AI is building a new startup elite. Eight leaders worth more than $500bn

The ecosystem of technology startups is undergoing a fundamental transformation. The new determinant of value is no longer simply growth…

Huawei stumble delays DeepSeek and exposes weaknesses in China’s AI strategy

Chinese AI startup DeepSeek has had to delay the release of its highly anticipated R2 model. The reason…

Clickjacking as part of the attack chain: an underestimated threat in security architecture

Clickjacking has remained on the periphery of security departments' attention for years - regarded more as a threat…

Energy efficiency in the data centre – from cost to profit source

Until a few years ago, green transformation in the data centre was treated as an expensive add-on -…

AI after the awe phase – how CIOs can turn experimentation into real return on investment

In 2025, artificial intelligence is still one of the main drivers of digital transformation strategies. Budgets are increasing,…

Why every cable in a factory today is a potential entry point for a hacker

Just a decade ago, the industrial production line was a closed world. Machines ran on isolated networks and…

Windows 2030: Microsoft is betting everything on AI

Microsoft has revealed a glimpse of its long-term vision for the world's most popular operating system. In a…

The cyber security market is not slowing down. Here’s what’s driving it

Global spending on cyber security is growing at a double-digit rate. According to the latest forecasts from analyst…

A secret supply route for Russian armaments has been uncovered. Traces lead to Siemens and China

Russian state-owned arms factory Biysk Oleum (BOZ) has acquired advanced production automation equipment from Siemens, despite the sanctions…

Artificial intelligence is writing more and more scientific texts. What does this mean for the quality of publications?

More and more scientific articles are being written with the support of generative artificial intelligence. Language models such…

The $18bn video conferencing market is just beginning. Who will win the war for the meeting rooms of the future?

The global video conferencing market, growing by 5% a year despite economic uncertainty, is proving its strength. However,…

Second-hand ransomware. How copying code lowers the barrier to entry to cybercrime

If cybercrime had its own GitHub, Nitrogen ransomware and LukaLocker would be its popular forks. An increasing number…

ReVault: Five serious security vulnerabilities in over 100 Dell laptop models

Cisco Talos has disclosed five serious vulnerabilities in the Dell ControlVault3 firmware and associated Windows APIs. Collectively named…

AI in cyber security, or how to save $1.76m and reduce attack response by 108 days

Every IT leader and security director knows this scenario all too well: the endless stream of security alerts,…

The end of ‘nice bosses’. Why your team needs honesty, not empty empathy

In the tech industry, where the battle for talent is a daily reality and remote and hybrid working…

Technological arms race – who is using and who is fighting deepfake?

The rise of deepfake fraud is accelerating, forcing companies into a technological arms race. As artificial intelligence becomes…

Post Quantum Cryptography: Business implications of algorithm choice

Today's digital economy rests on an invisible but fundamental pillar: public key cryptography. Algorithms such as RSA and…

AI in coding – the end of the honeymoon and pragmatic reality

Artificial intelligence is increasingly making its way boldly into developers' workbenches, but initial enthusiasm is giving way to…

The 40 professions most likely to be affected by generative AI. Translators, teachers, analysts – who’s next?

A new report by researchers from Microsoft Research and OpenAI analyses the real-world impact of generative AI on…

IT’s hidden enemy. How is automation overcoming technology debt?

IT departments find themselves in the eye of the cyclone. Growing macroeconomic pressures, the explosion of remote and…

OT cyber security at the target of ransomware. How one mistake leads to production paralysis

The convergence of information technology (IT) and operational technology (OT) is accelerating, but its implementation is still fraught…

3 forces that have changed the role of the CIO forever

Over the past ten years, the role of the CIO has undergone a fundamental transformation. From being the…

Wyselekcjonowane specjalnie dla Ciebie treści w oparciu o Twoje preferencje myBIT.