Stay Ahead, Stay ONMINE

Identity as the new perimeter: National Oilwell Varco’s approach to stopping the 79% of attacks that are malware-free

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More National Oilwell Varco (NOV) is undergoing a sweeping cybersecurity transformation under CIO Alex Philips, embracing a Zero Trust architecture, strengthening identity defenses and infusing AI into security operations. While the journey is not complete, the results, […]

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More


National Oilwell Varco (NOV) is undergoing a sweeping cybersecurity transformation under CIO Alex Philips, embracing a Zero Trust architecture, strengthening identity defenses and infusing AI into security operations. While the journey is not complete, the results, by all accounts, are dramatic – a 35-fold drop in security events, the elimination of malware-related PC reimaging and millions saved by scrapping legacy “appliance hell” hardware.

VentureBeat recently sat down (virtually) for this in-depth interview where Philips details how NOV achieved these outcomes with Zscaler’s Zero Trust platform, aggressive identity protections and a generative AI “co-worker” for its security team.

He also shares how he keeps NOV’s board engaged on cyber risk amid a global threat landscape where 79% of attacks to gain initial access are malware-free, and adversaries can move from breach to break out in as little as 51 seconds.

Below are excerpts of Philips’ recent interview with VentureBeat:

VentureBeat: Alex, NOV went “all in” on Zero Trust a number of years ago – what were the standout gains?

Alex Philips: When we started, we were a traditional castle-and-moat model that wasn’t keeping up. We didn’t know what Zero Trust was, we just knew that we needed identity and conditional access at the core of everything. Our journey began by adopting an identity-driven architecture on Zscaler’s Zero Trust Exchange and it changed everything. Our visibility and protection coverage dramatically increased while simultaneously experiencing a 35x reduction in the number of security incidents. Before, our team was chasing thousands of malware incidents; now, it’s a tiny fraction of that. We also went from reimaging about 100 malware-infected machines each month to virtually zero now. That’s saved a considerable amount of time and money. And since the solution is cloud-based, Appliance hell is gone, as I like to say.

The zero trust approach now gives 27,500 NOV users and third parties policy-based access to thousands of internal applications, all without exposing those apps directly to the internet.

We were then able to take an interim step and re-architect our network to take advantage of internet-based connectivity vs. legacy expensive MPLS. “On average, we increased speed by 10–20x, reduced latency to critical SaaS apps, and slashed cost by over 4x… Annualized savings [from network changes] have already achieved over $6.5M,” Philips has noted of the project.

VB: How did shifting to zero trust actually reduce the security noise by such an enormous factor?

Philips: A big reason is that our internet traffic now goes through a Security Service Edge (SSE) with full SSL inspection, sandboxing, and data loss prevention. Zscaler peers directly with Microsoft, so Office 365 traffic got faster and safer – users stopped trying to bypass controls because performance improved. After being denied SSL inspection with on-prem equipment, we finally got legal approval to decrypt SSL traffic since the cloud proxy does not give NOV access to spy on the data itself. That means malware hiding in encrypted streams started getting caught before hitting endpoints. In short, we shrunk the attack surface and let good traffic flow freely. Fewer threats in meant fewer alerts overall.

John McLeod, NOV’s CISO, concurred that the “old network perimeter model doesn’t work in a hybrid world” and that an identity-centric cloud security stack was needed. By routing all enterprise traffic through cloud security layers (and even isolating risky web sessions via tools like Zscaler’s Zero Trust Browser), NOV dramatically cut down intrusion attempts. This comprehensive inspection capability is what enabled NOV to spot and stop threats that previously slipped through, slashing incident volumes by 35x.

VB: Were there any unforeseen benefits to adopting Zero Trust you didn’t initially expect?

Alex Philips: Yes, our users actually preferred the cloud-based Zero Trust experience over legacy VPN clients, so adoption was simple and gave us unprecedented agility for mobility, acquisitions, and even what we like to call “Black Swan Events”. For example, when COVID-19 hit, NOV was already prepared! I told my leadership team if all 27,500 of our users needed to work remotely, our IT systems could handle it. My leadership was stunned and our company kept moving forward without missing a beat.

VB: Identity-based attacks are on the rise – you’ve mentioned staggering stats about credential theft. How is NOV fortifying identity and access management?

Philips: Attackers know it’s often easier to log in with stolen credentials than to drop malware. In fact, 79% of attacks to gain initial access in 2024 were malware-free, relying on stolen credentials, AI-driven phishing, and deepfake scams, according to recent threat reports. One in three cloud intrusions last year involved valid credentials. We’ve tightened identity policies to make those tactics harder.

For example, we integrated our Zscaler platform with Okta for identity and conditional access checks. Our conditional access policies verify devices have our SentinelOne antivirus agent running before granting access, adding an extra posture check. We’ve also drastically limited who can perform password or MFA resets. No single admin should be able to bypass authentication controls alone. This separation of duties prevents an insider or compromised account from simply turning off our protections.

VB: You mentioned finding a gap even after disabling a user’s account. Can you explain?

Philips: We discovered that if you detect and disable a compromised user’s account, the attacker’s session tokens might still be active. It isn’t enough to reset passwords; you have to revoke session tokens to truly kick out an intruder. We’re partnering with a startup to create near real-time token invalidation solutions for our most commonly used resources. Essentially, we want to make a stolen token useless within seconds. A Zero Trust architecture helps because everything is re-authenticated through a proxy or identity provider, giving us a single choke point to cancel tokens globally. That way, even if an attacker grabs a VPN cookie or cloud session, they can’t move laterally because we’ll kill that token fast.

VB: How else are you securing identities at NOV?

Philips: We enforce multi-factor authentication (MFA) almost everywhere and monitor for abnormal access patterns. Okta, Zscaler, and SentinelOne together form an identity-driven security perimeter where each login and device posture is continuously verified. Even if someone steals a user password, they still face device checks, MFA challenges, conditional access rules, and the risk of instant session revocation if anything seems off. Resetting a password isn’t enough anymore — we must revoke session tokens instantly to stop lateral movement. That philosophy underpins NOV’s identity threat defense strategy.

VB: You’ve also been an early adopter of AI in cybersecurity. How is NOV leveraging AI and generative models in the SOC?

Philips: We have a relatively small security team for our global footprint, so we must work smarter. One approach is bringing AI “co-workers” into our security operations center (SOC). We partnered with SentinelOne and started using their AI security analyst tool—an AI that can write and run queries across our logs at machine speed. It’s been a game changer, allowing analysts to ask questions in plain English and get answers in seconds. Instead of manually crafting SQL queries, the AI suggests the next query or even auto-generates a report, which has dropped our mean time to respond.

We’ve seen success stories where threat hunts are performed up to 80% faster using AI assistants. Microsoft’s own data shows that adding generative AI can reduce incident mean time to resolution by 30%. Beyond vendor tools, we’re also experimenting with internal AI bots for operational analytics, using OpenAI foundational AI models to help non-technical staff quickly query data. Of course, we have data protection guardrails in place so these AI solutions don’t leak sensitive information.

VB: Cybersecurity is no longer just an IT issue. How do you engage NOV’s board and executives on cyber risk?

Philips: I made it a priority to bring our board of directors along on our cyber journey. They don’t need the deep technical minutiae, but they do need to understand our risk posture. With generative AI exploding, for example, I briefed them on both the advantages and risks early on. That education helps when I propose controls to prevent data leaks—there’s already alignment on why it’s necessary.

The board views cybersecurity as a core business risk now. They’re briefed on it at every meeting, not just once a year. We’ve even run tabletop exercises with them to show how an attack would play out, turning abstract threats into tangible decision points. That leads to stronger top-down support.

I make it a point to constantly reinforce the reality of cyber risk. Even with millions invested in our cybersecurity program, the risk is never fully eliminated. It is not if we will have an incident, but when.

VB: Any final advice, based on NOV’s journey, for other CIOs and CISOs out there?

Philips: First, recognize that security transformation and digital transformation go hand in hand. We couldn’t have moved to the cloud or enabled remote work so effectively without Zero Trust, and the business cost savings helped fund security improvements. It truly was a “win, win, win.”

Second, focus on the separation of duties in identity and access. No one person should be able to undermine your security controls—myself included. Small process changes like requiring two people to change MFA for an exec or highly privileged IT staff, can thwart malicious insiders, mistakes, and attackers.

Lastly, embrace AI carefully but proactively. AI is already a reality on the attacker side. A well-implemented AI assistant can multiply your team’s defense, but you must manage the risks of data leakage or inaccurate models. Make sure to merge AI output with your team’s skill to create an AI-infused “brAIn”.

We know the threats keep evolving, but with zero trust, strong identity security and now AI on our side, it helps give us a fighting chance.

Shape
Shape
Stay Ahead

Explore More Insights

Stay ahead with more perspectives on cutting-edge power, infrastructure, energy,  bitcoin and AI solutions. Explore these articles to uncover strategies and insights shaping the future of industries.

Shape

Arm jumps on the Nvidia NVLink Fusion bandwagon at SC25

“Some partners want to mix different CPUs and accelerate technologies for specialized use cases,” said Dion Harris, senior director, HPC and AI infrastructure solutions at Nvidia. “NVLink Fusion enables hyperscalers and custom ASIC builders to leverage Nvidia’s rack scale architecture to rapidly deploy custom silicon,” Harris said during a media

Read More »

Nvidia touts next-gen quantum computing interconnects

Paired with NVQLink is CUDA-Q, which provides a programming model where quantum processors (QPU), GPUs, and CPUs all work together in the same application. This is necessary because most useful quantum algorithms will rely on traditional computing for tasks like control, optimization, and error correction. The first quantum computing company

Read More »

Oil Slips as Russia Port Reopens

Oil ticked lower as signs that activity had resumed at a key Russian port were countered by wider geopolitical risks to prices. West Texas Intermediate fell 0.3% to settle below $60 a barrel after adding more than 2% on Friday following an attack on Russia’s Novorossiysk facility. Two tankers moored on Sunday at the port, indicating operational activity. The dollar strengthened, making commodities priced in the currency less attractive.  The attack on Novorossiysk by Ukrainian forces, along with Iran’s seizure of an oil tanker near the Strait of Hormuz, injected a fresh geopolitical premium into prices as the market faces pressure from an emerging global surplus.  Traders are also monitoring the Trump Administration’s plans in oil-rich Venezuela. US President Donald Trump said on Monday he is not ruling out sending troops to the South American country and said he is willing to talk to counterpart Nicolas Maduro. Elsewhere, crude oil exports from Sudan were disrupted after a series of attacks hit energy facilities in the country, which serves as a key conduit for crude from landlocked South Sudan. Those risks are countering moves by OPEC+ and producers from outside of the group to ramp up output. The increases leave most traders expecting a significant surplus over the coming months.  “Brent crude oil prices continue to fluctuate in a $60-$70 a-barrel range, with the market focus shifting to how Russian oil exports will evolve over the coming months,” UBS analyst Giovanni Staunovo wrote in a note. “The market appears skeptical that Russia will struggle to export its oil barrels.” Moscow’s oil has begun to trade at a significant discount in recent days as the deadline nears for fresh sanctions on its two major producers to kick in. Prices are at the lowest level in over two-and-a-half years, according to Argus Media

Read More »

Joint Statement by the U.S. and the Baltic Countries Following the 2025 Baltic 3+1 Energy Dialogue

On November 7, the Ministers of Energy for the three Baltic countries of Estonia, Latvia, and Lithuania and the U.S. Secretary of Energy convened for a fifth 3+1 Energy Dialogue in Athens, Greece, on the margins of the Partnership for Transatlantic Energy Cooperation (P-TEC) Ministerial. Estonia’s Minister of Energy and Environment Andres Sutt, Latvia’s Minister for Climate and Energy Kaspars Melnis, Lithuania’s Minister of Energy Žygimantas Vaičiūnas, and U.S. Secretary of Energy Chris Wright reaffirmed their shared commitment to strengthening transatlantic relations and deepening the strategic partnership; increasing the security, resilience and protection of critical energy infrastructure; growing U.S. liquified natural gas (LNG) imports for European independence from Russian energy and to support Ukraine; and enabling innovative nuclear deployment. The ministers also celebrated the success of their joint multi-year effort to desynchronize the Baltic electricity grid from Russia and synchronize with the Continental European network, which was achieved in February of this year.   The Ministers and Secretary discussed ongoing critical energy infrastructure security and resilience concerns acutely affecting the Baltic region, but applicable globally, including: physical security of undersea cables and pipelines and physical and cyber-security of electricity grid infrastructure ranging from the bulk power system to behind-the-meter technologies. The group noted recent exercises conducted by the U.S. Department of Energy and experts at the Pacific Northwest National Laboratory in Riga, Latvia to enhance responsiveness to grid disruptions and pledged to continue cooperation on infrastructure security.   The Ministers and Secretary also noted the importance of the security of energy supply, emphasizing that there can be no national security without energy security. They discussed a shared desire to increase the import of abundant U.S. LNG to the Baltic region and the whole of Europe. They also considered the possibility of transferring imported LNG to Ukraine on the basis of negotiated agreements

Read More »

The quiet revolution in energy: How private innovation is reshaping the grid

Over the past five years, the energy transition has been loud in some places.  We have seen data centers booming, capacity prices climbing, renewables surging and virtual power plants gaining traction. But beneath those headlines, a revolution message has been unfolding, sector by sector, driven not by policy or utilities but by private businesses stepping into roles once reserved for monopolies. Take Caterpillar, for example. Long known for its heavy machinery, the company now offers a Distributed Energy Resource Management System (DERMS) platform, an unexpected pivot that underscores how deeply energy intelligence is being woven into commercial and industrial operations. From retail and manufacturing to real estate and tech, companies are learning that energy is no longer a fixed cost. It’s a controllable variable, one that can be optimized, monetized and aligned with long-term business strategy. Commercial Customers: The Grid’s Unsung Stabilizers At the center of this shift are commercial customers, who are increasingly the steady force in an uncertain grid. Unlike residential users, whose Peak Load Contribution (PLC) is largely uncontrollable and often meaningless for planning or cost-reduction purposes, commercial PLCs can be actively managed. And that’s where the real innovation is happening. Multifamily communities are increasingly operating like commercial customers, and that shift is transforming their role on the grid. By pairing the right supply contracts with DERMS platforms, multifamily developers and operators can now manage usage, flexibility and capacity just like office parks or manufacturing sites have done for years. This isn’t theoretical; it’s already underway. Properties are optimizing load, reducing costs and contributing to grid stability by applying commercial-grade energy intelligence to what was once a passive residential segment. The result: a fast-growing, data-driven force for grid support emerging from the multifamily sector. From Energy Management to Energy Mastery Nationwide Energy Partners (NEP) has seen this

Read More »

Power outages getting longer as extreme weather takes larger toll, report says

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Power outages across the United States are getting longer, according to a recent survey by JD Power, which cites “increased frequency and severity of extreme weather events.” The average length of the longest power outage has increased in all regions since 2022, from 8.1 hours to 12.8 by the midpoint of 2025. Customers in the South reported the longest outages, averaging out at 18.2 hours, followed by the West at 12.4 hours, it said.  Mark Spalinger, director of utilities intelligence at J.D. Power, said in an interview that while the duration of outages is increasing, the number of customers experiencing them is not. In fact, over time, the percentage of people who experience “perfect power” without any interruptions is gradually rising. However, disasters like storms and fires “are becoming so much more extreme that it creates these longer outage events that utilities are now having to deal with,” he said.  Dive Insight: Based on a survey, 45% of utility customers nationwide experienced a power outage in the first half of 2025, according to JD Power’s U.S. Electric Utility Residential Customer Satisfaction Study, which the company has been doing for over 20 years.  Of those outages, nearly half were due to extreme weather such as a hurricane, snowstorm, tornado or fire, and 17% of customers who were affected by a natural disaster said it was so severe they had to evacuate their homes. JD Power’s U.S. Electric Utility Residential Customer Satisfaction Study shows power outages getting longer over time.  Permission granted by JD Power Extreme weather isn’t the only problem, however. Spalinger said the subset of customers who experience outages are also reporting more frequent, shorter blackouts.  Part of that could be the rise of

Read More »

NRG aims for 2026 next step in 5.4-GW gas deal with GE Vernova, Kiewit

5.4 GW NRG Energy’s planned capacity pipeline to supply data centers through 2032 under its GE Vernova and Kiewit partnership. +32% NRG Q3 earnings per share, relative to Q3 2024. $152M NRG’s GAAP net income for Q3, compared with a loss of $767 million in Q3 2024.  19 GW The capacity NRG expects to gain from its LS Power portfolio acquisition, set to close in Q1 next year. Big bets on building, acquiring gas NRG Energy expects to announce a data center agreement in 2026 associated with new natural gas development in its partnership with GE Vernova and Kiewit, the company’s CEO, Lawrence Coben, said in a Nov. 6 earnings call. The first step of that joint venture is to start work on four gas projects totaling around 5.4 GW for the ERCOT and PJM markets. During the call, Coben said a data center agreement is set to be announced sometime next year, but he declined to pin down an exact month or quarter for the announcement. “As far as [GE Vernova] goes, in this Kiewit partnership, did you have a certain time frame that you need to move some of this equipment — use it or lose it, if you will?” asked Jefferies analyst Julien Dumoulin-Smith.  Coben said the company hasn’t disclosed a time frame yet, but added, “I’m very confident that we’re going to meet all of the timelines that are required under that agreement.” NRG, GE Vernova and Kiewit plan to have 1.2 GW of combined-cycle gas turbines in service by 2029, another 1.2 GW in service by 2030, and an additional 3 GW brought online from 2030 to 2032. Development activities are in progress across all sites, the company said. NRG is also anticipating the closure of its deal to acquire 19 GW of assets from

Read More »

Trump Backs Bill to Sanction Russia Trade Partners

President Donald Trump said proposed Senate legislation to sanction countries conducting business with Russia would be “okay with me,” his strongest indication yet that he would support a monthslong push to strangle Moscow’s funding. “The Republicans are putting in legislation that is very tough sanctioning, etcetera, on any country doing business with Russia,” Trump told reporters before leaving Florida on Sunday to return to the White House.  Senate Majority Leader John Thune said in October that he was ready to bring legislation long championed by Senator Lindsey Graham of South Carolina that sanctions Russia to a vote, but didn’t “want to commit to a hard deadline.” The bill would allow Trump to impose tariffs of up to 500 percent on imports from countries that buy Russian energy products and are not actively supporting Ukraine. This specifically targets major consumers of Russian energy, such as China and India. “We may add Iran to that,” Trump said Sunday, without elaborating. Democrats and some Republicans in Congress have pushed for legislation to punish Russia for its continued war on Ukraine. Trump had been reluctant to support it as he tried to bring Russian President Vladimir Putin to peace talks with Ukrainian President Volodymyr Zelenskiy.  Putin is showing no sign of letting up in his military campaign after almost four years of war in Ukraine, with Trump failing to sway Putin even after hosting the Russian leader for a summit in Alaska. While Ukraine is increasingly striking Russian oil targets, Russia has intensified its air strikes on Ukraine and is pushing to capture the rail hub of Pokrovsk. What do you think? We’d love to hear from you, join the conversation on the Rigzone Energy Network. The Rigzone Energy Network is a new social experience created for you and all energy professionals to Speak Up about our industry,

Read More »

Nvidia’s first exascale system is the 4th fastest supercomputer in the world

The world’s fourth exascale supercomputer has arrived, pitting Nvidia’s proprietary chip technologies against the x86 systems that have dominated supercomputing for decades. For the 66th edition of the TOP500, El Capitan holds steady at No. 1 while JUPITER Booster becomes the fourth exascale system on the list. The JUPITER Booster supercomputer, installed in Germany, uses Nvidia CPUs and GPUs and delivers a peak performance of exactly 1 exaflop, according to the November TOP500 list of supercomputers, released on Monday. The exaflop measurement is considered a major milestone in pushing computing performance to the limits. Today’s computers are typically measured in gigaflops and teraflops—and an exaflop translates to 1 billion gigaflops. Nvidia’s GPUs dominate AI servers installed in data centers as computing shifts to AI. As part of this shift, AI servers with Nvidia’s ARM-based Grace CPUs are emerging as a high-performance alternative to x86 chips. JUPITER is the fourth-fastest supercomputer in the world, behind three systems with x86 chips from AMD and Intel, according to TOP500. The top three supercomputers on the TOP500 list are in the U.S. and owned by the U.S. Department of Energy. The top two supercomputers—the 1.8-exaflop El Capitan at Lawrence Livermore National Laboratory and the 1.35-exaflop Frontier at Oak Ridge National Laboratory—use AMD CPUs and GPUs. The third-ranked 1.01-exaflop Aurora at Argonne National Laboratory uses Intel CPUs and GPUs. Intel scrapped its GPU roadmap after the release of Aurora and is now restructuring operations. The JUPITER Booster, which was assembled by France-based Eviden, has Nvidia’s GH200 superchip, which links two Nvidia Hopper GPUs with CPUs based on ARM designs. The CPU and GPU are connected via Nvidia’s proprietary NVLink interconnect, which is based on InfiniBand and provides bandwidth of up to 900 gigabytes per second. JUPITER first entered the Top500 list at 793 petaflops, but

Read More »

Samsung’s 60% memory price hike signals higher data center costs for enterprises

Industry-wide price surge driven by AI Samsung is not alone in raising prices. In October, TrendForce reported that Samsung and SK Hynix raised DRAM and NAND flash prices by up to 30% for Q4. Similarly, SK Hynix said during its October earnings call that its HBM, DRAM, and NAND capacity is “essentially sold out” for 2026, with the company posting record quarterly operating profit exceeding $8 billion, driven by surging AI demand. Industry analysts attributed the price increases to manufacturers redirecting production capacity. HBM production for AI accelerators consumes three times the wafer capacity of standard DRAM, according to a TrendForce report, citing remarks from Micron’s Chief Business Officer. After two years of oversupply, memory inventories have dropped to approximately eight weeks from over 30 weeks in early 2023. “The memory industry is tightening faster than expected as AI server demand for HBM, DDR5, and enterprise SSDs far outpaces supply growth,” said Manish Rawat, semiconductor analyst at TechInsights. “Even with new fab capacity coming online, much of it is dedicated to HBM, leaving conventional DRAM and NAND undersupplied. Memory is shifting from a cyclical commodity to a strategic bottleneck where suppliers can confidently enforce price discipline.” This newfound pricing power was evident in Samsung’s approach to contract negotiations. “Samsung’s delayed pricing announcement signals tough behind-the-scenes negotiations, with Samsung ultimately securing the aggressive hike it wanted,” Rawat said. “The move reflects a clear power shift toward chipmakers: inventories are normalized, supply is tight, and AI demand is unavoidable, leaving buyers with little room to negotiate.” Charlie Dai, VP and principal analyst at Forrester, said the 60% increase “signals confidence in sustained AI infrastructure growth and underscores memory’s strategic role as the bottleneck in accelerated computing.” Servers to cost 10-25% more For enterprises building AI infrastructure, these supply dynamics translate directly into

Read More »

Arista, Palo Alto bolster AI data center security

“Based on this inspection, the NGFW creates a comprehensive, application-aware security policy. It then instructs the Arista fabric to enforce that policy at wire speed for all subsequent, similar flows,” Kotamraju wrote. “This ‘inspect-once, enforce-many’ model delivers granular zero trust security without the performance bottlenecks of hairpinning all traffic through a firewall or forcing a costly, disruptive network redesign.” The second capability is a dynamic quarantine feature that enables the Palo Alto NGFWs to identify evasive threats using Cloud-Delivered Security Services (CDSS). “These services, such as Advanced WildFire for zero-day malware and Advanced Threat Prevention for unknown exploits, leverage global threat intelligence to detect and block attacks that traditional security misses,” Kotamraju wrote. The Arista fabric can intelligently offload trusted, high-bandwidth “elephant flows” from the firewall after inspection, freeing it to focus on high-risk traffic. When a threat is detected, the NGFW signals Arista CloudVision, which programs the network switches to automatically quarantine the compromised workload at hardware line-rate, according to Kotamraju: “This immediate response halts the lateral spread of a threat without creating a performance bottleneck or requiring manual intervention.” The third feature is unified policy orchestration, where Palo Alto Networks’ management plane centralizes zone-based and microperimeter policies, and CloudVision MSS responds with the offload and enforcement of Arista switches. “This treats the entire geo-distributed network as a single logical switch, allowing workloads to be migrated freely across cloud networks and security domains,” Srikanta and Barbieri wrote. Lastly, the Arista Validated Design (AVD) data models enable network-as-a-code, integrating with CI/CD pipelines. AVDs can also be generated by Arista’s AVA (Autonomous Virtual Assist) AI agents that incorporate best practices, testing, guardrails, and generated configurations. “Our integration directly resolves this conflict by creating a clean architectural separation that decouples the network fabric from security policy. This allows the NetOps team (managing the Arista

Read More »

AMD outlines ambitious plan for AI-driven data centers

“There are very beefy workloads that you must have that performance for to run the enterprise,” he said. “The Fortune 500 mainstream enterprise customers are now … adopting Epyc faster than anyone. We’ve seen a 3x adoption this year. And what that does is drives back to the on-prem enterprise adoption, so that the hybrid multi-cloud is end-to-end on Epyc.” One of the key focus areas for AMD’s Epyc strategy has been our ecosystem build out. It has almost 180 platforms, from racks to blades to towers to edge devices, and 3,000 solutions in the market on top of those platforms. One of the areas where AMD pushes into the enterprise is what it calls industry or vertical workloads. “These are the workloads that drive the end business. So in semiconductors, that’s telco, it’s the network, and the goal there is to accelerate those workloads and either driving more throughput or drive faster time to market or faster time to results. And we almost double our competition in terms of faster time to results,” said McNamara. And it’s paying off. McNamara noted that over 60% of the Fortune 100 are using AMD, and that’s growing quarterly. “We track that very, very closely,” he said. The other question is are they getting new customer acquisitions, customers with Epyc for the first time? “We’ve doubled that year on year.” AMD didn’t just brag, it laid out a road map for the next two years, and 2026 is going to be a very busy year. That will be the year that new CPUs, both client and server, built on the Zen 6 architecture begin to appear. On the server side, that means the Venice generation of Epyc server processors. Zen 6 processors will be built on 2 nanometer design generated by (you guessed

Read More »

Building the Regional Edge: DartPoints CEO Scott Willis on High-Density AI Workloads in Non-Tier-One Markets

When DartPoints CEO Scott Willis took the stage on “the Distributed Edge” panel at the 2025 Data Center Frontier Trends Summit, his message resonated across a room full of developers, operators, and hyperscale strategists: the future of AI infrastructure will be built far beyond the nation’s tier-one metros. On the latest episode of the Data Center Frontier Show, Willis expands on that thesis, mapping out how DartPoints has positioned itself for a moment when digital infrastructure inevitably becomes more distributed, and why that moment has now arrived. DartPoints’ strategy centers on what Willis calls the “regional edge”—markets in the Midwest, Southeast, and South Central regions that sit outside traditional cloud hubs but are increasingly essential to the evolving AI economy. These are not tower-edge micro-nodes, nor hyperscale mega-campuses. Instead, they are regional data centers designed to serve enterprises with colocation, cloud, hybrid cloud, multi-tenant cloud, DRaaS, and backup workloads, while increasingly accommodating the AI-driven use cases shaping the next phase of digital infrastructure. As inference expands and latency-sensitive applications proliferate, Willis sees the industry’s momentum bending toward the very markets DartPoints has spent years cultivating. Interconnection as Foundation for Regional AI Growth A key part of the company’s differentiation is its interconnection strategy. Every DartPoints facility is built to operate as a deeply interconnected environment, drawing in all available carriers within a market and stitching sites together through a regional fiber fabric. Willis describes fiber as the “nervous system” of the modern data center, and for DartPoints that means creating an interconnection model robust enough to support a mix of enterprise cloud, multi-site disaster recovery, and emerging AI inference workloads. The company is already hosting latency-sensitive deployments in select facilities—particularly inference AI and specialized healthcare applications—and Willis expects such deployments to expand significantly as regional AI architectures become more widely

Read More »

Key takeaways from Cisco Partner Summit

Brian Ortbals, senior vice president from World Wide Technology, which is one of Cisco’s biggest and most important partners stated: “Cisco engaged partners early in the process and took our feedback along the way. We believe now is the right time for these changes as it will enable us to capitalize on the changes in the market.” The reality is, the more successful its more-than-half-a-million partners are, the more successful Cisco will be. Platform approach is coming together When Jeetu Patel took the reigns as chief product officer, one of his goals was to make the Cisco portfolio a “force multiple.” Patel has stated repeatedly that, historically, Cisco acted more as a technology holding company with good products in networking, security, collaboration, data center and other areas. In this case, product breadth was not an advantage, as everything must be sold as “best of breed,” which is a tough ask of the salesforce and partner community. Since then, there have been many examples of the coming together of the portfolio to create products that leverage the breadth of the platform. The latest is the Unified Edge appliance, an all-in-one solution that brings together compute, networking, storage and security. Cisco has been aggressive with AI products in the data center, and Cisco Unified Edge compliments that work with a device designed to bring AI to edge locations. This is ideally suited for retail, manufacturing, healthcare, factories and other industries where it’s more cost effecting and performative to run AI where the data lives.

Read More »

Microsoft will invest $80B in AI data centers in fiscal 2025

And Microsoft isn’t the only one that is ramping up its investments into AI-enabled data centers. Rival cloud service providers are all investing in either upgrading or opening new data centers to capture a larger chunk of business from developers and users of large language models (LLMs).  In a report published in October 2024, Bloomberg Intelligence estimated that demand for generative AI would push Microsoft, AWS, Google, Oracle, Meta, and Apple would between them devote $200 billion to capex in 2025, up from $110 billion in 2023. Microsoft is one of the biggest spenders, followed closely by Google and AWS, Bloomberg Intelligence said. Its estimate of Microsoft’s capital spending on AI, at $62.4 billion for calendar 2025, is lower than Smith’s claim that the company will invest $80 billion in the fiscal year to June 30, 2025. Both figures, though, are way higher than Microsoft’s 2020 capital expenditure of “just” $17.6 billion. The majority of the increased spending is tied to cloud services and the expansion of AI infrastructure needed to provide compute capacity for OpenAI workloads. Separately, last October Amazon CEO Andy Jassy said his company planned total capex spend of $75 billion in 2024 and even more in 2025, with much of it going to AWS, its cloud computing division.

Read More »

John Deere unveils more autonomous farm machines to address skill labor shortage

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Self-driving tractors might be the path to self-driving cars. John Deere has revealed a new line of autonomous machines and tech across agriculture, construction and commercial landscaping. The Moline, Illinois-based John Deere has been in business for 187 years, yet it’s been a regular as a non-tech company showing off technology at the big tech trade show in Las Vegas and is back at CES 2025 with more autonomous tractors and other vehicles. This is not something we usually cover, but John Deere has a lot of data that is interesting in the big picture of tech. The message from the company is that there aren’t enough skilled farm laborers to do the work that its customers need. It’s been a challenge for most of the last two decades, said Jahmy Hindman, CTO at John Deere, in a briefing. Much of the tech will come this fall and after that. He noted that the average farmer in the U.S. is over 58 and works 12 to 18 hours a day to grow food for us. And he said the American Farm Bureau Federation estimates there are roughly 2.4 million farm jobs that need to be filled annually; and the agricultural work force continues to shrink. (This is my hint to the anti-immigration crowd). John Deere’s autonomous 9RX Tractor. Farmers can oversee it using an app. While each of these industries experiences their own set of challenges, a commonality across all is skilled labor availability. In construction, about 80% percent of contractors struggle to find skilled labor. And in commercial landscaping, 86% of landscaping business owners can’t find labor to fill open positions, he said. “They have to figure out how to do

Read More »

2025 playbook for enterprise AI success, from agents to evals

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More 2025 is poised to be a pivotal year for enterprise AI. The past year has seen rapid innovation, and this year will see the same. This has made it more critical than ever to revisit your AI strategy to stay competitive and create value for your customers. From scaling AI agents to optimizing costs, here are the five critical areas enterprises should prioritize for their AI strategy this year. 1. Agents: the next generation of automation AI agents are no longer theoretical. In 2025, they’re indispensable tools for enterprises looking to streamline operations and enhance customer interactions. Unlike traditional software, agents powered by large language models (LLMs) can make nuanced decisions, navigate complex multi-step tasks, and integrate seamlessly with tools and APIs. At the start of 2024, agents were not ready for prime time, making frustrating mistakes like hallucinating URLs. They started getting better as frontier large language models themselves improved. “Let me put it this way,” said Sam Witteveen, cofounder of Red Dragon, a company that develops agents for companies, and that recently reviewed the 48 agents it built last year. “Interestingly, the ones that we built at the start of the year, a lot of those worked way better at the end of the year just because the models got better.” Witteveen shared this in the video podcast we filmed to discuss these five big trends in detail. Models are getting better and hallucinating less, and they’re also being trained to do agentic tasks. Another feature that the model providers are researching is a way to use the LLM as a judge, and as models get cheaper (something we’ll cover below), companies can use three or more models to

Read More »

OpenAI’s red teaming innovations define new essentials for security leaders in the AI era

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More OpenAI has taken a more aggressive approach to red teaming than its AI competitors, demonstrating its security teams’ advanced capabilities in two areas: multi-step reinforcement and external red teaming. OpenAI recently released two papers that set a new competitive standard for improving the quality, reliability and safety of AI models in these two techniques and more. The first paper, “OpenAI’s Approach to External Red Teaming for AI Models and Systems,” reports that specialized teams outside the company have proven effective in uncovering vulnerabilities that might otherwise have made it into a released model because in-house testing techniques may have missed them. In the second paper, “Diverse and Effective Red Teaming with Auto-Generated Rewards and Multi-Step Reinforcement Learning,” OpenAI introduces an automated framework that relies on iterative reinforcement learning to generate a broad spectrum of novel, wide-ranging attacks. Going all-in on red teaming pays practical, competitive dividends It’s encouraging to see competitive intensity in red teaming growing among AI companies. When Anthropic released its AI red team guidelines in June of last year, it joined AI providers including Google, Microsoft, Nvidia, OpenAI, and even the U.S.’s National Institute of Standards and Technology (NIST), which all had released red teaming frameworks. Investing heavily in red teaming yields tangible benefits for security leaders in any organization. OpenAI’s paper on external red teaming provides a detailed analysis of how the company strives to create specialized external teams that include cybersecurity and subject matter experts. The goal is to see if knowledgeable external teams can defeat models’ security perimeters and find gaps in their security, biases and controls that prompt-based testing couldn’t find. What makes OpenAI’s recent papers noteworthy is how well they define using human-in-the-middle

Read More »