Mike, Mitch, Chris Blask, Kate Scarcella and Futurum Group analyst Guy Currier debate when, how, or even if, it might be possible to cost-effectively enable the consumption of 2,000 tokens per second as part of a goal to make working with artificial intelligence (AI) coding tools more fluid.
Then the gang takes a look at the volume of known vulnerabilities in code being shipped into production environments that might soon be exploited by cybercriminals using AI tools to discover and revere engineer exploits before taking a look at just how secure all the AI agents that are about to be deployed really are.
Up Next in 2025
-
Navigating IT Resiliency & the Future...
Alan, Mike, Mitch, JP Morgenthal and Alastair Cooke dive into the current mindset of IT professionals during these uncertain technological and economic times before reviewing a Tech Field Day event that focused on the latest edition of the VMware Cloud Foundation (VCF).
Then the gang takes a loo...
-
Exploring AI & Cybersecurity at Black...
Black Hat Week showcases the evolution of cybersecurity and AI. The event highlights the rising costs of data breaches globally, with a focus on the importance of human oversight in AI applications. Discussions cover the impact of AI on job roles, the need for better cybersecurity investments, an...
-
Palo Alto Acquires CyberArk for $25B,...
Palo Alto Networks acquires CyberArk for $25B, signaling a major cybersecurity shift. As data breaches surge, identity management becomes central to modern security strategies. We also dive into the challenges of tech integration, vendor risk, and the scrutiny facing Cognizant after recent failur...