The end of the dictates of one model. Cyber security in 2026 will belong to hybrids and pragmatic AI
In 2026, the technical security industry will finally abandon the rigid division between cloud and local infrastructure, opting…
Drowning in alarms: why your SOC needs context, not data
Until recently, the IT industry believed that the key to digital security was collecting every possible byte of…
Managed services is a marathon, not a sprint. 5 steps to choosing a strategic partner
Managed services are no longer just a way to cut costs, but have become a key driver of…
Phishing 2.0: Why are cyber fraudsters still one step ahead?
Once hackers, now criminal corporations. In the first half of 2025, CERT Polska registered over 100,000 phishing domains.…
The calm before the storm: what does the Cloudflare failure teach us about ‘latent errors’ and proactive monitoring?
An analysis of a recent incident at Cloudflare proves that in modern distributed systems, the line between stability…
Deloitte’s Expensive Hallucinations. A $1.6m report full of AI hallucinations
Deloitte's credibility has once again been called into question after a $1.6 million report for the Canadian government…
From soloist to manager. How the CPU gave up the crown to save performance
The myth of the processor as a one-man band has finally collapsed under the weight of modern demands…
Death of reactive defence. Trend Micro: Machines will attack faster than you can blink
By 2026, the cybercrime operating model will undergo a radical transformation, with human hackers being replaced by autonomous…
AI democratises cybercrime. Windows on target for hackers
The arms race in cyberspace has entered a new phase, with artificial intelligence becoming a key ally of…
The end of the ‘lone wolf’. The future of cyber security is managed services
The romantic vision of the “lone wolf” in IT is definitely becoming a thing of the past under…
Palo Alto Networks warns: IT infrastructure replacement by 2029 is inevitable
While the tech industry is caught up in the AI gold rush, the CEO of Palo Alto Networks…
UX writing is not fukurawai
Fukurawai is a traditional Japanese game in which a child - blindfolded - tries to arrange eyes, eyebrows,…
Cloudflare global outage resolved. Company names culprit
Tuesday's paralysis of key internet services, including X and ChatGPT, turned out to be the result of an…
Google challenges Wall Street. Gemini 3 is meant to make money, not just impress
By introducing Gemini 3 directly into its most profitable products on launch day, Google is ending the theoretical…
Investment in ERP: Will KSeF and AI replace traditional implementations
The Polish ERP market has reached a level of maturity where spectacular, one-off capital investments (CAPEX) are naturally…
A factory is not an office. Why do IT methods fail in manufacturing security and how to do it right?
Many industrial companies still labor under the misconception that traditional IT security measures are sufficient to protect critical…
A surprising ranking of (insecure) AI models. Which assistant is easiest to become a hacker?
Mass deployments of generative AI have become commonplace in business, driving productivity and automation in nearly every sector.…
Intel is betting on a single standard. Future Xeon 7 chips exclusively with 16 memory channels
Intel is radically simplifying its future server offering by standardizing it around higher memory bandwidth. As a result,…
Logitech confirms attack. Customer and employee data at risk after Oracle vulnerability
Logitech has confirmed a security incident in which hackers gained access to company, customer, and supplier data. The…
GPT-5.1 gets a promotion. The new apply_patch tool is no longer an assistant, it’s a developer
Following the recent release of GPT-5.1, OpenAI has published a key guide for developers that aims to redefine…
The data centre gap is growing. Old systems can’t cope with AI, power and regulation
The explosion in popularity of AI and growing regulatory requirements are putting traditional data centers in the EMEA…
