Back to offices – Why IT giants risk losing talent

The wave of returns to the office, spearheaded by tech giants, is confronting the industry with the fundamental…

The lost innocence of the web: the story of the first great cyber attack

On November 2, 1988, a program consisting of just 99 lines of code, written by a single student,…

The boundary between chatbot and AI agent – why the difference matters for business

Chatbots have been supporting companies in simple customer service processes for years, but their capabilities end in reactive…

Is your team still learning? Stalled development not visible in CRM

A team that stops learning doesn't stop - it begins to regress, only slowly and imperceptibly. Leaders in…

Companies forget that poor infrastructure will bear the brunt of AI ambitions

A new global study shows a worrying gap between business ambition and real-world technology readiness. Business leaders are…

Phishing training is losing its lustre: why effectiveness is lower than the market promises

The largest study to date on the effectiveness of phishing training shows that the effects of employee education…

Automation in HR IT: The symbiosis of AI effectiveness and human strategy

In the constant battle for IT talent, HR departments are drowning in repetitive tasks - from sifting through…

4 AI trends that will define the coming years

For business, the time of fascination with the possibilities of generative AI is coming to an end, and…

New IT infrastructure: how companies are designing AI environments without energy compromises

Artificial intelligence is changing how companies approach IT infrastructure design - it's no longer just computing power that…

Printing in SMEs: from an operating cost to a strategic business tool

For years, the main criterion for the selection of printing devices in small and medium-sized businesses has been…

Nuclear power or windmills? The data centre industry is looking for a plan B to power AI

The rise of artificial intelligence in the technology market has triggered an exponential increase in the demand for…

Clickjacking as part of the attack chain: an underestimated threat in security architecture

Clickjacking has remained on the periphery of security departments' attention for years - regarded more as a threat…

Energy efficiency in the data centre – from cost to profit source

Until a few years ago, green transformation in the data centre was treated as an expensive add-on -…

When to say no to a customer? Partner channel and leadership courage

In IT channels, for years there was a simple rule: the customer is always right and the partner…

AI after the awe phase – how CIOs can turn experimentation into real return on investment

In 2025, artificial intelligence is still one of the main drivers of digital transformation strategies. Budgets are increasing,…

Why every cable in a factory today is a potential entry point for a hacker

Just a decade ago, the industrial production line was a closed world. Machines ran on isolated networks and…

The biggest security gap in AI is not the code. It’s the people

In 2023, a quiet drama unfolded in the corridors of tech giant Samsung. It was not a hacking…

DORA: New RODO or a hidden vein of gold for the IT industry?

The date of 17 January 2025 is firmly on the calendars of the European financial sector and its…

Artificial intelligence systems and copyright

Artificial intelligence (AI) systems can be distinguished into two basic groups, which differ both technologically and legally, namely…

Artificial intelligence is writing more and more scientific texts. What does this mean for the quality of publications?

More and more scientific articles are being written with the support of generative artificial intelligence. Language models such…

Second-hand ransomware. How copying code lowers the barrier to entry to cybercrime

If cybercrime had its own GitHub, Nitrogen ransomware and LukaLocker would be its popular forks. An increasing number…