Mobile Security

Related News

What role does NHI play in secure tech environments

  • None
  • Published date: 2026-01-29 00:00:00

None

<h2>How Are Non-Human Identities Paving the Way for Secure Tech Environments?</h2><p>The digital transformation of industries has raised numerous questions about safeguarding sensitive information. How do organizations effectively manage machine identities to create secure environments? Enter the concept of Non-Human Identities (NHIs), a linchpin in fortifying tech security, especially when businesses transition to cloud-based systems.</p><h3>Understanding Non-Human Identities and Their Importance</h3><p>Non-Human Identities are pivotal in tech security, acting as the digital equivalents of passports for machines. Just as passports verify human identities, NHIs authenticate machines within expansive networks, ensuring only authorized access to crucial data. But what exactly constitutes an NHI? At its core, an NHI is derived from a “Secret”—an encrypted password, token, or key—and the permissions attached to that Secret. This interplay is akin to a passport paired with a visa, granting controlled access to specific digital.</p><p>By bridging the gap between security and research and development teams, NHI management effectively addresses vulnerabilities that often go unnoticed. This holistic approach does more than just issue digital passports; it offers robust oversight and protection of the entire lifecycle of machine identities, from discovery to remediation.</p><h3>The Multi-Industry Relevance of NHIs</h3><p>Non-Human Identities resonate across various sectors, from financial services to healthcare and travel. Their significance is notably pronounced in cloud-based environments, where machine-to-machine interactions are prevalent. DevOps teams, Security Operations Centers (SOC), and companies relying heavily on cloud infrastructure can benefit immensely from integrating comprehensive NHI management strategies.</p><p>Industries such as financial services and healthcare, where regulation and data protection are paramount, gain added layers of security by managing NHIs effectively. By automating the management of NHIs and secrets, professionals can ensure compliance with stringent regulatory requirements and create a secure cloud environment. Moreover, this automation allows cybersecurity personnel to focus on strategic initiatives, enhancing both security protocols and operational efficiency.</p><h3>Lifecycle Management: From A to Z</h3><p>The lifecycle of an NHI encompasses several stages that require diligent oversight:</p><ul> <li><strong>Discovery:</strong> Identifying all machine identities is the first step toward safeguarding them. By cataloging NHIs, organizations can prevent shadow IT and unauthorized access.</li> <li><strong>Classification:</strong> Once identified, NHIs need to be categorized based on various criteria, such as access level and associated risks. This step aids in prioritizing security measures.</li> <li><strong>Threat Detection:</strong> Advanced algorithms and monitoring tools help identify anomalous activities, signaling potential breaches or misuse.</li> <li><strong>Remediation:</strong> Swift action is key in addressing identified threats. Automating response procedures ensures timely mitigation, minimizing damage.</li> </ul><p>However, unlike traditional point solutions, comprehensive NHI management platforms provide nuanced insights into ownership, permissions, usage patterns, and potential vulnerabilities, allowing for a more context-aware security.</p><h3>Benefits of Effective NHI Management in Secure Environments</h3><p>The merits of employing a robust NHI management system extend far beyond mere compliance:</p><ul> <li><strong>Reduced Risk:</strong> Proactive risk identification and mitigation strategies significantly decrease the chances of data breaches and leaks.</li> <li><strong>Improved Compliance:</strong> With a clear audit trail and enforced policies, organizations can seamlessly meet regulatory requirements.</li> <li><strong>Increased Efficiency:</strong> Automation of NHIs and secrets management liberates security teams to focus on higher-order functions.</li> <li><strong>Enhanced Visibility and Control:</strong> A centralized platform offers a comprehensive view of all machine identities, streamlining governance processes.</li> <li><strong>Cost Savings:</strong> By automating processes such as secrets rotation and NHIs decommissioning, organizations can reduce operational costs significantly.</li> </ul><p>Given these advantages, the emphasis on nurturing a solid foundation of NHIs cannot be overstated. A strategic approach not only fosters secure tech environments but also enhances organizational resilience.</p><p>Where digital assets are as valuable as their tangible counterparts, ensuring their protection is not just necessary—it is paramount. For more insights into how these elements influence cybersecurity strategies, you can explore <a href="https://entro.security/blog/cybersecurity-predictions-2025/" rel="noopener">Cybersecurity Predictions 2025</a> or understand the value of good secrets management in <a href="https://entro.security/blog/good-secrets-management-for-cutting-security-budget/" rel="noopener">cutting security budgets</a>.</p><p>While we delve deeper into understanding the role of NHIs, it becomes evident that they are instrumental in crafting secure environments, setting the standard for tech security. Embracing this approach not only mitigates risks but also ensures a structured and efficient security framework for organizations navigating the complexities of digital transformation.</p><h3>Navigating Key Challenges in Managing NHIs</h3><p>What are some of the pressing challenges that organizations face when managing Non-Human Identities (NHIs)? Riddled with complexities, requiring a keen focus on both security and efficiency. One significant issue is the problem of identity sprawl. Where organizations grow and expand their digital operations, the number of NHIs can increase exponentially. Without proper oversight, this can lead to a chaotic system where tracking every machine identity becomes daunting, increasing the risk of security oversights.</p><p>Moreover, the secure storage and management of secrets—those encrypted tokens, passwords, or keys essential to NHIs—pose additional layers of complexity. If not managed appropriately, secrets can be leaked, leading to severe security breaches. The automation of secrets management, therefore, becomes crucial, offering a reliable safeguard against human error while ensuring that machine identities remain both effective and secure.</p><p>To better manage these challenges, organizations need an adaptable security solution that evolves with technological advancements to effectively monitor and address potential vulnerabilities associated with NHIs. Such solutions should seamlessly integrate with existing IT infrastructures, thereby augmenting security measures without significantly altering current workflows.</p><h3>Strategies for Ensuring Robust NHI Security</h3><p>Protecting Non-Human Identities is not only a technical endeavor but a strategic one, demanding a multi-layered approach. Here are several key strategies that can enhance this process:</p><ul> <li><strong>Adopt a Zero Trust Model:</strong> Enforcing this security principle ensures that each machine identity must be verified every time access is requested. This reduces reliance on traditional perimeters and provides higher security assurance.</li> <li><strong>Continuous Monitoring:</strong> Leverage AI and machine learning tools to enable real-time surveillance of NHIs, allowing prompt identification of abnormal patterns that could indicate potential threats.</li> <li><strong>Implement Role-Based Access Control (RBAC):</strong> Limit machine identity permissions based on role requirements to minimize exposure and potential misuse.</li> <li><strong>Regularly Audit and Update Secrets:</strong> Frequent rotation and auditing of secrets help maintain their integrity and enhance security posture.</li> <li><strong>Training and Awareness:</strong> Develop comprehensive training programs for IT teams to underscore the importance of NHIs in maintaining robust cybersecurity frameworks.</li> </ul><p>For insights on effectively implementing these strategies, including real-world use cases, check out the <a href="https://entro.security/blog/use-case-secure-non-human-identities/">NHI and Secure Non-Human Identities</a> article.</p><h3>Why NHI Management is Integral to Regulatory Compliance</h3><p>How do regulatory frameworks intersect with NHI management, and why is their integration pivotal for many sectors? Regulatory bodies, especially in fields like finance and healthcare, impose stringent requirements to protect sensitive data. Non-compliance can result in hefty fines and reputational damage, emphasizing the need for robust NHI frameworks.</p><p>NHI management facilitates adherence by ensuring all machine identities are tracked, monitored, and managed according to legislative standards. Automated policies and audit trails keep businesses within compliance boundaries, thus enhancing trust with clients and partners.</p><p>For a deep dive into how NHI management correlates with regulatory success, you can consult more comprehensive analysis in the <a href="https://entro.security/blog/cybersecurity-risk-mitigation-recommendations-2024/">Cybersecurity Risk Mitigation Recommendations for 2024</a>.</p><h3>Nurturing a Culture of Security and Innovation</h3><p>With cyber threats evolves, how can organizations stimulate innovation while maintaining robust security measures? Balancing these priorities is crucial for long-term success. By embedding security measures into the fabric of organizational culture, teams can foster innovation without jeopardizing security.</p><p>Incorporating NHIs when a cornerstone in security protocols allows businesses to focus on creativity and growth. By alleviating the burden of manual identity management tasks, cybersecurity teams can dedicate more resources to pioneering innovations and enhancing their technological edge.</p><p>Moreover, the emphasis on collaboration between security and R&amp;D teams encourages a more cohesive approach to tech development, further ensuring that security measures are proactive rather than reactive.</p><h3>Case Studies: Learning from Past Challenges</h3><p>What lessons can we derive from previous cybersecurity lapses associated with machine identities? High-profile security breaches, such as those in 2023, have underscored the perennial vulnerabilities of poorly managed NHIs. These cases highlight the critical importance of comprehensive NHI oversight in preempting unauthorized access and securing digital assets.</p><p>Analyzing such incidents helps organizations understand common pitfalls and develop better-risk mitigation strategies. For more details on influential cybersecurity leaks and what they teach about NHI management, explore the <a href="https://entro.security/blog/6-infamous-cybersecurity-leaks-of-2023/">six infamous cybersecurity leaks of 2023</a>.</p><p>Navigating expansive digital demands a keen understanding of NHIs and their security framework. By adopting a strategic, well-orchestrated approach to NHI management, organizations can cultivate a more resilient and secure digital, paving the way for sustained innovation and operational excellence.</p><p>The post <a href="https://entro.security/what-role-does-nhi-play-in-secure-tech-environments/">What role does NHI play in secure tech environments</a> appeared first on <a href="https://entro.security/">Entro</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/what-role-does-nhi-play-in-secure-tech-environments/" data-a2a-title="What role does NHI play in secure tech environments"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhat-role-does-nhi-play-in-secure-tech-environments%2F&amp;linkname=What%20role%20does%20NHI%20play%20in%20secure%20tech%20environments" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhat-role-does-nhi-play-in-secure-tech-environments%2F&amp;linkname=What%20role%20does%20NHI%20play%20in%20secure%20tech%20environments" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhat-role-does-nhi-play-in-secure-tech-environments%2F&amp;linkname=What%20role%20does%20NHI%20play%20in%20secure%20tech%20environments" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhat-role-does-nhi-play-in-secure-tech-environments%2F&amp;linkname=What%20role%20does%20NHI%20play%20in%20secure%20tech%20environments" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhat-role-does-nhi-play-in-secure-tech-environments%2F&amp;linkname=What%20role%20does%20NHI%20play%20in%20secure%20tech%20environments" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://entro.security/">Entro</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Alison Mack">Alison Mack</a>. Read the original post at: <a href="https://entro.security/what-role-does-nhi-play-in-secure-tech-environments/">https://entro.security/what-role-does-nhi-play-in-secure-tech-environments/</a> </p>

Why is scalable AI security important for growth

  • None
  • Published date: 2026-01-29 00:00:00

None

<h2>Are You Managing Non-Human Identities Effectively?</h2><p>The strategic management of Non-Human Identities (NHIs) is more important than ever for organizations expanding their cloud-based operations. NHIs, which consist of encrypted passwords, tokens, or keys combined with permissions, play a crucial role in securing machine identities. However, the inadequacies in managing them can create significant security vulnerabilities. Understanding the lifecycle of NHIs and implementing comprehensive security measures is essential for various industries, including financial services, healthcare, and technology-driven sectors like DevOps and SOC teams.</p><h3>Understanding Non-Human Identities in Cybersecurity</h3><p>The concept of NHIs centers around the idea of machine identities and their secrets—dynamic elements that make automated systems run securely and efficiently. Each NHI is akin to a digital tourist, with its “passport” being the secret and its “visa” being the permissions it carries. Just as travelers are scrutinized based on their travel documents and behavior, NHIs must be carefully managed and monitored. This includes all stages, from discovery and classification to threat detection and remediation.</p><p>While point solutions like secret scanners might offer some protection, they often fall short of providing a complete security framework. On the contrary, NHI management focuses on holistic protection by offering insights into ownership, permissions, usage patterns, and potential vulnerabilities, which enable context-aware security.</p><h3>The Necessity of Scalable AI in NHI Management</h3><p>Businesses are increasingly turning to scalable AI. This approach provides enhanced capabilities for NHI management. By automating tasks, scalable AI can significantly lessen the cognitive load on security teams, allowing them to allocate resources to strategic areas that drive business growth.</p><p>The implementation of scalable AI in NHIs ensures that organizations can handle increased workloads without compromising security standards. By doing so, enterprises can foster an environment of innovation, agility, and security—a crucial combination for businesses that aim for sustainable growth.</p><h3>Key Benefits of Effective NHI Management</h3><p>A structured approach to NHI management delivers significant advantages that extend well beyond basic security:</p><ul> <li><strong>Reduced Risk:</strong> By proactively identifying and mitigating security risks, NHI management reduces the likelihood of breaches and data leaks.</li> <li><strong>Improved Compliance:</strong> Helps organizations meet regulatory requirements through policy enforcement and audit trails.</li> <li><strong>Increased Efficiency:</strong> Automating NHIs and secrets management allows security teams to focus on strategic initiatives.</li> <li><strong>Enhanced Visibility and Control:</strong> Provides a centralized view for access management and governance.</li> <li><strong>Cost Savings:</strong> Operational costs are reduced by automating secrets rotation and NHIs decommissioning.</li> </ul><p>These benefits highlight the importance of scalable AI in any security strategy, effectively safeguarding against threats and ensuring seamless growth.</p><h3>Bridging the Gap Between Security and R&amp;D Teams</h3><p>The disconnect between security and R&amp;D teams often leads to gaps in security measures. This is where effective management of NHIs becomes essential. By integrating scalable AI, organizations can synchronize efforts between these teams, ensuring that security protocols are not an afterthought but an integral part of the development lifecycle. This collaboration fosters a secure cloud environment that is both resilient and adaptable.</p><p>Additionally, robust NHI management solutions facilitate a transparent interaction between different departments, driving cohesion and shared understanding. This approach not only strengthens security posture but also promotes an organizational culture that values innovation and security equally.</p><h3>Real-World Impact of NHI Mismanagement</h3><p>Failure to adequately manage NHIs can have devastating consequences. In recent years, data breaches due to poor secrets management have led to significant financial losses and damaged reputations across various industries. For instance, the healthcare and financial sectors have seen breaches that resulted in the theft of sensitive data, emphasizing the critical need for effective security protocols.</p><p>These incidents underscore the consequences of inadequate NHI management and highlight the necessity for scalable AI-driven security solutions. By addressing vulnerabilities proactively, organizations can prevent such mishaps and protect their assets effectively.</p><p>To gain further insights into cybersecurity trends and strategies, consider exploring the <a href="https://entro.security/blog/cybersecurity-predictions-2025/">Cybersecurity Predictions for 2025</a>.</p><p>Through effective NHI management, organizations can achieve robust security frameworks that facilitate seamless operations across all platforms. This proactive stance not only meets current demands but also serves as a foundation for future technological advancements.</p><p>By leveraging scalable AI and a comprehensive NHI management strategy, companies can confidently steer towards growth, innovation, and security excellence. To further enhance your incident response capabilities, check out these <a href="https://entro.security/blog/best-practices-for-building-an-incident-response-plan/">Best Practices for Building an Incident Response Plan</a>.</p><h3>Addressing Security Gaps with Proactive NHI Strategies</h3><p>Are your security protocols robust enough to manage the machine identities that power your cloud environments? Where organizations expand their reliance on cloud-based systems, the importance of managing NHIs becomes increasingly critical. The infrastructure that supports modern business operations is filled with a vast network of non-human actors, each with their own identities and permissions. These machine identities are surprisingly dynamic, changing and multiplying rapidly when new application instances are created. Thus, an agile and proactive approach to NHI management can make the difference between seamless functionality and catastrophic security failures.</p><p>One must appreciate the intricacy involved in managing the lifecycle of NHIs, encompassing discovery, validation, and revocation processes. When mishandled, these identities can become doorways for cybercriminal activities, emphasizing the urgent need for comprehensive management systems. Proactively addressing these security gaps not only secures machine identities but also harmonizes broader cybersecurity efforts.</p><p>Companies that integrate comprehensive NHI management do not merely react to threats—they anticipate them, creating an anticipatory defense strategy that is continuously evolving alongside threats. This capability results from the strategic coupling of NHI management with cutting-edge AI technologies, ensuring that vulnerabilities are swiftly identified and neutralized before they can be exploited.</p><h3>Steps Toward Robust NHI Management</h3><p>An effective strategy for managing NHIs involves several key steps that should be ingrained in an organization’s cybersecurity framework:</p><ul> <li><strong>Identity Verification:</strong> Ensure that each NHI is accurately characterized and verified across the infrastructure. This involves mapping out all NHIs and maintaining an up-to-date inventory.</li> <li><strong>Access Control:</strong> Regularly review and update permissions based on the principle of least privilege. Limit NHI permissions to the minimal level required for their function.</li> <li><strong>Continuous Monitoring:</strong> Apply real-time monitoring to enable prompt detection and response to anomalous behavior of NHIs. Machine learning algorithms can enhance this monitoring by offering predictive analytics based on historical data.</li> <li><strong>Incident Response Planning:</strong> Develop a well-defined incident response plan that incorporates NHI-specific contingencies.</li> <li><strong>Lifecycle Management:</strong> Streamline the processes for provisioning, updating, and decommissioning NHIs to prevent the accumulation of redundant identities that could pose security risks.</li> </ul><p>These strategies form the backbone of an effective NHI management policy, providing comprehensive coverage that extends to all corners of a business’s digital enterprise.</p><h3>Industry-Specific Applications of NHI Management</h3><p>Whether in financial services, healthcare, or DevOps, the strategic management of NHIs is undeniably transformative. Consider the financial sector, where sensitive data transactions require stringent measures to prevent unauthorized access. Here, effective NHI management becomes a cornerstone of security, helping financial institutions safeguard their customers’ vital information.</p><p>In healthcare, where patient data privacy is paramount, the precision that a robust NHI management system offers is invaluable. It ensures compliance with data protection regulations and fortifies protection against data breaches that could compromise patient confidentiality and trust.</p><p>For DevOps and SOC teams, which are pivotal in driving innovation while maintaining secure runtime environments, NHI strategies allow these teams to focus more on the development cycle, thus speeding up the innovation process without inadvertently creating security voids.</p><h3>The Future of NHI Management in Cloud Security</h3><p>Will your NHI management strategy evolve to meet future challenges? With cloud technologies advance, so too must the tools and strategies used to manage NHIs. More integrated solutions that leverage AI and machine learning will likely continue to dominate, allowing for dynamically adaptive security measures that are as versatile as they are robust.</p><p>Continuous advancements in AI-driven NHI management create a foundation for the development of self-healing security architectures, where potential threats are identified and neutralized in real-time without the need for human intervention. This not only enhances the efficiency of security operations but also allows businesses to allocate resources towards innovation and growth.</p><p>While we progress, evolving security necessitates a reinvigorated focus on education and training to ensure teams remain adept at utilizing state-of-the-art technologies in NHI management. Only through these integrative efforts can organizations hope to build a secure infrastructure capable of withstanding the complex cyber threats of tomorrow.</p><p>For further insights on mitigating cybersecurity risks, check the <a href="https://entro.security/blog/cybersecurity-risk-mitigation-recommendations-2024/">Cybersecurity Risk Mitigation Recommendations 2024</a>. Additionally, for real-world examples of the impact of cybersecurity oversights, explore the <a href="https://entro.security/blog/6-infamous-cybersecurity-leaks-of-2023/">6 Infamous Cybersecurity Leaks of 2023</a>.</p><p>By embedding these practices into their operational fabric, businesses can ensure not only the protection of their cloud environments but also the enhancement of their overall security posture, paving the way for an innovation-oriented future grounded in resilience and trust.</p><p>The post <a href="https://entro.security/why-is-scalable-ai-security-important-for-growth/">Why is scalable AI security important for growth</a> appeared first on <a href="https://entro.security/">Entro</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/why-is-scalable-ai-security-important-for-growth/" data-a2a-title="Why is scalable AI security important for growth"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhy-is-scalable-ai-security-important-for-growth%2F&amp;linkname=Why%20is%20scalable%20AI%20security%20important%20for%20growth" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhy-is-scalable-ai-security-important-for-growth%2F&amp;linkname=Why%20is%20scalable%20AI%20security%20important%20for%20growth" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhy-is-scalable-ai-security-important-for-growth%2F&amp;linkname=Why%20is%20scalable%20AI%20security%20important%20for%20growth" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhy-is-scalable-ai-security-important-for-growth%2F&amp;linkname=Why%20is%20scalable%20AI%20security%20important%20for%20growth" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhy-is-scalable-ai-security-important-for-growth%2F&amp;linkname=Why%20is%20scalable%20AI%20security%20important%20for%20growth" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://entro.security/">Entro</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Alison Mack">Alison Mack</a>. Read the original post at: <a href="https://entro.security/why-is-scalable-ai-security-important-for-growth/">https://entro.security/why-is-scalable-ai-security-important-for-growth/</a> </p>

Decagon AI raises $250M at $4.5B valuation to scale AI concierge platform

  • Duncan Riley
  • Published date: 2026-01-28 23:58:20

Artificial intelligence concierge for every customer company Decagon AI Inc. today revealed that it had raised $250 million in new funding on a $4.5 billion valuation to expand its conversational AI platform and accelerate growth as it scales deployments of i…

Artificial intelligence concierge for every customer company Decagon AI Inc. today revealed that it had raised $250 million in new funding on a $4.5 billion valuation to expand its conversational AI … [+4874 chars]

Microsoft’s stock declines after cloud growth dips below 40%

  • Mike Wheatley
  • Published date: 2026-01-28 23:30:01

Shares of Microsoft Corp. dropped more than 5% in extended trading today after the technology giant reported better-than-expected financial results. The company delivered second-quarter earnings before certain costs such as stock compensation of $4.14 per sha…

Shares of Microsoft Corp. dropped more than 5% in extended trading today even though the technology giant reported better-than-expected financial results, as cloud revenue sagged. The company delive… [+5609 chars]

Waabi raises $750M as Uber separately commits up to $250M for robotaxi partnership

  • Duncan Riley
  • Published date: 2026-01-28 23:22:57

Canadian autonomous truck startup Waabi Innovation Inc. announced today that it had raised $750 million in new funding and had secured a separate, milestone-based future investment of up to $250 million from Uber Technologies Inc. to support a new partnership…

Canadian autonomous truck startup Waabi Innovation Inc. announced today that it had raised $750 million in new funding and had secured a separate, milestone-based future investment of up to $250 mill… [+4428 chars]

OpenAI, Anthropic reportedly raising billions of dollars in new funding

  • Maria Deutscher
  • Published date: 2026-01-28 23:21:39

OpenAI Group PBC and Anthropic PBC are reportedly seeking new funding rounds that could significantly boost their respective valuations. Both companies are expected to go public as early as this year. That means the investments under discussion may be the las…

OpenAI Group PBC and Anthropic PBC are reportedly seeking new funding rounds that could significantly boost their respective valuations. Both companies are expected to go public as early as this yea… [+4050 chars]

OPNsense 26.1 brings updates to open-source firewall management

  • Anamarija Pogorelec
  • Published date: 2026-01-28 23:11:28

OPNsense, the open-source firewall and network security platform, reached version 26.1, adding a range of updates affecting management, traffic visibility, automation interfaces, and core services. Changes in firewall management and APIs Version 26.1, code-na…

OPNsense, the open-source firewall and network security platform, reached version 26.1, adding a range of updates affecting management, traffic visibility, automation interfaces, and core services. … [+2592 chars]

Dynatrace Intelligence aims to advance autonomous software operations

  • Duncan Riley
  • Published date: 2026-01-28 22:44:03

Artificial intelligence observability platform company Dynatrace Inc. today announced a set of platform updates at its Perform Conference in Las Vegas that included the debut of Dynatrace Intelligence, a new agentic operations system designed to bring enterpr…

Artificial intelligence observability platform company Dynatrace Inc. today announced a set of platform updates at its Perform Conference in Las Vegas that included the debut of Dynatrace Intelligenc… [+4340 chars]

Software-defined Success: Audi’s Production Lines Enter a New Era with Cisco

  • Samuel Pasquier
  • Published date: 2026-01-28 22:34:25

Audi's EC4P project redefines smart manufacturing with Cisco’s end-to-end industrial and enterprise networking infrastructure.

Hardware has long been the anchor holding back factory innovation, but Audi is breaking that cycle with its groundbreaking Edge Cloud for Production (EC4P) project. This transformative initiative, de… [+6301 chars]

Fake dating app used as lure in spyware campaign targeting Pakistan, ESET Research discovers

  • ESET, LLC
  • Published date: 2026-01-28 22:33:00

BRATISLAVA, Slovakia, Jan. 28, 2026 (GLOBE NEWSWIRE) -- ESET researchers have uncovered an Android spyware campaign leveraging romance scam tactics to target individuals in Pakistan. The campaign uses a malicious app posing as a chat platform that allows user…

<ul><li>ESET researchers have uncovered an Android spyware campaign that uses romance scam tactics to target individuals in Pakistan.</li><li>The campaign leverages the GhostChat spyware, which enabl… [+5541 chars]

Wonder is All Around Us

  • sashaportis
  • Published date: 2026-01-28 22:32:18

Ordering pad thai on an iPad in the muzak of a takeout food chain created in the pressure cooker of the post-pandemic economy. The post Wonder is All Around Us appeared first on Urban Omnibus.

At a party, I meet a man who tells me that he studies people who believe that they are being gangstalked by forces beyond their control. He has sympathy for these people, because it is not entirely f… [+6127 chars]

US developed ‘non-kinetic’ cell ahead of Venezuela mission to push cyber operations

  • David DiMolfetta
  • Published date: 2026-01-28 22:25:00

Officials said that cyber capabilities are expected to play a central role in future U.S. military undertakings.

In the months leading up to an unprecedented operation that captured Venezuelan leader Nicolás Maduro from the capital of Caracas, the U.S. military developed a non-kinetic effects cell that has help… [+4140 chars]

US Cyber Defense Chief Uploaded Sensitive Files Into a Public Version of ChatGPT

  • BeauHD
  • Published date: 2026-01-28 22:02:00

An anonymous reader quotes a report from Politico: The interim head of the country's cyber defense agency uploaded sensitive contracting documents into a public version of ChatGPT last summer, triggering multiple automated security warnings that are meant to …

The interim head of the country's cyber defense agency uploaded sensitive contracting documents into a public version of ChatGPT last summer, triggering multiple automated security warnings that are … [+1345 chars]

National Fuel Reports First Quarter Fiscal 2026 Earnings

  • National Fuel Gas Company
  • Published date: 2026-01-28 21:45:00

WILLIAMSVILLE, N.Y., Jan. 28, 2026 (GLOBE NEWSWIRE) -- National Fuel Gas Company (“National Fuel” or the “Company”) (NYSE:NFG) today announced consolidated results for the first quarter of its 2026 fiscal year.

WILLIAMSVILLE, N.Y., Jan. 28, 2026 (GLOBE NEWSWIRE) -- National Fuel Gas Company (National Fuel or the Company) (NYSE:NFG) today announced consolidated results for the first quarter of its 2026 fisca… [+103624 chars]

Building government resilience in an era of AI-driven cyberattacks

  • Travis Rosiek
  • Published date: 2026-01-28 21:43:00

COMMENTARY | As AI reshapes cyber threats, resilience will hinge on speed.

With reports showing an 87% surge in artificial intelligence (AI)-driven cyberattacks in 2025 and one in six breaches involving methods where AI was used to automate and amplify attacks, 2026 will be… [+5988 chars]

US Cyber Defense Chief Uploaded Sensitive Files Into a Public Version of ChatGPT

  • Anonymous Coward
  • Published date: 2026-01-28 21:41:43

The interim head of the country’s cyber defense agency uploaded sensitive contracting documents into a public version of ChatGPT last summer, triggering multiple automated security warnings that are meant to stop the theft or unintentional disclosure of gover…

The interim head of the country’s cyber defense agency uploaded sensitive contracting documents into a public version of ChatGPT last summer, triggering multiple automated security warnings that are … [+1339 chars]

Everyone Really Needs to Pump the Brakes on That Viral Moltbot AI Agent

  • AJ Dellinger
  • Published date: 2026-01-28 21:40:13

It's all fun and games until every aspect of your life is splashed all over the dark web.

A new AI chatbot/agent is looking to dethrone the corporate overlords of Google, Microsoft, and the Too Big To Fail startups like OpenAI and Anthropicbut being an early adopter comes with some real r… [+5193 chars]

TowneBank Reports Full Year and Fourth Quarter Financial Results for 2025

  • TowneBank
  • Published date: 2026-01-28 21:30:00

TowneBank Reports Full Year and Fourth Quarter Financial Results for 2025...

SUFFOLK, Va., Jan. 28, 2026 (GLOBE NEWSWIRE) -- TowneBank (the "Company" or "Towne") (Nasdaq: TOWN) today reported financial results for the full year and fourth quarter ended December 31, 2025. For … [+177697 chars]

ServiceNow reports better-than-expected fourth-quarter results

  • Samantha Subin
  • Published date: 2026-01-28 21:18:07

ServiceNow announced an expanded partnership with Anthropic about a week after it inked a similar deal with competitor OpenAI.

ServiceNow topped Wall Street's fourth-quarter estimates after the bell on Wednesday. Shares fell more than 3%. Here's how the company performed versus LSEG estimates: <ul><li>Earnings per share:… [+2402 chars]

ServiceNow projects annual subscription revenue above estimates, signals AI strength

  • None
  • Published date: 2026-01-28 21:17:04

Jan 28 : - ServiceNow forecast annual subscription revenue above Wall Street estimates on Wednesday, signaling strong demand for its artificial intelligence-powered software products.The Santa Clara, California-based company is doubling down on AI integration…

Jan 28 : - ServiceNow forecast annual subscription revenue above Wall Street estimates on Wednesday, signaling strong demand for its artificial intelligence-powered software products. The Santa Cl… [+1704 chars]

Park Dental Partners Expands Presence in Arizona with Addition of Ironwood Dental

  • Park Dental Partners
  • Published date: 2026-01-28 21:17:00

Park Dental Partners is pleased to announce that Ironwood Dental of Tucson, Arizona, has joined its network of affiliated dental practices....

MINNEAPOLIS, Jan. 28, 2026 (GLOBE NEWSWIRE) -- Park Dental Partners, Inc. (NASDAQ: PARK) (the Company), a leading dental resource organization, announced that on January 23, 2026, Ironwood Dental, lo… [+5249 chars]

At Davos 2026, the New A.I. Race Is About Execution

  • Mark Minevich and Dr. Kathryn Wifvat, Mark Minevich and Dr. Kathryn Wifvat
  • Published date: 2026-01-28 21:15:46

Dr. Kathryn Wifvat, a leading applied A.I. strategist advising governments, enterprises and sovereign investors, and Mark Minevich, a globally recognized Chief A.I. Officer and World Economic Forum contributor, analyze how Davos 2026 marked a turning point in…

Davos 2026 revealed a clear pivot: as A.I. enters its infrastructure phase, competitive advantage hinges on governance, integration and execution. Photo by Fabrice Coffrini / AFP via Getty Images At… [+8708 chars]

Origin Bancorp, Inc. Reports Earnings for Fourth Quarter and Full Year 2025

  • Origin Bancorp, Inc.
  • Published date: 2026-01-28 21:15:00

RUSTON, La., Jan. 28, 2026 (GLOBE NEWSWIRE) -- Origin Bancorp, Inc. (NYSE: OBK) (“Origin,” “we,” “our” or the “Company”), the holding company for Origin Bank (the “Bank”), today announced net income of $29.5 million, or $0.95 diluted earnings per share (“EPS”…

RUSTON, La., Jan. 28, 2026 (GLOBE NEWSWIRE) -- Origin Bancorp, Inc. (NYSE: OBK) (Origin, we, our or the Company), the holding company for Origin Bank (the Bank), today announced net income of $29.5 m… [+123057 chars]

AXIS Capital Reports Fourth Quarter Net Income Available to Common Shareholders of $282 Million, or $3.67 per Diluted Common Share and Operating Income of $250 Million, or $3.25 per Diluted Common Share

  • AXIS Specialty US Services Inc.
  • Published date: 2026-01-28 21:15:00

For the fourth quarter of 2025, the Company reports: Annualized return on average common equity ("ROACE") of 19.4% and annualized operating ROACE of...

For the fourth quarter of 2025, the Company reports: <ul><li>Annualized return on average common equity ("ROACE") of 19.4% and annualized operating ROACE of 17.2%</li><li>Combined ratio of 90.4%</li… [+88713 chars]