Growing
-
Blog
Five Common Mistakes Beginners Make When Growing Seeds (and How to Fix Them)
Growing seeds is a relatively simple process: Bury seeds in dirt, add water, heat, and light from the sun, and in most cases, something is going to sprout. The problem is, most of us conduct this process inside, because we’re trying to get a jump on the growing season. Inside, where there’s no sun, heat is hard to control, and…
Read More » -
Blog
Growing toil and talent gaps are driving a rise in ‘IT generalists’
Tech professionals are being forced to become ‘IT generalists’ thanks to a combination of talent gaps, tool sprawl, and evolving technology. Statistics from Auvik’s 2025 IT Trends Report show workloads are increasing and it’s the most senior employees that are experiencing the heaviest burden. IT professionals with more than 10 years of experience and the Baby Boomer generation (those born…
Read More » -
Blog
Enterprises are set to waste $44.5 billion on needless cloud spending this year – the growing disconnect between FinOps and engineering teams is a key factor
Enterprises could waste up to $44.5 billion in cloud spending this year as a rift between engineering and FinOps teams hampers cost efficiency, according to research from Harness. Enterprises estimate that 21% of their cloud infrastructure spend is wasted on underutilized resources, Harness found, with the majority of surveyed engineering staff putting this down to a disconnect between two key…
Read More » -
Blog
AI was touted as a game changer for productivity – but employees are still saddled with growing workloads
While AI has been framed as a key tool for enterprises to reduce strain on workforces, so far the technology has failed to alleviate pressure – and a key factor is botched or lackluster adoption strategies. Research from workflow management platform Wrike found many enterprises still face critical inefficiencies, rising workloads, and a growing sense of dissatisfaction among employees. UK…
Read More » -
Blog
Data sovereignty a growing priority for UK enterprises
The push towards data sovereignty continues, with 51% of UK organizations now acknowledging it as a crucial aspect of their data management strategy. According to a study of 500 IT decision makers in large organizations carried out by OVHcloud, more than three-quarters said they believe data sovereignty is now more important to their organization than it was three years ago.…
Read More » -
Blog
Data centers are growing in size and number as AI prompts widespread global expansion
Data centers will continue to surge in both size and number according to early reports in 2025, building on the trend of outlooks published last year. The average capacity of hyperscale data centers set to open between now and 2029 will be almost double that of current facilities, according to research from Synergy Research Group. While the critical IT load…
Read More » -
Blog
AI tools are growing in popularity at enterprises, but not all of them are approved by employers – and that’s a serious problem for IT and security leaders
Almost half of UK workers admit to using non-approved AI tools without their employer’s knowledge, according to new research. The use of shadow AI, described in the report as ‘bring your own AI’ (BYO-AI), is contributing to overall AI use, with more than two-thirds of employees now using AI tools regularly at work. According to data from Owl Labs’ annual…
Read More » -
Blog
FTC changes its telemarketing rules to cover growing ‘tech support scam’ calls
The Federal Trade Commission (FTC) has finalized amendments to its Telemarketing Sales Rule (TSR), making it easier to protect consumers who are tricked into paying scam tech support companies. The FTC could already go after these fraudster companies if they initiated calls to people — now, they can do the same thing if people call the scammers too. Fake tech…
Read More » -
Blog
Increasing Awareness of DNS Hijacking: A Growing Cyber Threat
A recent report from Palo Alto Networks’s Unit 42 exposes the persistent and evolving threat of DNS hijacking, a stealthy tactic cybercriminals use to reroute internet traffic. By leveraging passive DNS analysis, the cybersecurity company also provided real-world examples of recent DNS hijacking attacks — highlighting the urgency of countering this hidden danger. What is DNS hijacking? DNS hijacking involves…
Read More » -
Blog
Ransomware Attacks Growing More Dangerous, Complex
The number of attempted ransomware attacks on Microsoft customers globally have grown dramatically in the last year, according to Microsoft’s Digital Defense report, released on Oct. 15. However, advancements in automatic attack disruption technologies have led to fewer of these attacks reaching the encryption stage. Microsoft reported 600 million cybercriminal and nation-state attacks occurring daily. While ransomware attempts increased by…
Read More »