Topic: it operations

  • Brian Emerson Named Chief Product Officer at New Relic

    Brian Emerson Named Chief Product Officer at New Relic

    Brian Emerson has been appointed as New Relic's Chief Product Officer, where he will lead innovation for the Intelligent Observability Platform used by 85,000 global customers. With over 25 years of experience, Emerson previously expanded ServiceNow's ITOM revenue ninefold and held leadership rol...

    Read More »
  • Global Data Breach Risk Soars from Indian Suppliers

    Global Data Breach Risk Soars from Indian Suppliers

    Over half of key Indian suppliers experienced a third-party breach in the last year, posing risks to global businesses in sectors like semiconductors and pharmaceuticals. Outsourced IT and managed service providers were responsible for nearly two-thirds of breaches, with network security flaws an...

    Read More »
  • BMC Helix: How Agentic AI is Reshaping IT Service & Operations

    BMC Helix: How Agentic AI is Reshaping IT Service & Operations

    BMC Helix will host a Customer and Partner Roadshow in Riyadh on October 29, 2025, focusing on how its Generative AI and Agentic AI technologies are transforming IT service and operations management. The event aims to unite industry leaders and IT professionals, offering hands-on exposure to tool...

    Read More »
  • AI Budgets Soar, But Data Readiness Lags: Qlik 2025 Study

    AI Budgets Soar, But Data Readiness Lags: Qlik 2025 Study

    A major gap exists between financial investment and practical implementation of Agentic AI in corporations, primarily due to foundational data challenges like quality, accessibility, and integration. While 97% of organizations have budgeted for Agentic AI and 69% have a defined strategy, only 19%...

    Read More »
  • Secure Your Credentials: IT's Multi-System Strategy

    Secure Your Credentials: IT's Multi-System Strategy

    IT teams must securely manage credentials across systems using a comprehensive approach that combines technology, policy, and training to address escalating cyber threats. Key security measures include strong authentication like multi-factor authentication, encryption for data protection, and con...

    Read More »