed without visible disruptions is a significant undertaking.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Seals:&lt;/b&gt; The Pyeongchang 2018 Winter Olympics is a prime example of disruption. The Olympic Destroyer malware caused issues during the Opening Ceremony, including taking down Wi-Fi networks, ticketing systems and contributing to flickering broadcast infrastructure. While the attackers didn't achieve their full intent, the incident highlighted the importance of planning and incident response.&lt;/p&gt; 
 &lt;p&gt;Similarly, during the London Olympics, the UK thwarted an attack on the power grid. While nothing happened publicly, behind the scenes it was a frenzied incident response situation. These examples show how common these challenges are for large-scale events.&lt;/p&gt; 
 &lt;p&gt;Dave, in your reporting on World Cup threats, what are some commonalities between these events and everyday businesses?&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Jones:&lt;/b&gt; Major businesses often sponsor global events, send senior executives to attend or have critical proprietary or customer data at risk during these events. These executives, who have access to sensitive data, may be targeted personally, whether through tracking, compromised devices or identity theft.&lt;/p&gt; 
 &lt;p&gt;Attackers could use stolen identities to send messages in their names, potentially gaining access to the company's systems. Protecting these individuals and preserving the company's reputation is crucial.&lt;/p&gt; 
 &lt;p&gt;This isn't just relevant for sporting events but also for large company meetings, business conferences and multinational events. Companies need to ensure their security measures are robust to protect their people, data, and brand image.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Seals:&lt;/b&gt; Absolutely. If you distill the threats seen at events like the Olympics, World Cups and other big events like the Super Bowl, they're the same as those faced by everyday businesses -- just on a larger scale. Phishing, DDoS, hacktivism, infrastructure disruption, malware, data exfiltration, spyware implantation and more.&lt;/p&gt; 
 &lt;p&gt;These global events provide a unique opportunity to see how incident response should be architected. The threats are the same, but the scale is larger. Sharon, can you talk about some incident response best practices we can learn from these events?&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Shea:&lt;/b&gt; Absolutely, Tara. These events act as real-world stress tests for incident response. While we may not know everything that happens behind the scenes, it's clear they involve well-oiled machines monitoring, detecting, containing and recovering from attacks.&lt;/p&gt; 
 &lt;p&gt;On SearchSecurity, we've published extensive content on layered defense, cyber resilience and incident response. Preparation is key. Organizations need a well-vetted, regularly tested and updated incident response plan to mitigate financial, operational and reputational damage.&lt;/p&gt; 
 &lt;p&gt;First, create an incident-response plan outlining high-level priorities. Incident response is a team effort, involving responders, forensic analysts, security analysts, PR, legal and external law enforcement, as needed.&lt;/p&gt; 
 &lt;p&gt;You also need playbooks with actionable steps to respond to specific threats like DDoS, ransomware and credential harvesting. And, of course, practice is essential: test playbooks through simulations, tabletop exercises, and red/blue team drills to see how the team reacts under pressure.&lt;/p&gt; 
 &lt;p&gt;Practice, practice, practice. You need to test those playbooks, conduct simulations, tabletop exercises, red team, blue team drills. It's crucial to see how the team reacts under pressure. The first time an incident happens should not be the first time your incident-response team sees the incident-response plan or playbook.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Jones:&lt;/b&gt; Unless you're Allen Iverson, who never liked to practice, but that's another story.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Shea:&lt;/b&gt; I also wanted to touch on something Dave said earlier. These big world events highlight a reality we're seeing in organizations today: the third-party ecosystem.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Seals:&lt;/b&gt; Right.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Shea:&lt;/b&gt; Events like the Olympics involve ticketing agencies, streaming services, vendors, sponsors -- a massive network with a huge attack surface. One weak link in the chain can lead to significant consequences. This mirrors organizations working with partners, suppliers, service providers and other third parties. Vetting who you work with and continuously monitoring vendors is essential for maintaining a secure partner and supply chain ecosystem.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Seals:&lt;/b&gt; Absolutely.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Shea:&lt;/b&gt; Another critical point is communication. When the world is watching, how quickly and effectively you communicate during an incident matters as much as how quickly you remediate the issue. Internal and external communications are key.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Seals:&lt;/b&gt; Agreed.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Shea:&lt;/b&gt; You need a crisis or incident-response management communication plan. You want your employees, partners, the media, customers, regulators to have consistent, clear, accurate and rapid messaging. That helps maintain trust, minimize chaos and ensure coordinated incident response can happen. Fixing the issue is important, but so is ensuring the communication is handled effectively.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Seals:&lt;/b&gt; Events like the Olympics, World Cup or Super Bowl are meticulously planned over years, with incident response plans tested and refined constantly. Yet, even they face challenges from attackers exploiting cracks in the armor.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Jones:&lt;/b&gt; This underscores the importance of alliances and coordination between partners. Managing security -- both physical and digital -- for such events requires strong relationships across jurisdictions and countries.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Shea:&lt;/b&gt; Don't be the weakest link.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Jones:&lt;/b&gt; For example, CISA, the State Department, other agencies participated in preparing for the Olympics, and you need to know the role of your particular agency or your diplomatic corps or your security team in the plan, in the event of an attack if the lights go out, if the ticketing stops working. Everybody's going to have to spring into action at some level of coordination.&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Seals:&lt;/b&gt; Absolutely. Yeah, 100%. All right, guys. Well, I think we can leave it there. I really appreciate your time. And for our viewers, once again, I'm Tara Seals with Dark Reading. I have been joined by Sharon Shea from TechTarget SearchSecurity and Dave Jones at Cybersecurity Dive. Thank you for watching.&lt;/p&gt; 
&lt;/transcript&gt;</body>
            <description>Cybersecurity lessons from global sports events show that preparation, defense and quick recovery are essential to besting adversaries.</description>
            <link>https://www.techtarget.com/searchsecurity/video/Lessons-in-incident-response-from-the-Olympics-World-Cup</link>
            <pubDate>Mon, 16 Mar 2026 13:18:00 GMT</pubDate>
            <title>Lessons in incident response from the Olympics, World Cup</title>
        </item>
        <item>
            <body>&lt;p&gt;In July 2024, we listened to the &lt;a href="https://www.computerweekly.com/news/366596014/Labour-government-plans-new-laws-around-cyber-security-data-sharing-and-skills"&gt;Labour government’s first King’s Speech&lt;/a&gt;. It contained a single line almost imperceptibly nodding towards something on artificial intelligence (AI). The government said it would “seek to establish the appropriate legislation to place requirements on those working to develop the most powerful artificial intelligence models”.&lt;/p&gt; 
&lt;p&gt;Some 20 months later - no bill, no consultation and very little comment.&lt;/p&gt; 
&lt;p&gt;It was said &lt;a href="https://www.computerweekly.com/opinion/AI-legislation-in-the-UK-has-anybody-seen-any"&gt;there would be a draft bill ready to go at the end of 2024&lt;/a&gt;. Nothing appeared. A consultation heralded late last Autumn -still, this Spring, nothing. I suppose there is some consistency in this approach, but it is less defined by diving into the detail and more about mind the gap.&lt;/p&gt; 
&lt;p&gt;As we lurch towards the end of this Parliamentary session it is abundantly clear – there is still no AI Bill.&lt;/p&gt; 
&lt;p&gt;The next King’s Speech is likely to be in early May. Two months to go and, somewhat surprisingly, it seems this too will contain nothing on a specific AI bill.&lt;/p&gt; 
&lt;p&gt;I say “surprising” as the government may well wish to continue with its “wait and see” approach to AI legislation but, this comes at the same time as government is racking up an increasing number of significant issues that it wants to address in relation to AI. All of which, by its own admission, will require primary legislation.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Urgent need"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Urgent need&lt;/h2&gt;
 &lt;p&gt;It is for these reasons that I published recently a &lt;a href="https://lordchrisholmes.com/the-urgent-need-for-uk-ai-legislation-now/"&gt;Parliamentary One-Pager&lt;/a&gt; (POP) on the matter. In short, stating the urgent need for cross-sector, cross-economy AI legislation and subsequent regulation in the UK.&lt;/p&gt;
 &lt;p&gt;I didn’t want to lay out a voluminous report, just a straightforward one-pager making one single point - the time for talk is well past, the UK government must decide its position, its vision for AI in the UK and bring forward the necessary legislation.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Effective governance isn’t a brake pedal - it’s how boards give companies strategic direction
   &lt;/figure&gt;
   &lt;figcaption&gt;
    &lt;strong&gt;Erin Young, Institute of Directors &lt;/strong&gt;
   &lt;/figcaption&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;The government seems caught on the horns of that tediously recurring false dichotomy that you can only have either innovation or regulation, which is utter nonsense as all history shows. For example, the &lt;a href="https://www.computerweekly.com/news/366625852/UK-finance-regulator-tie-up-with-NVIDIA-allows-firms-to-experiment-with-AI"&gt;fintech regulatory sandbox&lt;/a&gt;, to cite just one illustration. Measure of success? Well, replicated in just under a hundred jurisdictions around the world.&lt;/p&gt;
 &lt;p&gt;So, having &lt;a href="https://www.computerweekly.com/opinion/Our-data-our-decisions-our-AI-future-why-we-need-an-AI-Regulation-Bill"&gt;agile, adaptive legislation and right-sized regulation&lt;/a&gt; is good for innovation and investment, good for the citizen, the creative, the consumer, effectively good for our country.&lt;/p&gt;
 &lt;p&gt;And the public are with the POP on this matter. Recent research from the Ada Lovelace Institute found the current government approach is “increasingly out of step with public attitudes”.&lt;/p&gt;
 &lt;p&gt;Add to this, even if we take the government at its word, it indicated that targeted primary legislation is required for, among other areas: frontier AI; IP and copyrighted works; the &lt;a href="https://www.computerweekly.com/news/366633176/Government-to-launch-AI-sandbox-scheme"&gt;AI Growth Lab&lt;/a&gt;; and AI chatbots.&lt;/p&gt;
 &lt;p&gt;So according to the government, there will be no cross-sector legislation and no domain-specific legislation, but legislation is needed.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="Whack-a-mole"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Whack-a-mole&lt;/h2&gt;
 &lt;p&gt;When I launched the POP, Gaia Marcus, director at the Ada Lovelace Institute, warned that wait-and-see inevitably becomes whack-a-mole.&lt;/p&gt;
 &lt;p&gt;Putting the positive business case, Erin Young from the Institute of Directors reframed the conversation, pointing out that “effective governance isn’t a brake pedal, it’s how boards give companies strategic direction.”&lt;/p&gt;
 &lt;p&gt;And for the people, all of us, Hannah Perry of think-tank Demos made a compelling case that AI could be part of a new social contract between state and citizen, but only if we break out of the “democratic doom loop” with concrete protections like a declaration of digital rights.&lt;/p&gt;
 &lt;p&gt;It is more than clear that the current approach has resulted in fragmentation and uneven application. Multiple regulators, domain‑specific but not AI‑expert or experienced, and in certain sectors no regulator at all.&lt;/p&gt;
 &lt;p&gt;The day after my POP was launched, the Joint Committee on Human Rights heard from three such regulators - the Equality and Human Rights Commission (EHRC), the Information Commissioner’s Office and Ofcom - about the fast-growing impact of AI on people’s rights.&lt;/p&gt;
 &lt;p&gt;Each regulator emphasised that while they already oversee important aspects of AI - such as equality, privacy, and online safety - the pace of technological change is outstripping the speed of traditional regulation. They also highlighted serious concerns ranging from biased algorithms to gaps in oversight, especially where AI is deployed in sensitive areas like policing, welfare, and social media.&lt;/p&gt;
 &lt;p&gt;A recurring theme was capacity. Regulators face resource constraints, most starkly the EHRC, which has operated on a frozen budget for over a decade, while trying to keep up with increasingly complex technologies.&lt;/p&gt;
 &lt;p&gt;Again, the public seem to get it quicker than the government - &lt;a href="https://www.computerweekly.com/news/366621653/UK-public-expresses-strong-support-for-AI-regulation"&gt;89% of those polled on the point by the Ada Lovelace Institute&lt;/a&gt; support an independent regulator. Interestingly, it is one of the key provisions of my AI [Regulation] private member’s bill.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="Economic imperative"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Economic imperative&lt;/h2&gt;
 &lt;p&gt;The point should be clear, not least to government, that a wait-and-see, voluntary, partial, domain-specific approach can no longer be accepted. It fails to enable, empower, and optimise the UK AI opportunity.&lt;/p&gt;
 &lt;p&gt;More importantly, it is not what the public want. There is an economic, a social, and a psychological imperative to act. We need a cross-cutting, principles-based, and outcomes-focused AI Bill. It’s time to legislate, together, on AI. It’s time to human lead. Our data, our decisions, our AI futures.&lt;/p&gt;
 &lt;p&gt;From a UK perspective - economic, social, psychological - the case is clear, we legislate or we lose. The government brings forward a bill, or the benefits fail to be brought forth. “Wait and see” is not a strategy. It is the perspective of the spectator, not the player. To govern is to choose.&lt;/p&gt;
 &lt;p&gt;The government must choose cross-sector AI legislation and the subsequent right-sized regulation. They must choose to put this at the heart of the next King’s Speech. May will otherwise be a more than unfortunate continuation of “may not”.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about tech legislation&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/opinion/Will-there-be-a-technology-policy-epiphany-in-2026"&gt;Will there be a technology policy epiphany in 2026?&lt;/a&gt; The UK government faces many complex technology policy decisions in the year ahead, which could reshape the country for a digital, AI-led future.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366635624/UK-government-pledges-to-rewrite-Computer-Misuse-Act"&gt;UK government pledges to rewrite Computer Misuse Act&lt;/a&gt; - Campaigners celebrate as security minister Dan Jarvis commits to amending the outdated Computer Misuse Act to protect security professionals from prosecution.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/opinion/Balancing-regulation-and-innovation-to-ensure-the-UK-remains-a-global-leader-in-AI"&gt;Balancing regulation and innovation to ensure the UK remains a global leader in AI&lt;/a&gt; - The EU has taken a lead in regulating artificial intelligence through its AI Act - the UK government needs to respond or it risks losing the UK's status as an AI innovation frontrunner.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Despite past promises of regulation on AI, there is no indication the Labour government is planning any legislation in the next session of Parliament - and that's an economic and social mistake</description>
            <image>https://cdn.ttgtmedia.com/visuals/Hero-Regulation-Sandwish-01.jpg</image>
            <link>https://www.computerweekly.com/opinion/The-upcoming-Kings-Speech-where-are-the-words-on-AI</link>
            <pubDate>Mon, 16 Mar 2026 12:57:00 GMT</pubDate>
            <title>The upcoming King’s Speech - where are the words on AI?</title>
        </item>
        <item>
            <body>&lt;p&gt;As with many technologies, AI and cybersecurity are becoming increasingly intertwined. An organization can expect AI to support the cybersecurity mission in multiple ways, including reducing overall risk, boosting efficiency and making security more cost-effective.&lt;/p&gt; 
&lt;p&gt;What's not easy to determine is the ROI of AI cybersecurity investments.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Measuring AI's ROI: Metrics matter"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Measuring AI's ROI: Metrics matter&lt;/h2&gt;
 &lt;p&gt;When it comes to AI investments in cybersecurity, the ROI conversation must begin with the right metrics. Not all value shows up on a balance sheet, so security leaders need to think across three distinct categories: efficiency gains, risk reduction and cost avoidance.&lt;/p&gt;
 &lt;p&gt;Efficiency gains are often the most immediate and measurable metric. AI can effectively multiply the capacity of a security team without adding head count. Rather than asking how many people AI replaces, ask how many more actions your existing team can take with AI's assistance. The metric here is throughput, which is the number of incidents investigated, configurations reviewed or alerts triaged per analyst per day, before and after AI deployment.&lt;/p&gt;
 &lt;p&gt;Risk reduction is harder to quantify, but it is arguably more important for &lt;a href="https://www.techtarget.com/searchcio/feature/From-IT-to-ROI-Framing-cybersecurity-for-the-board"&gt;conversations with the board&lt;/a&gt;. Relevant metrics include mean time to detect (&lt;a href="https://www.techtarget.com/searchitoperations/definition/mean-time-to-detect-MTTD"&gt;MTTD&lt;/a&gt;), mean time to respond (MTTR), reduction in the number of unaddressed vulnerabilities over a given period, and improvements in coverage across the attack surface. Security leaders should also track whether AI is closing the gap on &lt;a href="https://www.techtarget.com/searchsecurity/feature/How-AI-driven-patching-could-transform-cybersecurity"&gt;configuration and patch management work&lt;/a&gt; that used to slip through the cracks. The common complaint, "We didn't catch that because we didn't have enough people,&lt;i&gt;"&lt;/i&gt; often stymies security organizations.&lt;/p&gt;
 &lt;p&gt;Another metric to consider is cost reduction. This includes avoided &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-calculate-the-cost-of-a-data-breach"&gt;breach costs&lt;/a&gt;, reduced reliance on outside professional services for routine security hygiene and the cost differential between scaling AI capabilities and scaling head count to achieve the same outcomes. Reports from Gartner, &lt;a target="_blank" href="https://www.ibm.com/reports/data-breach" rel="noopener"&gt;IBM&lt;/a&gt; and others provide useful industry benchmarks about the costs of data breaches that CISOs can use to anchor these estimates.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="The challenges of calculating ROI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The challenges of calculating ROI&lt;/h2&gt;
 &lt;p&gt;Even with the right metrics defined, calculating ROI for AI in cybersecurity is genuinely difficult.&lt;/p&gt;
 &lt;p&gt;When a breach does &lt;i&gt;not&lt;/i&gt; occur, it's nearly impossible to prove definitively that AI prevented it. Security has always struggled with this counterfactual challenge, and AI doesn't solve it -- it inherits it. The best approach is to establish clear baselines before deployment and track directional improvement over time rather than claiming precision that simply is not achievable.&lt;/p&gt;
 &lt;p&gt;ROI calculations are also complicated by shadow AI. Measuring the return on sanctioned AI security tools without accounting for &lt;a href="https://www.techtarget.com/searchsecurity/tip/Shadow-AI-How-CISOs-can-regain-control-in-2026"&gt;AI deployments that create risks elsewhere&lt;/a&gt; will yield misleading results. Creating a complete inventory of AI usage -- sanctioned and unsanctioned -- is a prerequisite for any credible ROI analysis.&lt;/p&gt;
 &lt;p&gt;Another challenge is that AI outputs are not always reliable enough to act on. Organizations are confronting this in real time. For security use cases where a bad recommendation could take down a manufacturing line or open an attack vector, reliability isn't optional. ROI calculations need to factor in the cost of human review and validation that responsible AI deployment requires.&lt;/p&gt;
 &lt;p&gt;AI tools perform based on the quality of the data, processes and people they operate against. Organizations that lack clean asset inventories, consistent logging or mature detection workflows will see lower returns than those that have done the foundational work. ROI projections that don't account for an organization's starting point tend to disappoint.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Best practices for calculating and maximizing ROI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Best practices for calculating and maximizing ROI&lt;/h2&gt;
 &lt;p&gt;Getting the numbers right matters, but so does ensuring that AI investments deliver. Here's how leading CISOs approach both.&lt;/p&gt;
 &lt;h3&gt;Start with business outcomes, not technology&lt;/h3&gt;
 &lt;p&gt;Before deploying any AI capability, define the specific security problem you intend to solve. Decide what success looks like in measurable terms. This discipline makes ROI measurement straightforward because the metrics are defined before deployment, not retrofitted later.&lt;/p&gt;
 &lt;h3&gt;Design with a human-in-the-loop mindset&lt;/h3&gt;
 &lt;p&gt;Organizations seeing the best results from AI in cybersecurity are not trying to remove humans from the equation. They use AI to make human judgment faster and better informed. This design is not just good risk management. It also makes ROI easier to measure because it becomes possible to track how often and how quickly AI-generated recommendations are acted on -- and to what effect.&lt;/p&gt;
 &lt;h3&gt;Report ROI in the language of your audience&lt;/h3&gt;
 &lt;p&gt;CISOs presenting to the board need to &lt;a href="https://www.techtarget.com/searchsecurity/tip/7-key-cybersecurity-metrics-for-the-board-and-how-to-present-them"&gt;translate security metrics into business outcomes&lt;/a&gt;: reduced risk, avoided costs and improved competitive positioning. When presenting to their team, a security leader needs to show how AI is making the work more impactful -- not threatening people's roles. Tailoring the ROI story to the audience is as important as the underlying data.&lt;/p&gt;
 &lt;h3&gt;Establish baselines before deployment&lt;/h3&gt;
 &lt;p&gt;It is impossible to demonstrate ROI without a before-and-after comparison. Document the &lt;a href="https://www.techtarget.com/searchsecurity/tip/The-best-incident-response-metrics-and-how-to-use-them"&gt;relevant metrics&lt;/a&gt;, such as MTTD, MTTR, analyst-to-alert ratios and open vulnerability counts, before turning on any AI capability. These baselines serve as the foundation for every subsequent ROI conversation.&lt;/p&gt;
 &lt;h3&gt;Revisit and recalibrate regularly&lt;/h3&gt;
 &lt;p&gt;AI capabilities and the threat landscape they are designed to address evolve rapidly. An ROI framework that was relevant six months ago might need to be updated. Build quarterly reviews into AI investment governance processes and be willing to reallocate if certain tools underperform relative to their costs.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Ashwin Krishnan is the host and producer of StandOutIn90Sec, based in California, where he interviews tech leaders, employees and event speakers in short, high-impact conversations.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Investing in AI tools can benefit an organization's security posture. Understanding and quantifying those improvements, however, poses a real challenge.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a252808758.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/tip/Calculating-the-ROI-of-AI-in-cybersecurity</link>
            <pubDate>Mon, 16 Mar 2026 12:29:00 GMT</pubDate>
            <title>Calculating the ROI of AI in cybersecurity</title>
        </item>
        <item>
            <body>&lt;p&gt;LAS VEGAS -- At Enterprise Connect, Zoom announced the expansion of agentic AI capabilities across its entire portfolio, rolling out AI Companion 3.0 to the Zoom Workplace app, Zoom Business Services and Workvivo.&lt;/p&gt; 
&lt;p&gt;Aiming to address the fragmentation of data captured across collaboration tools and workflows, Zoom's agentic AI embeds workflow automation directly into meetings, calls, chat and contact center interactions.&lt;/p&gt; 
&lt;p&gt;"Where we're going is about using AI to create," said Jeff Smith, interim chief product officer at Zoom. "The two things you need to create are a rich repository of trusted data and the services that you can take action on."&lt;/p&gt; 
&lt;p&gt;One new AI Companion capability is an AI notetaker, called My notes, which can be used for in-person, Zoom, Microsoft and Google meetings. Users can jot down quick thoughts in their personal notes, and the notetaker can expand with key takeaways.&lt;/p&gt; 
&lt;p&gt;Zoom also introduced updates to its Custom AI Companion add-on to enable organizations to deploy prebuild AI agents for sales, IT and marketing that automate repetitive tasks. Users can also create &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/AI-agents-increasingly-viable-for-enterprise-use"&gt;AI agents for their personal workflows&lt;/a&gt; or send an agent to an admin to share across teams. Additional updates to the add-on include new third-party integrations and enhanced personalization for users based on job roles, preferences and focus areas.&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/zoom_ai_companion-f.jpg"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/zoom_ai_companion-f_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/zoom_ai_companion-f_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/zoom_ai_companion-f.jpg 1280w" alt="A screenshot of AI Companion in Zoom Workplace" height="369" width="560"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;AI Companion 3.0 drives automation and agentic AI across the Zoom portfolio.
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Zoom enters productivity space"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Zoom enters productivity space&lt;/h2&gt;
 &lt;p&gt;Zoom introduced AI-driven Docs, Sheets and Slides to enable employees to create documents and presentations by pulling information directly from meeting conversations and chats.&lt;/p&gt;
 &lt;p&gt;AI can't replicate the ideas humans generate through interaction with each other, Smith said. But AI can automate tasks, such as building project plans, presentations and templates. This frees up users to spend more time on meaningful collaboration.&lt;/p&gt;
 &lt;p&gt;The introduction of productivity tools to Zoom highlights a growing market trend. Unified communications and collaboration tools have been adjacent to &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/end-user-computing-platform-EUC-platform"&gt;end-user computing&lt;/a&gt; in the digital workspace, but now they are overlapping, said Gabe Knuth, an analyst with Omdia, a division of Informa TechTarget.&lt;/p&gt;
 &lt;p&gt;"AI is taking this a step further by integrating communications and collaboration workflows and data into the productivity apps where the work gets done," Knuth said.&lt;/p&gt;
 &lt;p&gt;However, the goal is not for Zoom to replace popular productivity suites from Microsoft and Google, said Leo Boulton, head of products, solutions and industry marketing at Zoom. Instead, Zoom's Docs, Sheets and Slides integrate with Microsoft 365 and Google Workspace, enabling employees to continue working in their Zoom environment. Documents can also be exported to Microsoft and Google file formats.&lt;/p&gt;
 &lt;p&gt;"You can look at them as extending the power of Zoom AI Companion by turning conversations and meetings into finished work," Boulton said.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Zoom Workplace updates"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Zoom Workplace updates&lt;/h2&gt;
 &lt;p&gt;Zoom is also updating its Workplace platform to offer a simpler, unified experience across desktop, mobile and web applications. New features include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Zoomie Group Assistant&lt;/b&gt;. This group facilitator, which functions across meetings, chat and Zoom Rooms, can answer questions on behalf of a group and provide real-time meeting support.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Zoom Chat. &lt;/b&gt;New AI capabilities better help users manage information, including custom chat agents, summaries for longer threads, prioritizing key messages and highlighting next steps.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Deepfake risk detection.&lt;/b&gt; The security feature, which provides real-time alerts when &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-detect-deepfakes-manually-and-using-AI"&gt;synthetic audio or video is detected&lt;/a&gt;, is available to users attending both internal and external meetings.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Zoom Phone updates"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Zoom Phone updates&lt;/h2&gt;
 &lt;p&gt;The addition of AI Companion 3.0 to &lt;a target="_blank" href="https://news.zoom.com/ec26-zoom-phone/" rel="noopener"&gt;Zoom Phone&lt;/a&gt; enables organizations to do more with their conversation data. Agentic workflows can perform follow-up tasks, such as sending emails or identifying next steps. Additional AI capabilities added to Zoom Phone include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;SMS for Virtual Agent AI Receptionist. &lt;/b&gt;This feature enables agentic self-service text interactions for customer engagement, such as answering questions and collecting information. It can also escalate conversations to a human if needed without disrupting the conversation's flow.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Zoom Phone Mobile. &lt;/b&gt;With this function, users can make calls with their native dialer and access Zoom Phone features, like call queues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Customer Engagement Pack. &lt;/b&gt;Offering a real-time view of customer engagement prioritized by activity and importance, AI can flag interactions that require immediate attention.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Operator Connect for Microsoft Teams. &lt;/b&gt;This feature provides centralized telephony management within Zoom and delivers Zoom PSTN to Teams.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;em&gt;Katherine Finnell is senior site editor for Informa TechTarget's unified communications site. She writes and edits articles on a variety of business communications technology topics, including unified communications as a service, video conferencing and collaboration.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>AI Companion 3.0 is breaking down communications silos across meetings, calls, chat and contact center. New custom AI agents also automate sales, IT and marketing workflows.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ai_g1182183209.jpg</image>
            <link>https://www.techtarget.com/searchunifiedcommunications/news/366640476/Zoom-integrates-agentic-AI-across-platform-portfolio</link>
            <pubDate>Mon, 16 Mar 2026 12:22:00 GMT</pubDate>
            <title>Zoom integrates agentic AI across platform portfolio</title>
        </item>
        <item>
            <body>&lt;p&gt;Omdia has raised concerns that the channel is facing a profitability crisis sparked by a number of factors, including geopolitical uncertainty, component shortages and the impact on pricing.&lt;/p&gt; 
&lt;p&gt;With vendors shortening their pricing windows for the channel to ensure they can react to component shortages and quote at the market level, predictability in the market has come under further strain.&lt;/p&gt; 
&lt;p&gt;According to research from Omdia, those negative market conditions are now expected to hit first-quarter profits, with almost 60% of partners globally indicating that they expect double-digit declines in the first three months of the year.&lt;/p&gt; 
&lt;p&gt;The impact the Iran war has had on energy prices is one factor, but the increasing tendency by hardware suppliers to refuse to hold prices until the point of shipment is eroding customer confidence, with the threat of increased costs adding to the reasons to hold off on pulling the trigger on a purchase order.&lt;/p&gt; 
&lt;p&gt;Sharing the &lt;a href="http://www.linkedin.com/"&gt;research results on social media&lt;/a&gt;, Alastair Edwards, chief analyst at &lt;a href="https://www.google.com/aclk?sa=L&amp;amp;pf=1&amp;amp;ai=DChsSEwjVpdORvqSTAxUUm1AGHeB2FNoYACICCAEQABoCZGc&amp;amp;co=1&amp;amp;ase=2&amp;amp;gclid=CjwKCAjw1N7NBhAoEiwAcPchpzowrugPbTrv4KsIPADmlGLjm-LTKe_iMVS7LVanFofx3l83dxT3lRoC6jwQAvD_BwE&amp;amp;cce=2&amp;amp;category=acrcp_v1_32&amp;amp;sig=AOD64_0ahWCb1aokSJscyu6fsXcZRa8lKQ&amp;amp;q&amp;amp;nis=4&amp;amp;adurl=https://omdia.tech.informa.com/?utm_source%3Dpaid_OMDIA_x_OMDIA_le_aud_x_x_LEADS_OMDIA_Traffic_2025_Paid-Google-Brand%26gad_source%3D1%26gad_campaignid%3D23009431649%26gbraid%3D0AAAAACPjfnR0flF9ktvMaMKqWMGTiBLKE%26gclid%3DCjwKCAjw1N7NBhAoEiwAcPchpzowrugPbTrv4KsIPADmlGLjm-LTKe_iMVS7LVanFofx3l83dxT3lRoC6jwQAvD_BwE&amp;amp;ved=2ahUKEwjmxs2RvqSTAxXQW0EAHfMuLDoQ0Qx6BAgLEAE"&gt;Omdia&lt;/a&gt;, said vendors’ actions were making life increasingly difficult for partners.&lt;/p&gt; 
&lt;p&gt;“With many hardware vendors now refusing to hold hardware prices for partners until the point of shipment, or cancelling orders even after a purchase order has been received, partners are left carrying greater levels of risk. Those tied into contractual pricing agreements with customers face a potential disaster,” he stated.&lt;/p&gt; 
&lt;p&gt;“Conflict in the Middle East threatens to intensify the crisis, with oil prices surging and supply chains disrupted. Distributor profits will come under greater pressure, particularly if delivery and logistics costs rise sharply. If conditions continue to deteriorate, the risk of channel bankruptcies is set to increase dramatically,” he added.&lt;/p&gt; 
&lt;p&gt;Although profits are coming under strain, those quizzed by Omdia about revenues shared more optimism, with lower levels expecting a decrease and a third looking for growth.&lt;/p&gt; 
&lt;p&gt;The results from the large, publicly listed players in the channel have been positive, but those covering trading in the first quarter have yet to come out. Since the end of last year, the pressure to pass on price rises has increased and become more of a challenge for resellers and managed service providers (MSPs).&lt;/p&gt; 
&lt;p&gt;The expectation is that the pressure to pass on price rises will start to show on the bottom line as the channel moves through the first quarter and deeper into 2026.&lt;/p&gt; 
&lt;p&gt;Edwards added that the factors impacting first-quarter profitability were not moving anytime soon and would continue to have an impact through the rest of the year.&lt;/p&gt; 
&lt;p&gt;“Profit challenges in the channel are highly likely to worsen in the coming quarters. With shortages persisting (if not worsening) for 12 months or longer, the technology industry faces a reckoning. Better collaboration between vendors, partners and distributors – and a greater willingness to share financial risk – is needed across the ecosystem,” he said.&lt;/p&gt; 
&lt;p&gt;The Iran conflict has been raging for more than two weeks, and the price of oil has risen sharply, but there are signs that even in that situation, the markets are adapting to conditions, which could help improve confidence.&lt;/p&gt; 
&lt;p&gt;“Oil prices are steadily marching higher again, increasing inflation risks and threatening global growth. However, with the initial shock of war in the Middle East fading and investors getting used to the new normal, the FTSE 100 has crept into positive territory at the start of the week,” said Susannah Streeter, chief investment strategist at &lt;a href="https://www.wealthclub.co.uk/"&gt;Wealth Club&lt;/a&gt;.&lt;/p&gt;</body>
            <description>Research from Omdia reveals the impact geopolitical uncertainty and shortages are having on partner businesses</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/financial-results-chart-graph-5-adobe.jpeg</image>
            <link>https://www.computerweekly.com/microscope/news/366640317/Channel-facing-profitability-threat</link>
            <pubDate>Mon, 16 Mar 2026 11:41:00 GMT</pubDate>
            <title>Channel facing profitability threat</title>
        </item>
        <item>
            <body>&lt;p&gt;When athenahealth and b.well partnered to enable patient-led data sharing earlier this year, they didn't entirely start from scratch, according to Sam Lambson, the company's VP of product. In fact, the system's design -- which lets patients share health data through a QR code -- is inspired by the patients athenahealth and its customers serve.&lt;/p&gt; 
&lt;p&gt;"For patients, maybe they could upload a document in the patient portal, or they could bring a CD or a piece of paper to an appointment, which the doctor would then have to import somehow," Lambson said in a recent interview, recalling the early aughts of healthcare's digital transformation.&lt;/p&gt; 
&lt;p&gt;Those days might be over, with a new system from athenahealth and b.well, a FHIR-based platform that lets patients access and share their information all in one spot, aiming to streamline the data-sharing process. Patients can pull all their health information, including from non-athena EHRs and consumer-facing apps, into the b.well platform to generate a QR code.&lt;/p&gt; 
&lt;p&gt;Clinicians can scan the QR code using technology already embedded in athenahealth's system, and the information will be integrated in a usable way.&lt;/p&gt; 
&lt;p&gt;"The QR code is similar to patients bringing a bag full of papers to an appointment," Lambson said. "But we can do a lot more with that information than we could do with those papers," he added.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Making headway in CMS Health Tech Ecosystem pledge"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Making headway in CMS Health Tech Ecosystem pledge&lt;/h2&gt;
 &lt;p&gt;The system was launched earlier this year as a part of athena and b.well's participation in the &lt;a href="https://www.techtarget.com/searchhealthit/news/366628294/Tech-giants-providers-back-CMS-health-tech-ecosystem-initiative"&gt;Centers for Medicare &amp;amp; Medicaid Services (CMS) Health Tech Ecosystem&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Announced last summer, the ecosystem calls for an &lt;a href="https://www.techtarget.com/searchhealthit/feature/Why-HIEs-will-be-essential-to-CMS-Health-Tech-Ecosystem?Offer=ab_MeteredFormCopyEoc_ctrl"&gt;interoperability framework for health IT developers&lt;/a&gt; and an initiative to "Kill the Clipboard" and promote a unified digital patient experience.&lt;/p&gt;
 &lt;p&gt;This latest partnership with b.well is a big step toward fulfilling the aims of the Kill the Clipboard pledge.&lt;/p&gt;
 &lt;p&gt;But, perhaps more importantly, Lambson said it's a big step in proving exactly what's possible in the digital patient engagement space.&lt;/p&gt;
 &lt;p&gt;"What we're trying to do with b.well and through the health tech initiative is to try to showcase the art of the possible," he said. "We wanted to be sure that the market understands what's possible with a cloud-based EHR working with independent, third-party, patient-oriented applications to improve the flow of information between doctors and patients."&lt;/p&gt;
 &lt;p&gt;That's exciting work, Lambson added, considering athenahealth's longstanding commitment to unifying the digital patient experience.&lt;/p&gt;
 &lt;p&gt;"Patients live in a world where they see multiple doctors, especially the Medicare population," Lambson said, noting that the typical Medicare beneficiary visits around four different facilities and seven different doctors in a year. That list grows longer if the patient has &lt;a href="https://www.techtarget.com/healthcarepayers/news/366603904/Top-10-Most-Expensive-Chronic-Diseases-for-Healthcare-Payers"&gt;one or more chronic diseases&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;"In that world, the ability to get your data and for your data to be available to your doctors wherever you go is very siloed. It's not always easy to have the best experience," he added.&lt;/p&gt;
 &lt;p&gt;This latest partnership with b.well is a step in the right direction, but Lambson noted that there's still more progress to be made, especially as more consumer-facing apps and &lt;a href="https://www.techtarget.com/patientengagement/news/366640134/Microsoft-joins-the-AI-chatbot-market-with-Copilot-Health"&gt;AI chatbots proliferate the market&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Assessing the risk for a deeper digital divide"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Assessing the risk for a deeper digital divide&lt;/h2&gt;
 &lt;p&gt;Although the CMS Health Tech Ecosystem -- and the innovations that have already come out of it -- have been championed by many in the medical industry, there are some &lt;a href="https://www.techtarget.com/patientengagement/news/366628284/Why-CMS-Health-Tech-Ecosystem-needs-a-health-equity-mindset"&gt;concerns about a deepening digital divide&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;After all, using patient-facing technology to streamline the healthcare experience requires patients to own the technology and know how to use it. Some in the industry are worried that pushes for deeper adoption of patient-facing tools will further divide the digital haves and have-nots.&lt;/p&gt;
 &lt;p&gt;Lambson said those fears are valid, but not top-of-mind for him. Healthcare organizations should always be ready to meet patients where they are, perhaps offering text message outreach instead of smartphone apps, or even providing human assistance where applicable.&lt;/p&gt;
 &lt;p&gt;"However, there has been a really wide engagement when it comes to the modality of the smartphone, especially."&lt;/p&gt;
 &lt;p&gt;Indeed, &lt;a href="https://www.pewresearch.org/internet/fact-sheet/mobile/"&gt;smartphone ownership is up to 91%&lt;/a&gt; nationwide, according to 2025 data from the Pew Charitable Trusts. That includes 78% of adults over age 65, a population many in the industry fear would be reluctant to adopt health IT.&lt;/p&gt;
 &lt;p&gt;According to Lambson, the industry shouldn't be as concerned about how patients will use technology.&lt;/p&gt;
 &lt;p&gt;"In terms of the digital divide, I see it more as the digital divide between healthcare providers," he said.&lt;/p&gt;
 &lt;p&gt;Long-term care facilities and skilled nursing facilities (SNFs), in particular, don't have the same access to health IT compared to academic medical centers and even primary care providers.&lt;/p&gt;
 &lt;p&gt;That's because these facilities were initially left out of the HITECH Act, which prompted healthcare's digital transformation back in 2009. Specifically, HITECH established the meaningful use program, a stimulus package that paid healthcare organizations for adopting and using EHRs and related technologies.&lt;/p&gt;
 &lt;p&gt;Consequently, long-term care facilities and SNFs are behind their peers in terms of health IT adoption. It's that disparity that Lambson fears will hamper the digital patient experience.&lt;/p&gt;
 &lt;p&gt;A patient might have a great digital experience with their primary care provider, he offered. But if that patient has a big surgery or procedure, they might end up in a SNF or post-acute care facility. Those types of organizations won't have as sophisticated technologies, which could leave the patient in the dark when they're used to transparency.&lt;/p&gt;
 &lt;p&gt;Health technology equity issues aside, Lambson said he remains optimistic about where athenahealth and other participants in the Health Tech Ecosystem are headed.&lt;/p&gt;
 &lt;p&gt;"This is just the beginning -- it's not the end of where we're going," he concluded. "Demonstrating that a patient has the power to collect and bring their own information is a really important psychological hurdle that we've overcome through this initiative."&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Sara Heath has reported news related to patient engagement and health equity since 2015.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A step forward in its Health Tech Ecosystem pledge, athenahealth has partnered with b.well to let patients lead their health data sharing through a QR code.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ehr_g1366566196.jpg</image>
            <link>https://www.techtarget.com/patientengagement/feature/Athenahealth-uses-Health-Tech-Ecosystem-to-unify-patient-experience</link>
            <pubDate>Mon, 16 Mar 2026 11:20:00 GMT</pubDate>
            <title>Athenahealth uses Health Tech Ecosystem to unify patient experience</title>
        </item>
        <item>
            <body>&lt;p&gt;When drone attacks knocked out three AWS data centers in the Middle East last month, CIOs were forced to confront an uncomfortable truth: the cloud's physical infrastructure can be destroyed.&lt;/p&gt; 
&lt;p&gt;In late February, the US-Israeli offensive, dubbed “Operation Epic Fury”, struck Iran and killed its leader. Much of the air space over the Middle East closed immediately, stranding hundreds of thousands of travelers. The chaos continued as the Dubai International Airport remained closed for three days due to damage sustained from drone debris.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="AWS data centers hit in the Middle East"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;AWS data centers hit in the Middle East&lt;/h2&gt;
 &lt;p&gt;But there’s a new twist to this decades-old conflict. Three Amazon Web Services (AWS) data centers located in the United Arab Emirates (UAE) and Bahrain were caught in the crossfire. AWS confirmed that the facilities were &lt;a target="_blank" href="https://www.tomshardware.com/tech-industry/drone-strikes-hit-three-aws-data-centers-in-the-uae-and-bahrain" rel="noopener"&gt;hit by drone strikes&lt;/a&gt;, resulting in structural damage, power failures, fire and water damage from fire suppression. Nearly 60 AWS online services went down. The company advised customers with workloads running in the Middle East to migrate their data to alternate AWS regions, warning that this could be a “prolonged event.”&lt;/p&gt;
 &lt;p&gt;It is believed to be the first time American big tech companies have become military targets. The attack makes it clear that &lt;a href="https://www.techtarget.com/searchdatacenter/feature/Guide-to-understanding-the-various-types-of-data-centers"&gt;data centers&lt;/a&gt; have become part of critical national infrastructure.&lt;/p&gt;
 &lt;p&gt;“They are strategically important to operations of financial systems, government services, healthcare, communications, logistics," said Jack Alexander, senior threat intelligence analyst at Quorum Cyber. "Everything we do in this day and age goes through data centers, goes through hyperscalers, so they need to be seen as critical national infrastructure and protected as such,”&lt;/p&gt;
 &lt;p&gt;Going forward organizations will need &lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/When-to-use-a-mirrored-site-disaster-recovery"&gt;disaster recovery plans&lt;/a&gt; in place that identify single points of failure and include redundancy so the data can be moved elsewhere if a data center is disabled, Alexander said. Consulting companies with internal intelligence departments can offer key information to organizations interested in a geographical area.&lt;/p&gt;
 &lt;p&gt;“Use those means to identify the geophysical risks around the world and then structure your strategic dependencies accordingly,” he said.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="The physical reality of “the cloud”"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The physical reality of “the cloud”&lt;/h2&gt;
 &lt;p&gt;The AWS data center attacks are a reminder that digital systems ultimately rely on real-world physical infrastructure, said Tae Oh, founder of Spacecoin.&lt;/p&gt;
 &lt;p&gt;Cloud regions, data centers, fiber routes and undersea cables all sit inside environments that can be disrupted by conflict, geopolitical tension or government intervention.&lt;/p&gt;
 &lt;p&gt;"When those systems are damaged or restricted, the connectivity that businesses depend on can degrade or disappear much faster than most continuity plans anticipate,” Oh said.&lt;/p&gt;
 &lt;p&gt;Multiple cloud regions of backup data centers rely on the same terrestrial networks and gateways, he said. Real continuity requires independent connectivity layers that operate outside a single provider, country or routing system.&lt;/p&gt;
 &lt;p&gt;“Open, decentralized internet infrastructure – particularly networks that can operate from space rather than relying solely on ground routes – can provide that additional layer of resilience when terrestrial systems become pressure points,” Oh said.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="The risks of locating data centers in volatile regions"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The risks of locating data centers in volatile regions&lt;/h2&gt;
 &lt;p&gt;The UAE is attractive to US hyperscalers interested in building powerful data centers to &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Complexities-of-integrating-AI-into-legacy-data-centers"&gt;feed their AI initiatives&lt;/a&gt;. Many companies, including Google, Microsoft and Oracle operate data centers in the region, although Amazon is the only one to report damage so far.&lt;/p&gt;
 &lt;p&gt;The UAE has become one of the most important infrastructure hubs in the Middle East and the country has invested heavily in physical security around data centers and connectivity, said Syed Asif Ali, founder of Point Media.&lt;/p&gt;
 &lt;p&gt;Beyond physical protection, data centers &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Data-center-security-compliance-checklist"&gt;depend on a strong infrastructure&lt;/a&gt;, connectivity, geopolitics, supply chains and regulatory environments. As a result, companies are adopting multi-region architectures where critical workloads can shift between geographic regions if necessary, Asif Ali said.&lt;/p&gt;
 &lt;p&gt;“In the cloud era, resilience comes from geographic flexibility as much as physical security,” he said.&lt;/p&gt;
 &lt;p&gt;But the physical threat still exists.&lt;/p&gt;
 &lt;p&gt;Iranian Revolutionary Guard-affiliated news claimed that Iran targeted Amazon and Microsoft facilities, the Financial Tines reported. Iran justifies the data center attacks because of &lt;a target="_blank" href="https://www.aljazeera.com/news/2024/4/23/what-is-project-nimbus-and-why-are-google-workers-protesting-israel-deal" rel="noopener"&gt;Project Nimbus&lt;/a&gt;, a $1.2 billion contract that Amazon and Google jointly hold to provide cloud services to the Israeli government and military.&lt;/p&gt;
 &lt;p&gt;It’s not the first time private industry has been made a target in armed conflict, according to Mahmoud Abuwasel, partner at Wasel &amp;amp; Wasel.&lt;/p&gt;
 &lt;p&gt;The Cuba Submarine Telegraph Company, a British-owned private company located in Cuba, had its telegraph lines attacked by Americans during the Spanish-American War. The U.S. said the action was justified because the company was transferring military data on behalf of the Cuban government. The company later sued the United States government and a special tribunal agreed with America that the act was justified.&lt;/p&gt;
 &lt;p&gt;“This has happened before. That’s why it’s important to look at those precedents and reflect on them in the modern situations,” Abuwasel said.&lt;/p&gt;
 &lt;p&gt;Large investments are continually &lt;a href="https://www.techtarget.com/searchdatacenter/news/366627578/Meta-Google-unveil-massive-AI-data-center-investment-plans"&gt;being made in data centers&lt;/a&gt; as the AI push and the need for data hosting grows. As these needs enter the state apparatus even more, data centers will become more sensitive and more prone to attack, Abuwasel said.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="What hyperscalers should do next"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What hyperscalers should do next&lt;/h2&gt;
 &lt;p&gt;Enterprises working in the region should focus on architectural resilience rather than just physical protection, Asif Ali said.&lt;/p&gt;
 &lt;p&gt;Organizations choosing to operate in geopolitically sensitive regions should prioritize multi-region deployments, workload portability and failover strategies that allow critical services to move across geographic zones without disruption, he said.&lt;/p&gt;
 &lt;p&gt;They should also consider how much risk is concentrated because disruption to large volumes of infrastructure in a single region can have a ripple effect across multiple organizations, Asif Ali said.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    The most resilient organizations design their systems assuming disruptions will eventually happen.
   &lt;/figure&gt;
   &lt;figcaption&gt;
    &lt;strong&gt;Syed Asif Ali&lt;/strong&gt;Founder, Point Media
   &lt;/figcaption&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Data governance and regulatory dynamics also come into play, requiring organizations to consider where data is stored, how quickly it can be relocated and how operations continue if a specific region becomes inaccessible.&lt;/p&gt;
 &lt;p&gt;“The most resilient organizations design their systems assuming disruptions will eventually happen,” he said.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="What this means for enterprise business continuity"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What this means for enterprise business continuity&lt;/h2&gt;
 &lt;p&gt;The situation in the Middle East will force many organizations to rethink their disaster recovery plans to include situations that aren’t currently addressed.&lt;/p&gt;
 &lt;p&gt;“Now, all of a sudden, we have a challenge that ‘if there is an attack, or some sort of disruption, how can we safely, securely and in compliance move that data from one region to another,’” said Kevin Miller, CTO at IFS North America.&lt;/p&gt;
 &lt;p&gt;The challenge increases when working in countries that mandate data sovereignty.&lt;/p&gt;
 &lt;p&gt;“The reality is that sometimes we don’t know where our data is and a lot of these tier one providers, these hyperscalers, are balancing those data loads sometimes across different geographic regions," Miller said. "But there will be a lot of questions asked about where the data resides.”&lt;/p&gt;
 &lt;p&gt;The best prevention comes from modeling what can happen and AI provides an advantage, he said. Much like mapping alternative suppliers or routes, an organization can use AI to determine how to get data out of a physical location it lost access to and back into the data owner’s hands.&lt;/p&gt;
 &lt;p&gt;“We have to now start looking many layers deeper than we traditionally have in terms of what is the best disaster recovery plan,” Miller said.&lt;/p&gt;
 &lt;p&gt;There will be an increase in the need to have physical access or solid alternatives as to where data can go, as well as increased attention in terms of which countries are safe to migrate that path.&lt;/p&gt;
 &lt;p&gt;There should be legislation around regulations that protect organizations from legal risks and compliance deficiencies if they want to move data from a compromised data center into another one, Miller said.&lt;/p&gt;
 &lt;p&gt;Future &lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/Understand-the-costs-of-a-disaster-recovery-failure"&gt;disaster recovery and contingency plans&lt;/a&gt; may include some type of additional sharing or mutual aid between data centers similar to the utility companies, he said.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Julie Hanson is a freelance writer who has reported on local news across Massachusetts and New Hampshire.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Drone strikes that hit AWS's Middle East data centers show the cloud’s physical risks and prompts enterprises to improve disaster recovery and multi-region resilience strategies.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/map_globe_g170100641.jpg</image>
            <link>https://www.techtarget.com/searchcio/feature/Middle-East-AWS-attack-highlights-data-center-vulnerabilities</link>
            <pubDate>Mon, 16 Mar 2026 11:14:00 GMT</pubDate>
            <title>Middle East AWS attack highlights data center vulnerabilities</title>
        </item>
        <item>
            <body>&lt;p&gt;Another week when the job appointments kept coming, with an emphasis on recruiting senior executives. Those with decades racked up in their respective areas of expertise were picked up to bring their skills and insight into fresh roles.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Genesys"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Genesys&lt;/h2&gt;
 &lt;p&gt;The experience orchestration player has appointed Felipe Schwartzmann as senior vice-president and regional sales leader for Europe, the Middle East, and Africa (EMEA). Schwartzmann previously served as senior vice-president of Latin America at Genesys.&lt;/p&gt;
 &lt;p&gt;“Felipe was instrumental in driving regional expansion and deepening customer relationships across Latin America,” said Larry Shurtz, chief sales officer at &lt;a href="https://www.genesys.com/en-gb"&gt;Genesys&lt;/a&gt;. “With his strong track record of driving growth, building high-performing teams and strengthening market presence, Felipe is ideally suited to further our expansion in EMEA.”&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Synyega"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Synyega&lt;/h2&gt;
 &lt;p&gt;The IT asset management (ITAM) consultancy has rolled out the red carpet for Matt Ward as its first client success officer. He comes with more than three decades of experience and was a founding member of Softcat. Since 2005, Ward he has specialised in ITAM, most recently acting as Softcat’s enterprise director for that part of the business.&lt;/p&gt;
 &lt;p&gt;“We are delighted to welcome Matt Ward to Synyega’s leadership team,” said Tony Crawley, CEO of &lt;a href="https://www.synyega.com/"&gt;Synyega&lt;/a&gt;. “His extensive expertise in ITAM, coupled with his experience of scaling a highly successful organisation, makes him an excellent fit as we look to accelerate our growth strategy.”&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="MLL Telecom"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;MLL Telecom&lt;/h2&gt;
 &lt;p&gt;The secure managed network services player has appointed Gavin Hutchinson as senior solutions architect. In the new role, he will be helping with the firm's portfolio leaning on his two decades of experience.&lt;/p&gt;
 &lt;p&gt;“His well-proven network design skills in leveraging the benefits of the cloud, SASE and SD-WAN, and long track record of delivering successful outcomes on major public sector transformation projects, will be invaluable as MLL continues to expand,” said Andrew Shilton, &lt;a href="https://www.mlltelecom.com/"&gt;MLL’s&lt;/a&gt; head of pre-sales.&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Ping Identity"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Ping Identity&lt;/h2&gt;
 &lt;p&gt;The digital identity specialist has welcomed Graeme Ventris as regional vice-president (RVP) for EMEA channel and alliances. Ventris will lead the firm’s channel activities across the region to support and increase the growth of its ecosystem.&lt;/p&gt;
 &lt;p&gt;Paul Inglis, general manager for EMEA at &lt;a href="https://www.pingidentity.com/en.html"&gt;Ping Identity&lt;/a&gt;, welcomed the arrival of Ventris: “His deep understanding of the channel landscape and his ability to build sustainable, mutually beneficial partner ecosystems make him the ideal leader to drive our EMEA strategy forward.&lt;/p&gt;
 &lt;p&gt;“As organisations across the region navigate increasingly sophisticated digital identity challenges, including those accelerated by AI-driven risks, our partners play a vital role in delivering the trust and security our customers require.”&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="WSO2"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;WSO2&lt;/h2&gt;
 &lt;p&gt;The agentic enterprise specialist has hired Thibaut Rouffineau as chief marketing officer, as the firm looks to accelerate its presence in key verticals, including banking and financial services, telecommunications, government and healthcare. He comes with a CV that stretches over two decades, with plenty of marketing experience, including most recently at Canonical.&lt;/p&gt;
 &lt;p&gt;“The company’s rich portfolio and refreshed branding strategy clearly positions it to address the realities organisations face as they move from AI pilots to real, outcome-driven agent deployment,” said Rouffineau.&lt;/p&gt;
 &lt;p&gt;“&lt;a href="https://wso2.com/"&gt;WSO2&lt;/a&gt; has a unique opportunity to help enterprises build the digital foundations required for intelligent, trusted and scalable agent-driven experiences, and I look forward to working with the global team to elevate the brand and accelerate growth worldwide.”&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Personnel moves of note this last week at Genesys, Synyega, MLL Telecoms, Ping Identity and WSO2</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/HR-employer-job-adobe.jpg</image>
            <link>https://www.computerweekly.com/microscope/news/366640395/Channel-moves-Whos-gone-where</link>
            <pubDate>Mon, 16 Mar 2026 10:59:00 GMT</pubDate>
            <title>Channel moves: Who’s gone where?</title>
        </item>
        <item>
            <body>&lt;p&gt;Market data from analyst IDC has shown that &lt;a href="https://www.computerweekly.com/feature/Edge-AI-Business-cost-risk-and-control"&gt;SuperMicro has leapfrogged&lt;/a&gt; established server makers Lenovo and HPE as the second-largest PC server maker behind Dell.&lt;/p&gt; 
&lt;p&gt;SuperMicro experienced growth of almost 134% for the fourth quarter of 2025 with revenue of $11.7bn, which means it accounts for over 9% of the global server market. Dell was ahead with 10% market share and revenue of $12.6bn, while Chinese manufacturer IEIT Systems took the third spot, with revenue of $5.2bn and a 4% market share ahead of Lenovo, which posted revenue of $5.1bn, and HPE ($3.9bn).&lt;/p&gt; 
&lt;p&gt;“The race for AI [artificial intelligence] adoption is settling the market pace, and with companies starving for infrastructure looking not only at GPUs [graphics processing units], but also consuming more CPUs [central processing units] among other components in order to feed their needs, we are going to see more price pressures, and that may impact on market dynamics with less units but higher average selling prices going forward,” said Juan Seminara, research director of Worldwide Enterprise Infrastructure Trackers at IDC.&lt;/p&gt; 
&lt;p&gt;IDC noted that volatile increasing prices on certain components such as GPUs, dynamic random access memory (DRAM) and solid state drives (SSDs) has meant that some companies have been trying to secure prices ahead while the industry is accommodating to the new reality. It predicted that the impact of this price volatility could be hitting harder during 2026 as demand keeps outpacing service capacity in the near term.&lt;/p&gt; 
&lt;p&gt;Besides Dell, the established server makers seem to be losing ground in the server market. But they appear to be looking at a new market opportunity being pushed by chipmaker AMD, which is the deployment of on-premise PC servers optimised to run agentic AI.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;In a bid to entice IT buyers away from cloud-based AI hardware, AMD has unveiled what it sees as a new category of PC called Agent Computers. In a post on the &lt;a href="https://www.amd.com/en/resources/articles/run-openclaw-locally-on-amd-ryzen-ai-max-and-radeon-gpus.html"&gt;AMD website&lt;/a&gt;, the company described how to run &lt;a href="https://www.techtarget.com/searchcio/feature/OpenClaw-and-Moltbook-explained-The-latest-AI-agent-craze"&gt;OpenClaw, the open source AI agent&lt;/a&gt;, locally on AMD Ryzen AI Max+ processors and Radeon GPUs using a Windows 11 PC with the Windows Subsystem for Linux (WSL).&lt;/p&gt; 
&lt;p&gt;AMD said the PC system configured with 128GB unified memory is capable of running “cloud-quality AI agent workloads efficiently” using OpenClaw. According to its own benchmark data, with the Qwen 3.5 35B A3B model, the system delivers around 45 tokens per second and processes 10,000 input tokens in about 19.5 seconds. AMD said the configuration supports a maximum context window of 260,000 tokens, and can run up to six agents concurrently, which it said means it is able to deliver scalable local AI experimentation while maintaining strong responsiveness on consumer hardware.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about agentic AI&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;Is AI our agent, or are our governments becoming &lt;a href="https://www.computerweekly.com/opinion/Is-AI-our-agent-or-are-our-governments-becoming-agents-for-AI"&gt;agents for AI&lt;/a&gt;: Yet more billions are being spent on agentic AI, despite warnings of its potentially extreme fallibility. Just who are governments serving when they spout the messaging of Big Tech companies.&lt;/li&gt; 
   &lt;li&gt;‘Work is broken’. Can agentic AI fix it? &lt;a href="https://www.computerweekly.com/feature/Work-is-broken-Can-agentic-AI-fix-it"&gt;Agentic AI&lt;/a&gt; exposes flaws in enterprise workflows, highlighting weak data, unclear ownership and undefined processes, but better governance and integration can help.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;AMD sees such a system running autonomously rather like the pre-cloud era branch office servers, handling tasks sent by users through a browser user interface on another Windows PC, or via Slack or WhatsApp.&lt;/p&gt; 
&lt;p&gt;PC makers that have “agent-ready” PCs include HP, Lenovo and Asus. The IDC figures show that revenue for servers with an embedded GPU in the fourth quarter of 2025 grew 59.1% year-over-year, representing more than half of the total server market revenue.&lt;/p&gt; 
&lt;p&gt;The AMD Ryzen AI Max+ has an integrated GPU, and is currently one of the processor options for PCs certified as Copilot+ devices. While these devices are either laptops or desktop PCs with monitors, AMD’s Agent Computer appears to be positioned as more of a traditional desktop Windows PC running as a server, without a screen or keyboard. The setup AMD provides is optimised to run LM Studio. This uses Ubuntu on the WSL to provide access to large language models, which then work with an OpenClaw server running locally on the same hardware.&lt;/p&gt;</body>
            <description>Lenovo and HPE pushed down as SuperMicro sees 134% AI growth, while AMD pushes on-premise Agent Computer</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/datacenter-monitoring-3-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366640375/SuperMicro-takes-on-server-leaders-as-AMD-pushes-on-premise-AI</link>
            <pubDate>Mon, 16 Mar 2026 10:45:00 GMT</pubDate>
            <title>SuperMicro takes on server leaders as AMD pushes on-premise AI</title>
        </item>
        <item>
            <body>&lt;p&gt;Despite years of hype and technical development, most enterprise AI initiatives are stuck at the starting gate. But some large companies have made headway in deploying AI productively, starting with a foundation of organizational change.&lt;/p&gt; 
&lt;p&gt;That generative AI (GenAI) and &lt;a href="https://www.techtarget.com/searchcio/feature/Pillars-of-an-agentic-AI-strategy"&gt;AI agents&lt;/a&gt; have yet to fulfill vendors' heady promises or be deployed widely at scale by enterprises has been the growing consensus among Big Tech leaders and market research reports so far this year.&lt;/p&gt; 
&lt;p&gt;In January, PwC’s 29th Global CEO Survey report, based on &lt;a target="_blank" href="https://www.pwc.com/gx/en/issues/c-suite-insights/ceo-survey.html" rel="noopener"&gt;responses from 4,454 chief executives&lt;/a&gt;, found that 56% of respondents have not realized revenue or cost benefits from AI. Just 12% reported realizing benefits from AI in both categories.&lt;/p&gt; 
&lt;p&gt;During the &lt;a href="https://www.techtarget.com/searchitoperations/news/366638794/AI-security-worries-stall-enterprise-production-deployments"&gt;Cisco AI Summit&lt;/a&gt; earlier this month, executives from Cisco, AWS, Google and OpenAI said that AI is moving faster than enterprise customers can absorb.&lt;/p&gt; 
&lt;p&gt;At Insight Enterprises, a global systems integrator based in Chandler, Ariz., the disconnect between the breakneck pace of AI development in the industry and typical enterprise change management processes has been most evident so far in &lt;a href="https://www.techtarget.com/searchitoperations/news/366631493/Harness-takes-aim-at-AI-bottleneck-with-DevSecOps-agents"&gt;software development&lt;/a&gt;. This was true both internally during Insight's initial phases of adopting GenAI and among clients, according to the company's CTO for North America, Juan Orlandini.&lt;/p&gt; 
&lt;div class="imagecaption alignLeft"&gt;
 &lt;img src="https://cdn.ttgtmedia.com/rms/onlineimages/orlandini_juan.jpg" alt="Juan Orlandini, CTO North America, Insight Enterprises"&gt;Juan Orlandini
&lt;/div&gt; 
&lt;p&gt;"That's actually a work in progress as an industry, and I'd be remiss telling you that we have it all figured out -- anybody that tells you that they've got it figured out, they're [wrong]," Orlandini said in an interview with Informa TechTarget. "Because we can generate code so quickly, we've forgotten the very front end of the application development cycle. … Part of the guidance that we give to customers is that, yeah, there are some parts of the workflow that have gotten significantly faster, but some of those structures that we've developed over 50, 60 years of running it properly -- don't forget those."&lt;/p&gt; 
&lt;p&gt;Developers keen on shipping code faster with AI sometimes chafe at the enterprise change management processes that remain in place, Orlandini said. But these processes are crucial to weeding through a mass of prototypes to identify the projects that will have a significant impact on a business when deployed at scale.&lt;/p&gt; 
&lt;p&gt;Take, for example, Insight's development of an AI agent for its website. The minimum viable product for that was developed using AI in three weeks, but it took three months for the rest of the change management process to vet the agent, Orlandini said.&lt;/p&gt; 
&lt;p&gt;"The scaling and the continual verification and all that … security, cost controls and governance … developers typically tend to struggle against, but there's a reason why you have a security team and a governance team and a FinOps team," he said. "They're not there to prevent innovation. They're there to make sure that you're doing it fiscally responsibly."&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="People and process as an AI foundation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;People and process as an AI foundation&lt;/h2&gt;
 &lt;p&gt;Friction remains between coding agents and the rest of the software development process, but an even bigger problem for enterprise AI lies in broader organizational change management issues. In a Feb. 4 Process Optimization Report by data processing firm Celonis, among &lt;a target="_blank" href="https://www.celonis.com/insights/data-visualizations/process-optimization-report-it" rel="noopener"&gt;1,649 surveyed businesses&lt;/a&gt;, the top three hurdles to AI in production were people and process problems: a lack of expertise, cited by 47% of respondents; misalignment between departments by 45%; and difficulties getting AI to understand business context by 45%. Difficulties driving automation across disjointed systems were also cited as a blocker by 34% of respondents.&lt;/p&gt;
 &lt;p&gt;A comprehensive change management process for people in the organization that started early was even more important for AI adoption at Insight Enterprises than software delivery checks and guardrails. When ChatGPT launched in 2022, evaluating how people in the organization responded to it was a key part of how Insight assessed the potential benefits of the technology, Orlandini said. Before the company developed any AI apps, a "walled garden" for internal experimentation by 14,000 employees served as the setting for an organizational approach to AI change management.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    The ones that were [saying] 'Burn it with fire' are finding out, 'This is a tool for me. I'd better use it, or I'm not going to be as useful to our company.' 
   &lt;/figure&gt;
   &lt;figcaption&gt;
    &lt;strong&gt;Juan Orlandini, &lt;/strong&gt;CTO, North America, Insight Enterprises
   &lt;/figcaption&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;During this early experimentation, Insight observed three categories of responses: highly -- sometimes overly -- enthusiastic early adopters; reluctant opponents of the technology; and, for the majority, "'Hey, this sounds really cool, but I don't know how to use it,'" Orlandini recalled. "'Where's the manual, where's the training?'"&lt;/p&gt;
 &lt;p&gt;In response, the company created a training program and platform called Flight Academy, where users start from very basic knowledge, such as "What is a prompt?'" and progress into deeper prompts, then connect the results of those prompts to their work. As users progressed, they competed individually and as teams. Flight Academy was initially an internal tool at Insight, but the company now sells it to clients.&lt;/p&gt;
 &lt;p&gt;"That lowered the barrier of entry for that broad middle group," Orlandini said. "The ones that were [saying] 'Burn it with fire' are finding out, 'This is a tool for me. I'd better use it, or I'm not going to be as useful to our company.' And the overly enthusiastic ones became some of the leaders."&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Evaluating 'a zillion good ideas'"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Evaluating 'a zillion good ideas'&lt;/h2&gt;
 &lt;p&gt;Flight Academy helped prepare Insight Enterprises for AI, but there was more to AI change management than employee training. Next, the company had to whittle down "a zillion good ideas" to focus on the ones that would deliver an ROI for the business. To do that, Insight created a platform called Insight Prism, which it also now sells to clients.&lt;/p&gt;
 &lt;p&gt;"We created an onboarding process for these ideas to be brought forth. Then [Prism] runs those ideas through an engine that spits out a business case and says, 'This idea is going to be amazing because it's going to generate this much more revenue, or it's going to save us this much more money,' or both," Orlandini said. It gives you a business justification for whether this thing is good or not. And for some of those ideas, the numbers are actually not so good, so we don't invest in those."&lt;/p&gt;
 &lt;p&gt;There are other tools companies can use to evaluate ideas for AI apps, ranging from &lt;a target="_blank" href="https://www.youtube.com/watch?v=eY3d5yFpKr8" rel="noopener"&gt;hosted cloud services&lt;/a&gt; to open source AI &lt;a target="_blank" href="https://phawm.org/" rel="noopener"&gt;risk assessment tools&lt;/a&gt;. Ducker Carlisle, a global consulting and M&amp;amp;A firm, uses StackAI to host a similar platform for its citizen developers to build and evaluate apps created using AI agents. This decentralized approach to AI application development and evaluation emerged because the initial phase of adoption generated an overwhelming number of niche requests for the company's centralized engineering team, raising concerns that employees would resort to shadow AI, according to Fabien Cros, chief data and AI officer at Ducker Carlisle.&lt;/p&gt;
 &lt;p&gt;In response, Cros drew on previous experience as data &amp;amp; AI country lead for manufacturing at Google Cloud in France to create a citizen developer and tool discovery program.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    When we see something that is rising fast, we look at it … and we ask, 'Can we do it better? Can we do it faster? Should we move it in-house?' 
   &lt;/figure&gt;
   &lt;figcaption&gt;
    &lt;strong&gt;Fabien Cros,&lt;/strong&gt;Chief data and AI officer, Ducker Carlisle
   &lt;/figcaption&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;"You let the users come up with ideas, build some stuff, even if it's limited, and then when you see adoption, you say, 'Is it core DNA for organization, or is it not?'" Cros said. "When it's not, you let it run through the [SaaS] platform and the [citizen developer] program. When it's core DNA you want deep monitoring. You want to control everything, end to end. It's like a pyramid, where you have a lot of use cases at the bottom, and then you bubble up the core use cases, and your central team [takes] over."&lt;/p&gt;
 &lt;p&gt;Ducker Carlisle also uses gamification techniques to assess the popularity of users' apps, which is reflected in a leaderboard and a rating system akin to GitHub stars.&lt;/p&gt;
 &lt;p&gt;"When we see something that is rising fast, we look at it and we say, 'That's a good use case, and apparently people like it,'" Cros said. "And we ask, 'Can we do it better? Can we do it faster? Should we move it in-house?'"&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="'The hackathon mentality'"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;'The hackathon mentality'&lt;/h2&gt;
 &lt;p&gt;Telus, a Canadian telecommunications and technology company, used its &lt;a href="https://www.techtarget.com/searchitoperations/news/366627684/Infrastructure-as-code-tools-advance-platform-evolution"&gt;internal developer platform&lt;/a&gt; (IDP) to host a hackathon where users tested AI tools, including AI infrastructure utilities, to determine which of the many choices in a teeming market would be most useful.&lt;/p&gt;
 &lt;p&gt;"We really adopted the hackathon mentality, especially last year," said Kulvir Gahunia, site reliability office director at Telus. "It's [done in] a controlled environment, but at the same time, we didn't put guardrails on what users wanted to hack on. The tool they build might or might not help, but sometimes the technology to get to that point is a game-changer."&lt;/p&gt;
 &lt;p&gt;One example of that is n8n, an AI workflow automation platform created by a company of the same name in Germany that has a &lt;a target="_blank" href="https://github.com/n8n-io/n8n" rel="noopener"&gt;source-available, self-hostable free version&lt;/a&gt;, which lent itself to use during the Telus hackathon.&lt;/p&gt;
 &lt;div class="imagecaption alignLeft"&gt;
  &lt;img src="https://cdn.ttgtmedia.com/rms/onlineimages/harrison_dana.jpg" alt="Dana Harrison, principal site reliability engineer, Telus"&gt;Dana Harrison
 &lt;/div&gt;
 &lt;p&gt;"In [about] 100 ideas that were submitted, something like 14 or 15 of them used n8n, so there were tons of little n8n instances running around," said Dana Harrison, principal site reliability engineer at Telus. "And we went, 'Oh, before this goes completely off the rails, this is clearly a need. So we met that need, got licensed, and we now have an agreement with n8n."&lt;/p&gt;
 &lt;p&gt;Given how fast AI tools are emerging and changing, following those indications of user need are a good way for an enterprise platform team to keep up with what's important to secure and support, Harrison said. Three days into setting up n8n as part of the internal platform, it had 1,300 users.&lt;/p&gt;
 &lt;p&gt;The fact that the company had already taken steps to centralize on an IDP based on CNCF's Backstage gave it a strong foundation for AI adoption. It had also taken steps to&amp;nbsp; consolidate its IT and business data using Dynatrace, and control and moderate corporate access to large language models with the Fuel iX platform. "We are trusted in what we do, which is a privileged place to be in," Harrison said of the Telus platform team. "What it also means is that when we develop, people listen."&lt;/p&gt;
 &lt;p&gt;One of the early internal AI adoption wins for Telus was a Slackbot, combined with an open source &lt;a target="_blank" href="https://github.com/turbopuffer" rel="noopener"&gt;search engine tool&lt;/a&gt; called turbopuffer, that gave users an easy way to search Dynatrace data.&lt;/p&gt;
 &lt;p&gt;It's a natural position for &lt;a href="https://www.techtarget.com/searchapparchitecture/tip/Treat-platform-engineering-as-a-competitive-advantage"&gt;enterprise platform engineers&lt;/a&gt; to be in, according to Gahunia -- AI was created to remove toil and offload repeated tasks, which is also the mission of platform teams, he said.&lt;/p&gt;
 &lt;p&gt;"We really embrace that mantra," he said. "A lot of the stuff that we started coming out with was, 'Hey, we do this all the time. Let's just automate this piece. Can we now leverage this somewhere else? Oh, yes, we can.' And it just organically started growing into this path that we're on now."&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="Final thoughts: lessons learned for IT leaders"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Final thoughts: lessons learned for IT leaders&lt;/h2&gt;
 &lt;p&gt;Finding opportunities to automate and remove toil from existing workflows using AI helps center the most useful tools but can also be a good starting point for people fearful about being replaced by the technology, Gahunia said.&lt;/p&gt;
 &lt;div class="imagecaption alignLeft"&gt;
  &lt;img src="https://cdn.ttgtmedia.com/rms/onlineimages/gahunia_kulvir.jpg " alt="Kulvir Gahunia, site reliability office director, Telus"&gt;Kulvir Gahunia
 &lt;/div&gt;
 &lt;p&gt;"It helps remove that fear of, 'AI is taking over my job,' because [users can see how to] use AI to enhance [their] work," he said. "It's not going to replace you, but you can leverage it to enhance your work and the outcomes you deliver. … That's a very key message for any organization to drive adoption."&lt;/p&gt;
 &lt;p&gt;For some workers, however, disruption is already undeniably taking place, Insight's Orlandini said, especially &lt;a href="https://www.techtarget.com/searchsoftwarequality/news/366626735/Vibe-coding-with-AI-sparks-debate-reshapes-developer-jobs"&gt;among software developers&lt;/a&gt;. AI is now performing the simple, entry-level tasks that used to help junior developers learn to build larger, more complex systems. Senior developers sometimes find themselves in a role more like a product manager, without the craft of developing code they've spent years honing and have come to enjoy.&lt;/p&gt;
 &lt;p&gt;"We need to be very mindful as leaders of understanding that this isn't just a technology thing," Orlandini said. "We have to manage the people and manage the expectations as much as we have to be able to consume this new capability."&lt;/p&gt;
 &lt;p&gt;For junior developers, managers should encourage them to start thinking about "the whys, rather than the hows, of building applications," he said. For senior developers, if a product manager role doesn't suit them, leaders should find other ways to put their expertise to use for the organization.&lt;/p&gt;
 &lt;p&gt;"People are wary of change because change implies the unknown -- help them through that unknown," Orlandini said. "Any amount of education that you put into your organization is going to pay dividends down the road.&lt;/p&gt;
 &lt;p&gt;"The other thing I tell IT leaders is, don't forget your roots. All the things that we've learned over the decades that we've been doing in IT still apply. Some of the things might happen faster, but not all of them, and some of the fundamentals are still there."&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Beth Pariseau, a senior news writer for Informa TechTarget, is an award-winning veteran of IT journalism. Have a tip? &lt;/i&gt;&lt;a href="mailto:beth.pariseau@informatechtarget.com?subject=News%20tip"&gt;&lt;i&gt;Email her&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>An Insight Enterprises CTO, an ex-Google AI lead, and SRE leaders from Telus offer tips to enterprise IT leaders struggling to cut through AI noise and realize business value.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/maze_g1289937803.jpg</image>
            <link>https://www.techtarget.com/searchitoperations/news/366640354/IT-leaders-share-enterprise-AI-change-management-tips</link>
            <pubDate>Mon, 16 Mar 2026 10:06:00 GMT</pubDate>
            <title>IT leaders share enterprise AI change management tips</title>
        </item>
        <item>
            <body>&lt;p&gt;Rapid, enthusiastic enterprise AI adoption has had some unanticipated consequences. Among them is the global RAM shortage that has shaken the tech market.&lt;/p&gt; 
&lt;p&gt;The AI data centers that power the tools we use every day require substantial memory to run their workloads. &lt;a href="https://www.computerweekly.com/news/366635013/Chip-makers-warn-of-a-looming-shortage-in-DRAM-and-SSD"&gt;Hyperscalers and data center developers bought large amounts of memory&lt;/a&gt; to provide this capability. However, manufacturing constraints, coupled with competition from the consumer market, have led to a memory shortage that began in 2025.&lt;/p&gt; 
&lt;p&gt;To counter the shortage, distributors tried limiting consumer purchases of hardware, and some manufacturers pivoted from consumer sales to high-demand, enterprise clients. As we enter 2026, the shortage persists. This begs the question: Will the global memory shortage impact enterprise AI adoption and innovation?&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Understanding the DRAMa"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Understanding the DRAMa&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchstorage/definition/RAM-random-access-memory"&gt;RAM&lt;/a&gt; is short-term computer memory that stores data for devices so it's readily available. It's mainly sold as dynamic RAM, or DRAM, which provides memory for all types of computers, including smartphones, gaming consoles and laptops.&lt;/p&gt;
 &lt;p&gt;In 2025, AI expansion exploded as hyperscalers raced to build data centers capable of supporting large-scale AI models, like ChatGPT, Claude and Gemini, that enterprises and individuals use. According to McKinsey &amp;amp; Company's 2025 State of AI &lt;a target="_blank" href="https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai" rel="noopener"&gt;survey&lt;/a&gt;, 88% of respondents said their organizations regularly use AI in at least one business function. AI has become an integral part of some business functions and workloads, and organizations are intent on maintaining or scaling them.&lt;/p&gt;
 &lt;p&gt;However, AI data centers require more memory than RAM and DRAM alone can provide. So, manufacturers and vendors shifted away from the production and distribution of RAM and DRAM to &lt;a target="_blank" href="https://www.techtarget.com/whatis/definition/high-bandwidth-memory" rel="noopener"&gt;high-bandwidth memory&lt;/a&gt;. HBM transfers data faster than RAM and DRAM, while optimizing its power consumption. It uses multiple DRAM dies stacked on top of one another to power its storage capabilities. With all the DRAM being purchased for AI storage and demand for HBM exceeding production capacity, a memory shortage has ensued.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/typical_data_center_equipment-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/typical_data_center_equipment-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/typical_data_center_equipment-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/typical_data_center_equipment-f.png 1280w" alt="A diagram showing the equipment a data center requires. " data-credit="TechTarget" height="453" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Data memory and storage are among the components that let data centers provide AI services.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The memory shortage has affected consumer markets, prompting distributors worldwide to &lt;a target="_blank" href="https://www.reuters.com/world/china/ai-frenzy-is-driving-new-global-supply-chain-crisis-2025-12-03/" rel="noopener"&gt;ration hardware&lt;/a&gt;, like SSDs that provide virtual RAM, and to raise prices. Enterprises are also facing high hardware and device prices, as well as rising prices from cloud vendors that provide AI tools and infrastructure and have to absorb or pass on the increasing cost of memory.&lt;/p&gt;
 &lt;p&gt;"Cloud and SaaS providers can absorb some of the supply-side shock, but they don't remove the cost," said Jeff Groom, director of engineering, AI, at Acre Security, which provides cloud and physical security technology. "In practice, those constraints often manifest elsewhere through pricing changes, usage caps, throttling or performance trade-offs. The shortage doesn't disappear; it just becomes less visible inside a service layer."&lt;/p&gt;
 &lt;p&gt;The scalability, efficiency and processing power of HBM let AI systems continue to operate. With HBM devices in short supply, can enterprises continue to adopt and scale AI?&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="What the memory shortage means for enterprise adoption"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What the memory shortage means for enterprise adoption&lt;/h2&gt;
 &lt;p&gt;With 88% of organizations reporting that they use AI in at least one business function, it's clear they are serious about &lt;a target="_blank" href="https://www.techtarget.com/searchenterpriseai/tip/10-steps-to-achieve-AI-implementation-in-your-business" rel="noopener"&gt;implementing AI&lt;/a&gt;. Faced with the current memory shortage, enterprises still seeking to adopt and scale AI are turning to the cloud said Alvin Nguyen, a senior analyst at Forrester Research.&lt;/p&gt;
 &lt;p&gt;"Bosses don't want to have to become subject matter experts if they don't have to. I think cloud kind of helps," he said. "Most companies just need to know they can run the AI models that meet regulations, provide an ROI and beat out the other solutions."&lt;/p&gt;
 &lt;p&gt;That has always been a major &lt;a target="_blank" href="https://www.techtarget.com/searchcloudcomputing/tip/Evaluate-on-premises-vs-cloud-computing-pros-and-cons" rel="noopener"&gt;benefit of cloud services&lt;/a&gt;: replacing the complexity of purchasing and owning on-premises hardware with pay-as-you-go compute services delivered by experts who can help as needed. But if cloud prices are just going to increase in response to the memory shortage, as Groom predicts, is this an adequate solution to the problem? It could be if the only other option to retain a competitive advantage with AI is to own and run the hardware on-premises.&lt;/p&gt;
 &lt;p&gt;For enterprises that do depend on owning their own hardware, Nguyen suggested what many are already doing: stockpiling now while possible. However, he also has other tips: Keep what you have longer or start buying used.&lt;/p&gt;
 &lt;p&gt;"Why buy yesterday's technology for today's prices?" he asked. "If you can go used, go with used IT assets. That may drive new behaviors and cause changes in the secondary market. This doesn't just impact AI; it impacts everything with IT."&lt;/p&gt;
 &lt;p&gt;Despite the memory shortage, Groom doesn't believe enterprises should be solely focused on the hardware. Instead, this will test the &lt;a target="_blank" href="https://www.channelfutures.com/artificial-intelligence/3-keys-ai-resilient-business" rel="noopener"&gt;resiliency&lt;/a&gt; of businesses' AI systems.&lt;/p&gt;
 &lt;p&gt;"When RAM becomes expensive or constrained, weak architecture gets exposed," he said. "Many organizations built AI strategies around large, general-purpose models rather than using smaller models tuned for specific tasks, which would be more efficient and more predictable."&lt;/p&gt;
 &lt;p&gt;Whether organizations shift to buying used hardware or migrate to cloud services, "a RAM shortage is unlikely to slow enterprise AI adoption on its own," Groom said.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="What's next in the memory market?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What's next in the memory market?&lt;/h2&gt;
 &lt;p&gt;Experts agree that the memory shortage isn't permanent. However, it could take &lt;a target="_blank" href="https://www.cnbc.com/2026/01/26/memory-chip-shortage-synopsys-lenovo-ai-data-centers.html" rel="noopener"&gt;two years&lt;/a&gt; to see relief and a market correction from the effects of the shortage. And a lot can happen in two years.&lt;/p&gt;
 &lt;p&gt;The memory shortage "will reward organizations with disciplined architecture and strong controls, and expose the ones that scaled faster than their guardrails," Groom said. An extended shortage like the one we're experiencing could open some organizations to &lt;a target="_blank" href="https://www.techtarget.com/searchdatamanagement/tip/AI-data-governance-is-a-requirement-not-a-luxury" rel="noopener"&gt;AI security and governance&lt;/a&gt; concerns, he added.&lt;/p&gt;
 &lt;p&gt;"When RAM or GPU capacity becomes a bottleneck, teams are more likely to look for workarounds to keep projects moving," Groom said. "That can lead to merged workloads, weaker separation controls or shortcuts in deployment and access management if governance isn't strong."&lt;/p&gt;
 &lt;p&gt;According to Forrester's Nguyen, this shortage could create an extreme market correction if manufacturing can't keep pace with demand. However, hyperscalers are continuing to buy memory wherever they can, often at inflated prices, to maintain their competitive advantage.&lt;/p&gt;
 &lt;p&gt;"Having a clear advantage can sway who you go with," he said. "Hyperscalers are basically locked into this until they see it's time to quit, whether one of their competitors or multiple competitors quit funding this AI race or until customers declare a winner by dumping the other [hyperscalers]. It's a race to the finish," he said.&lt;/p&gt;
 &lt;p&gt;However, instead of crossing a finish line, Nguyen said we could end up popping a bubble, or even bubbles. Without realizing more gains and innovation from AI, or if we experience severe market correction spurred by other shortages or disruptions to AI development, the proverbial sword of Damocles could fall, and the AI bubble could burst. While it might be painful for global markets, Nguyen said he doesn't think this will be the end.&lt;/p&gt;
 &lt;p&gt;"Saudi Arabia, U.K., U.S., Japan, China, all of these countries are invested," he said. "I have a feeling it's going to be too big to fail. Not that they don't come out without pain."&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Everett Bishop is the assistant site editor for AI &amp;amp; Emerging Tech and the previous assistant site editor for SearchCloudComputing. He graduated from the University of New Haven in 2019.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Enterprises bought up computer memory to fuel AI adoption. Now, amid a memory shortage, analysts share insights on what this means for enterprise AI adoption and what's next.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ai_a205627811.jpg</image>
            <link>https://www.techtarget.com/searchenterpriseai/feature/Is-the-AI-memory-shortage-stifling-enterprise-adoption</link>
            <pubDate>Mon, 16 Mar 2026 09:54:00 GMT</pubDate>
            <title>Is the AI memory shortage stifling enterprise adoption?</title>
        </item>
        <item>
            <body>&lt;p&gt;Aetna has agreed to pay $117.7 million to resolve allegations that it violated the False Claims Act by submitting inaccurate or untruthful diagnosis codes for its Medicare Advantage Plan enrollees, according to a Department of Justice &lt;a href="https://www.justice.gov/usao-edpa/pr/aetna-agrees-pay-1177-million-resolve-allegations-it-violated-false-claims-act"&gt;press release&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;The alleged practice can result in fraudulent overpayments to Medicare Advantage plans, which United States Attorney General David Metcalf said is a diversion of government resources.&lt;/p&gt; 
&lt;p&gt;"The government pays Medicare Advantage Organizations to facilitate vital healthcare to our seniors and other vulnerable citizens," Metcalf said in the press release. &lt;br&gt;"When corporations or individuals threaten the Medicare Advantage program by diverting those limited government resources through fraud, waste or abuse, we will continue to pursue all available remedies against them."&lt;/p&gt; 
&lt;p&gt;Medicare Advantage operates by having plans submit diagnosis codes to the Centers for Medicare &amp;amp; Medicaid Services (CMS) to &lt;a href="https://www.healthcaredive.com/news/cms-proposed-2027-advance-notice-chart-reviews-medicare-advantage/810549/"&gt;determine the monthly payment each plan will receive&lt;/a&gt;. Those diagnosis codes inform risk adjustment, which ensures plans that cover sicker or more complex patients -- meaning patients who are more expensive to cover -- will get higher monthly payments.&lt;/p&gt; 
&lt;p&gt;The lawsuit contends that Aetna submitted diagnosis codes to CMS that inaccurately or untruthfully inflated its &lt;a href="https://www.techtarget.com/healthtechanalytics/feature/Using-Risk-Scores-Stratification-for-Population-Health-Management"&gt;risk pool&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;In 2015, the payer received charts from its contracted provider partners for individuals covered by Aetna's Medicare Advantage plan. Typically, Medicare Advantage plans use these charts to conduct a chart review and then submit diagnosis codes to CMS.&lt;/p&gt; 
&lt;p&gt;But according to the court, Aetna submitted additional diagnosis codes to CMS "that the healthcare providers had not reported for the beneficiaries to obtain additional payments from CMS," the court said.&lt;/p&gt; 
&lt;p&gt;As part of the lawsuit, the United States argued that Aetna used its chart reviews to seek additional payments from CMS but did not use those same results when it provided information about potential overpayments. A total of $106,200,000 of the settlement amount resolves those allegations, the Department of Justice said.&lt;/p&gt; 
&lt;p&gt;The remaining $11,500,000 of the settlement will resolve allegations that between 2018 and 2023, Aetna knowingly submitted or failed to delete inaccurate and untruthful diagnosis codes for morbid obesity among individuals without a BMI to substantiate those diagnosis codes. This resulted in overpayments from CMS, the court said.&lt;/p&gt; 
&lt;p&gt;"Medicare Advantage relies on accurate reporting and attempts to manipulate the system undermine both the program's integrity and the beneficiaries it serves," Acting Deputy Inspector General for Investigations Scott J. Lampert of the U.S. Department of Health and Human Services, Office of Inspector General, said in a statement.&lt;/p&gt; 
&lt;p&gt;"Today's settlement makes clear that no company is beyond accountability, no matter how large or well known. Those who seek to exploit Medicare Advantage should expect to be identified and held responsible, and HHS‑OIG will continue to protect taxpayer funds and the integrity of this vital program."&lt;/p&gt; 
&lt;p&gt;According to Assistant Attorney General Brett A. Shumate of the Justice Department's Civil Division, Medicare Advantage plans can expect the Department to continue monitoring for fraudulent practices.&lt;/p&gt; 
&lt;p&gt;"The government pays private insurers over $530 billion each year to care for Americans enrolled in Medicare Advantage,” Shumate said in the press release. "We will continue to hold accountable insurers that knowingly submit inaccurate or unsupported diagnoses to improperly inflate reimbursement."&lt;/p&gt; 
&lt;p&gt;&lt;i&gt;Sara Heath has reported news related to patient engagement and health equity since 2015.&lt;/i&gt;&lt;/p&gt;</body>
            <description>The Department of Justice said Aetna submitted inaccurate diagnosis codes to untruthfully inflate its risk pool.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/legal_g1065824400.jpg</image>
            <link>https://www.techtarget.com/healthcarepayers/news/366640455/Aetna-to-pay-1177M-to-settle-Medicare-Advantage-false-claims-case</link>
            <pubDate>Mon, 16 Mar 2026 09:11:00 GMT</pubDate>
            <title>Aetna to pay $117.7M to settle Medicare Advantage false claims case</title>
        </item>
        <title>Search IoT Resources and Information from TechTarget</title>
        <ttl>60</ttl>
        <webMaster>webmaster@techtarget.com</webMaster>
    </channel>
</rss>
