European AI in ITSM: more than RODO compliance

Organisations in Europe are redefining their approach to implementing artificial intelligence in IT service management. Performance is no…

AI agents vs chatbots – let’s not confuse one with the other

In recent months, artificial intelligence agents have become one of the hottest topics in the IT industry. The…

What does a cyber attack on Microsoft SharePoint mean for business?

The ongoing 'ToolShell' cyberattack campaign against local Microsoft SharePoint servers is not just another security incident. It is…

CDO vs CIO vs CTO: The new division of power in the digital company

Not so long ago, the CIO was the sole representative of the technology world in the boardroom. His…

‘Non-negotiable’: why the Chinese market remains key to US technology development

Despite the piling up of trade barriers, export restrictions and geopolitical tensions that constantly threaten to disrupt the…

Why are AI projects failing? Companies reveal their biggest pain points

Implementing artificial intelligence in a company does not yet mean success. Often projects that promised to be promising…

Is the robot in the warehouse just a machine? Logistics is entering the IT/OT era

Warehouses in which robots autonomously transport goods, recognise their surroundings and communicate with management systems were, until recently,…

Burnt out but productive? IT is looking for a new working rhythm

In the technology industry, productivity is sacrosanct. Speed, responsiveness and efficiency are the currencies used to pay for…

Edge AI is coming faster than you think – what does it mean for the IT channel?

Until recently, edge computing was regarded as a technology at the intersection of industry, research and development. Although…

The end of 2G and 3G. Europe extinguishes old networks, but what about millions of IoT devices and legacy systems?

By 2026, most European countries plan to completely switch off 2G and 3G networks. This is a technologically…

Tech debt bankrupcy: time to zero out technology debt

In 2025, companies are not just cutting IT costs - they are increasingly saying: we are resetting everything.…

Data Centric Security is the future. Is your IT security keeping up?

For years, IT security has been designed around one principle: strengthen the perimeter - the boundaries of the…

Positive attitude towards AI = more time on social media? Here are the results of the survey

A new study by researchers at the University of Macau shows that people who are positive about artificial…

IT spending is slowing down. Companies are taking a more cautious approach to purchasing decisions

Although global IT spending is expected to grow by nearly 8 per cent in 2025 - to $5.43…

The myth of the energy AI boom: report exposes weaknesses in forecasts

The investment fever around artificial intelligence is fuelling ambitious forecasts for the growth of data centre power consumption.…

Cyber security OT: Why is the industry still standing still?

Despite growing cyber threats and increasing regulatory pressure, the industrial sector continues to delay the integration of cyber…

How deepfake is changing the tactics of social engineering attacks

Until recently, social engineering was mainly associated with a suspicious email from a 'finance director' or a phone…

AI won’t save a poorly designed process: How to map workflows before implementing automation

Many organisations are enthusiastically investing in AI-based tools, hoping for immediate results - faster processes, time savings and…

Is the virtualisation market in for a reset? What will be left of VMware in 3 years’ time

At the end of 2023, when Broadcom finalised its acquisition of VMware, customer reactions were mixed - ranging…

Nvidia king of AI chips – US and China wage cold war over hardware of the future

When Nvidia broke through the historic $4 trillion market capitalisation threshold, the world focused on titles like 'world's…

Vishing and smishing – a new wave of threats that IT is not on the radar

For years, phishing meant suspicious emails with attachments, typos and links leading to fake login pages. Not surprisingly,…