Blogs in the Spotlight Seven levers to reduce your IT costs while future-proofing your business Optimize IT: Leverage AI, cloud and automation for cost-effective, future-ready enterprise solutions Read more How manufacturers can stay productive and secure in the new threat landscape NIS 2 helps manufacturers gain better visibility into their suppliers' security posture to identify and mitigate supply chain vulnerabilities. Read more Beyond the hype: The top 7 cybersecurity risks in GenAI and how to mitigate these GenAI can be misused and requires caution and responsible use. Today, only 38% of organizations actively address cybersecurity risks associated with LLMs. Read more Latest blog posts Select a topic Automation Cloud Critical communications CSR Cybersecurity Data & AI Digital transformation Environment Ethics & Digital Society IoT & Edge Quantum computing & HPC Select an industry Aerospace Defense Energy & Utilities Financial Services & Insurance Healthcare & Life Sciences Manufacturing Media Public Sector Retail Telecommunications Transport & Logistics Dec 12 2023 Smartphone security: The bottleneck of mobile usage Imagine if the entire homeland security forces of a given country are without any connectivity because of a virus or malware. Dec 6 2023 Mitigating risks on offshore wind farms Offshore wind capacity is growing constantly but includes some regulatory, security and resilience constraints. Oct 20 2023 5G security: Moving from closed narrowband to open broadband networks It will be critical to involve an experienced cybersecurity systems integrator, capable of driving such a large program, coordinating 5G network and cybersecurity providers.