We use cookies to personalize content and to analyze our traffic. Please decide if you are willing to accept cookies from our website.

Articles by Category: Tech Sketch

Collaborative Intelligence: Multi-Agent AI in Software Development

Collaborative Intelligence: Multi-Agent AI in Software Development

AI coding assistants have provided great benefits for software development. Many developers have also turned to multi-agent workflows for coding that use specialized agents that collaborate to tackle complex tasks faster during software development. IT leaders and developers must carefully consider balancing complexity, cost, and strong governance when employing multi-agent workflows for coding; otherwise, this approach will fail.
Rethinking Red Teaming for SME AI Models

Rethinking Red Teaming for SME AI Models

SMEs have been adopting AI quickly, but AI models bring unique risks like hallucinations, bias, prompt injections, and data leakage. Built-in vendor safeguards are no longer sufficient. Cost-effective AI red teaming solutions allow SMEs to discover hidden threats in AI models. CISOs and security leaders can turn to these solutions to ensure that models are resilient to adversarial attacks, strengthen regulatory compliance, build stakeholder trust, and improve model reliability.
How SMEs Can Benchmark AI for Real Business Impact

How SMEs Can Benchmark AI for Real Business Impact

AI vendor benchmarks look impressive, but they rarely reflect real business performance. SMEs risk overpaying or under-delivering without practical evaluation. CIOs and IT leaders must use suitable metrics and open-source tools to benchmark models against real workloads, to achieve better control of costs, and identify the AI initiatives that will perform well for their use cases.
Knowing When to Pivot: Defining Actionable Success Criteria for LLM Projects

Knowing When to Pivot: Defining Actionable Success Criteria for LLM Projects

AI projects may not always stall due to model failure, but because teams stick with approaches that no longer deliver. By defining upfront success criteria and monitoring performance, cost, and risk against clear thresholds, CIOs and IT leaders can pivot confidently to keep AI initiatives driving measurable impact.
The IAM Blind Spot: Governing Non-Human Identities at Machine Speed

The IAM Blind Spot: Governing Non-Human Identities at Machine Speed

Agentic AI is exposing the limits of human-centric identity and access management. As non-human identities multiply and act autonomously, legacy IAM models break. For CIOs, CISOs, and senior IT leaders, the issue is no longer whether this shift matters, but whether existing IAM models can withstand autonomous agents operating at scale and speed.
Machine Identities: The Fastest-Growing Attack Surface You Don’t Audit

Machine Identities: The Fastest-Growing Attack Surface You Don’t Audit

Non-human identities now outnumber humans and quietly hold privileged access across cloud, DevOps, and AI systems. Vaulting credentials is not governance. CIOs must establish visibility, ownership, and lifecycle controls immediately, or accept expanding privilege sprawl they cannot explain, audit, or defend at enterprise scale today.
Device-Bound Session Credentials: A Secure Alternative to Session Cookies

Device-Bound Session Credentials: A Secure Alternative to Session Cookies

Session hijacking is accelerating, with attackers exploiting stolen tokens to bypass authentication. W3C’s Device-Bound Session Credentials (DBSC) offer a breakthrough by binding cookies to devices using TPM-based cryptography, making theft useless. SME tech leaders should read this article to find out how DBSC secures sessions, blocks cookie theft, and future-proofs authentication.
Stuck on the Wrong Side: How Misaligned LLM Choices Stall Transformation

Stuck on the Wrong Side: How Misaligned LLM Choices Stall Transformation

General-purpose LLMs are often chosen over specialized models due to versatility, familiarity, and fast setup. Despite these benefits, general-purpose LLMs may not always be the best solution. CIOs and IT leaders must understand when to use each type of LLM to avoid misaligned solutions that are costly.
Learning from Shadow AI: Delivering the AI Tools Your Employees Actually Need

Learning from Shadow AI: Delivering the AI Tools Your Employees Actually Need

As AI adoption surges, shadow AI was bound to follow, just like shadow IT before it. This can lead to data leaks and compliance violations, prompting urgent alarms when detected. However, it is also important to understand why shadow AI occurs. By uncovering its root causes, CISOs and IT leaders can close gaps and deploy the AI tools that employees truly need.
The DRAM Dilemma: Supply Constraints and the SME Budget Crunch

The DRAM Dilemma: Supply Constraints and the SME Budget Crunch

RAM prices are surging as major manufacturers redirect production toward high-bandwidth memory for AI. This spike squeezes SME IT budgets, making even routine system builds or upgrades much costlier. Without proactive procurement strategies, SMEs risk overpaying or facing delays for essential hardware.