Top Enterprise Technology Stories
The best articles from Foundryâs B2B publications
August 23, 2024
AI agents will transform business processes â and magnify risks
Chatbots sit and wait to be asked questions. Agents, however, are proactive, can act autonomously, and adapt to their environments. And when multiple agents develop into agentic frameworks, the potential power increases exponentially. But with strength in numbers and added complexity comes amplified risks, and the need for more fortified checks. Read more
Generative AI is sliding into the âtrough of disillusionmentâ
The hype over genAI and associated AI tech is waning, leading companies to seek concrete returns for their investments. Read more
GitHub survey finds nearly all developers using AI coding tools
While almost every respondent said they used AI coding tools, only 38% of developers in the US said their organizations actively encouraged adoption. Read more
Federal judge strikes down FTCâs ban on non-compete agreements
The judge ruled that the FTC lacked the authority to make such a ban. That authority must come from Congress, she ruled. Read more
CrowdStrike denies merger talks with Action1
Employees of the two companies met at RSA but âdisengaged after a surface level conversationâ that did not involve senior CrowdStrike officials, according to CrowdStrike. Read more
3 key strategies for mitigating non-human identity risks
For every 1,000 human users, most networks have around 10,000 NHIs, and that can be a huge task to manage. Here are 3 fundamental areas to focus on when securing NHIs. Read more
OpenAI opposes California AI bill as lawmakers prepare to vote
The ChatGPT maker has warned that the proposed legislation could suppress innovation and drive companies out of California. Read more
Main Line Health readies networks for 'at home' hospitals
Modernizing Main Line Health's networking, device management, and cybersecurity helped the organization respond to work-from-home mandates and the rise in telehealth and positions it for future âhospital at homeâ medicine delivery. Read more
AWS environments compromised through exposed .env files
Attackers collected Amazon Web Services keys and access tokens to various cloud services from environment variables insecurely stored in tens of thousands of web applications. Read more