Stay Ahead, Stay ONMINE

Identity as the new perimeter: National Oilwell Varco’s approach to stopping the 79% of attacks that are malware-free

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More National Oilwell Varco (NOV) is undergoing a sweeping cybersecurity transformation under CIO Alex Philips, embracing a Zero Trust architecture, strengthening identity defenses and infusing AI into security operations. While the journey is not complete, the results, […]

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More


National Oilwell Varco (NOV) is undergoing a sweeping cybersecurity transformation under CIO Alex Philips, embracing a Zero Trust architecture, strengthening identity defenses and infusing AI into security operations. While the journey is not complete, the results, by all accounts, are dramatic – a 35-fold drop in security events, the elimination of malware-related PC reimaging and millions saved by scrapping legacy “appliance hell” hardware.

VentureBeat recently sat down (virtually) for this in-depth interview where Philips details how NOV achieved these outcomes with Zscaler’s Zero Trust platform, aggressive identity protections and a generative AI “co-worker” for its security team.

He also shares how he keeps NOV’s board engaged on cyber risk amid a global threat landscape where 79% of attacks to gain initial access are malware-free, and adversaries can move from breach to break out in as little as 51 seconds.

Below are excerpts of Philips’ recent interview with VentureBeat:

VentureBeat: Alex, NOV went “all in” on Zero Trust a number of years ago – what were the standout gains?

Alex Philips: When we started, we were a traditional castle-and-moat model that wasn’t keeping up. We didn’t know what Zero Trust was, we just knew that we needed identity and conditional access at the core of everything. Our journey began by adopting an identity-driven architecture on Zscaler’s Zero Trust Exchange and it changed everything. Our visibility and protection coverage dramatically increased while simultaneously experiencing a 35x reduction in the number of security incidents. Before, our team was chasing thousands of malware incidents; now, it’s a tiny fraction of that. We also went from reimaging about 100 malware-infected machines each month to virtually zero now. That’s saved a considerable amount of time and money. And since the solution is cloud-based, Appliance hell is gone, as I like to say.

The zero trust approach now gives 27,500 NOV users and third parties policy-based access to thousands of internal applications, all without exposing those apps directly to the internet.

We were then able to take an interim step and re-architect our network to take advantage of internet-based connectivity vs. legacy expensive MPLS. “On average, we increased speed by 10–20x, reduced latency to critical SaaS apps, and slashed cost by over 4x… Annualized savings [from network changes] have already achieved over $6.5M,” Philips has noted of the project.

VB: How did shifting to zero trust actually reduce the security noise by such an enormous factor?

Philips: A big reason is that our internet traffic now goes through a Security Service Edge (SSE) with full SSL inspection, sandboxing, and data loss prevention. Zscaler peers directly with Microsoft, so Office 365 traffic got faster and safer – users stopped trying to bypass controls because performance improved. After being denied SSL inspection with on-prem equipment, we finally got legal approval to decrypt SSL traffic since the cloud proxy does not give NOV access to spy on the data itself. That means malware hiding in encrypted streams started getting caught before hitting endpoints. In short, we shrunk the attack surface and let good traffic flow freely. Fewer threats in meant fewer alerts overall.

John McLeod, NOV’s CISO, concurred that the “old network perimeter model doesn’t work in a hybrid world” and that an identity-centric cloud security stack was needed. By routing all enterprise traffic through cloud security layers (and even isolating risky web sessions via tools like Zscaler’s Zero Trust Browser), NOV dramatically cut down intrusion attempts. This comprehensive inspection capability is what enabled NOV to spot and stop threats that previously slipped through, slashing incident volumes by 35x.

VB: Were there any unforeseen benefits to adopting Zero Trust you didn’t initially expect?

Alex Philips: Yes, our users actually preferred the cloud-based Zero Trust experience over legacy VPN clients, so adoption was simple and gave us unprecedented agility for mobility, acquisitions, and even what we like to call “Black Swan Events”. For example, when COVID-19 hit, NOV was already prepared! I told my leadership team if all 27,500 of our users needed to work remotely, our IT systems could handle it. My leadership was stunned and our company kept moving forward without missing a beat.

VB: Identity-based attacks are on the rise – you’ve mentioned staggering stats about credential theft. How is NOV fortifying identity and access management?

Philips: Attackers know it’s often easier to log in with stolen credentials than to drop malware. In fact, 79% of attacks to gain initial access in 2024 were malware-free, relying on stolen credentials, AI-driven phishing, and deepfake scams, according to recent threat reports. One in three cloud intrusions last year involved valid credentials. We’ve tightened identity policies to make those tactics harder.

For example, we integrated our Zscaler platform with Okta for identity and conditional access checks. Our conditional access policies verify devices have our SentinelOne antivirus agent running before granting access, adding an extra posture check. We’ve also drastically limited who can perform password or MFA resets. No single admin should be able to bypass authentication controls alone. This separation of duties prevents an insider or compromised account from simply turning off our protections.

VB: You mentioned finding a gap even after disabling a user’s account. Can you explain?

Philips: We discovered that if you detect and disable a compromised user’s account, the attacker’s session tokens might still be active. It isn’t enough to reset passwords; you have to revoke session tokens to truly kick out an intruder. We’re partnering with a startup to create near real-time token invalidation solutions for our most commonly used resources. Essentially, we want to make a stolen token useless within seconds. A Zero Trust architecture helps because everything is re-authenticated through a proxy or identity provider, giving us a single choke point to cancel tokens globally. That way, even if an attacker grabs a VPN cookie or cloud session, they can’t move laterally because we’ll kill that token fast.

VB: How else are you securing identities at NOV?

Philips: We enforce multi-factor authentication (MFA) almost everywhere and monitor for abnormal access patterns. Okta, Zscaler, and SentinelOne together form an identity-driven security perimeter where each login and device posture is continuously verified. Even if someone steals a user password, they still face device checks, MFA challenges, conditional access rules, and the risk of instant session revocation if anything seems off. Resetting a password isn’t enough anymore — we must revoke session tokens instantly to stop lateral movement. That philosophy underpins NOV’s identity threat defense strategy.

VB: You’ve also been an early adopter of AI in cybersecurity. How is NOV leveraging AI and generative models in the SOC?

Philips: We have a relatively small security team for our global footprint, so we must work smarter. One approach is bringing AI “co-workers” into our security operations center (SOC). We partnered with SentinelOne and started using their AI security analyst tool—an AI that can write and run queries across our logs at machine speed. It’s been a game changer, allowing analysts to ask questions in plain English and get answers in seconds. Instead of manually crafting SQL queries, the AI suggests the next query or even auto-generates a report, which has dropped our mean time to respond.

We’ve seen success stories where threat hunts are performed up to 80% faster using AI assistants. Microsoft’s own data shows that adding generative AI can reduce incident mean time to resolution by 30%. Beyond vendor tools, we’re also experimenting with internal AI bots for operational analytics, using OpenAI foundational AI models to help non-technical staff quickly query data. Of course, we have data protection guardrails in place so these AI solutions don’t leak sensitive information.

VB: Cybersecurity is no longer just an IT issue. How do you engage NOV’s board and executives on cyber risk?

Philips: I made it a priority to bring our board of directors along on our cyber journey. They don’t need the deep technical minutiae, but they do need to understand our risk posture. With generative AI exploding, for example, I briefed them on both the advantages and risks early on. That education helps when I propose controls to prevent data leaks—there’s already alignment on why it’s necessary.

The board views cybersecurity as a core business risk now. They’re briefed on it at every meeting, not just once a year. We’ve even run tabletop exercises with them to show how an attack would play out, turning abstract threats into tangible decision points. That leads to stronger top-down support.

I make it a point to constantly reinforce the reality of cyber risk. Even with millions invested in our cybersecurity program, the risk is never fully eliminated. It is not if we will have an incident, but when.

VB: Any final advice, based on NOV’s journey, for other CIOs and CISOs out there?

Philips: First, recognize that security transformation and digital transformation go hand in hand. We couldn’t have moved to the cloud or enabled remote work so effectively without Zero Trust, and the business cost savings helped fund security improvements. It truly was a “win, win, win.”

Second, focus on the separation of duties in identity and access. No one person should be able to undermine your security controls—myself included. Small process changes like requiring two people to change MFA for an exec or highly privileged IT staff, can thwart malicious insiders, mistakes, and attackers.

Lastly, embrace AI carefully but proactively. AI is already a reality on the attacker side. A well-implemented AI assistant can multiply your team’s defense, but you must manage the risks of data leakage or inaccurate models. Make sure to merge AI output with your team’s skill to create an AI-infused “brAIn”.

We know the threats keep evolving, but with zero trust, strong identity security and now AI on our side, it helps give us a fighting chance.

Shape
Shape
Stay Ahead

Explore More Insights

Stay ahead with more perspectives on cutting-edge power, infrastructure, energy,  bitcoin and AI solutions. Explore these articles to uncover strategies and insights shaping the future of industries.

Shape

CompTIA launches SecAI+ certification

The certification covers how to secure AI platforms and functionality, how to use AI to improve processes such as incident response, security analytics, threat intelligence, and penetration testing. It also focuses on how AI can automate compliance and risk management procedures under human guidance, according to CompTIA. “CompTIA SecAI+ addresses

Read More »

Palo Alto to acquire Israeli startup Koi for agentic AI security

Prisma AIRS features AI model scanning, which lets enterprises safely adopt AI models by scanning them for vulnerabilities and secure the AI ecosystem against risks such as model tampering, malicious scripts, and deserialization attacks. Posture management provides enterprises with insight into their security posture as related to the AI ecosystem

Read More »

EBW Warned of Faltering Gas Demand Heading into Holiday Weekend

In a U.S. natural gas focused EBW Analytics Group report sent to Rigzone by the EBW team on Friday, Eli Rubin, an energy analyst at the company, warned of “faltering demand” heading into the President’s Day holiday weekend. “The March contract tested as high as $3.316 yesterday before selling off after a bearish EIA [U.S. Energy Information Administration] storage surprise, and ahead of deteriorating heating demand into President’s Day holiday weekend and an 11 billion cubic foot per day drop into next Wednesday,” Rubin said in Friday’s report. “The threat of cold air in Western Canada and the Pacific Northwest moving into the U.S. remains a primary source of support,” he added. “If the market returns from the holiday weekend without this threat materializing, however, sub-$3.00 per million British thermal units may be in play as the year over year storage deficit flips to a 170 billion cubic foot surplus by late February,” he continued. In the report, Rubin went on to state that “steep storage refill demand east of the Rockies and loose supply/demand fundamentals during recent Marches may offer some medium-term support”. He added, however, that “storage exiting March near 1,800 billion cubic feet, with gathering production tailwinds and decelerating year over year LNG growth into mid to late 2026, suggest a bearish outlook for NYMEX gas futures”. In its latest weekly natural gas storage report, which was released on February 12 and included data for the week ending February 6, the EIA revealed that, according to its estimates, working gas in storage was 2,214 billion cubic feet as of February 6. “This represents a net decrease of 249 billion cubic feet from the previous week,” the EIA highlighted in the report. “Stocks were 97 billion cubic feet less than last year at this time and 130 billion

Read More »

North America Drops 6 Rigs Week on Week

North America dropped six rigs week on week, according to Baker Hughes’ latest North America rotary rig count, which was published on February 13. The total U.S. rig count remained unchanged week on week and the total Canada rig count dropped by six during the same period, pushing the total North America rig count down to 773, comprising 551 rigs from the U.S. and 222 rigs from Canada, the count outlined. Of the total U.S. rig count of 551, 531 rigs are categorized as land rigs, 17 are categorized as offshore rigs, and three are categorized as inland water rigs. The total U.S. rig count is made up of 409 oil rigs, 133 gas rigs, and nine miscellaneous rigs, according to Baker Hughes’ count, which revealed that the U.S. total comprises 481 horizontal rigs, 57 directional rigs, and 13 vertical rigs. Week on week, the U.S. land rig count dropped by one, its offshore rig count rose by one, and its inland water rig count remained unchanged, Baker Hughes highlighted. The U.S. oil rig count decreased by three week on week, while its gas rig count increased by three and its miscellaneous rig count remained unchanged, the count showed. The U.S. horizontal rig count dropped by two week on week, its directional rig count rose by two week on week, and its vertical rig count remained flat during the same period, the count revealed. A major state variances subcategory included in the rig count showed that, week on week, Texas dropped three rigs, Oklahoma and North Dakota each dropped one rig, Louisiana added two rigs, and New Mexico, Pennsylvania, and Wyoming each added one rig. A major basin variances subcategory included in the rig count showed that, week on week, the Permian basin dropped three rigs, the Williston basin dropped

Read More »

Aramco Commits to 1 MMtpa for 20 Years from Commonwealth LNG

Saudi Arabian Oil Co (Aramco) has signed a 20-year agreement to buy one million metric tons per annum (MMtpa) of liquefied natural gas from the under-development Commonwealth LNG in Cameron Parish, Louisiana. “Commonwealth is advancing toward a final investment decision with line of sight to secure its remaining capacity”, said a joint statement by the offtake parties. “Aramco Trading joins Glencore, JERA, PETRONAS, Mercuria and EQT among international energy companies entering into long-term offtake contracts with the platform”. Early this month Commonwealth announced a 20-year deal to supply one MMtpa to Geneva, Switzerland-based energy and commodities trader Mercuria. Commonwealth LNG is a project of Kimmeridge Energy Management Co LLC and Mubadala Investment Co through their joint venture Caturus HoldCo LLC. Expected to start operation 2030, Commonwealth LNG is designed to produce up to 9.5 million metric tons a year of LNG. “This agreement highlights the strong international demand for U.S. LNG and underscores how our longstanding relationships and capabilities position Caturus to serve global markets”, said Caturus chief executive David Lawler. “Our contract with Aramco Trading underscores the differentiated value Caturus can bring through our global reach in offering wellhead to water services”, Lawler added. Mohammed K. Al Mulhim, Aramco Trading president and CEO, said, “This agreement reflects Aramco Trading’s efforts to secure a reliable, long-term energy supply for global markets while strengthening our presence in the LNG sector”. The Gulf Coast project is permitted to ship up to 9.5 MMtpa of LNG, equivalent to around 1.21 billion cubic feet per day of gas according to Kimmeridge. The United States Energy Department granted the project authorization to export to countries without a free trade agreement (FTA) with the U.S. in August 2025 and FTA authorization in April 2020. The developers expect the first phase of the project to generate around

Read More »

Enbridge Q4 Profit Up YoY

Enbridge Inc has reported CAD 1.95 billion ($1.43 billion) in earnings and CAD 1.92 billion in adjusted earnings for the fourth quarter of 2025, up from CAD 493 million and CAD 1.64 billion for the same three-month period in 2024 respectively. Q4 2025 income per share of CAD 0.88 ($0.63), adjusted for extraordinary items, beat the Zacks Consensus Estimate of $0.6. Calgary-based Enbridge, which operates oil and gas pipelines in Canada and the United States, earlier bumped up its quarterly dividend by three percent against the prior rate to CAD 0.97. The annualized rate for 2026 is CAD 3.88 per share. Q4 2025 adjusted EBITDA rose 1.62 percent year-on-year to CAD 5.21 billion “due primarily to favorable gas transmission contracting and Venice Extension entering service, colder weather and higher rates and customer growth at Enbridge Gas Ontario, partially offset by the absence in 2025 of equity earnings related to investment tax credits from our investment in Fox Squirrel Solar”, Enbridge said in an online statement. United States gas transmission contributed CAD 997 million to segment adjusted EBITDA, down from CAD 1 billion for Q4 2024. The U.S. figure benefited from the startup of the Venice Extension Project, which expands the Texas Eastern system’s capacity to deliver gas to Gulf Coast markets, and Enbridge’s acquisition of a stake in the Matterhorn Express Pipeline. Enbridge also recognized “favorable contracting and successful rate case settlements on our U.S. Gas Transmission assets”, partially offset by the timing of operating costs. Adjusted EBITDA from Canadian gas transmission increased from CAD 157 million for Q4 2024 to CAD 190 million for Q4 2025, helped by “higher revenues at Aitken Creek due to favorable storage spreads”. Liquid pipelines logged CAD 2.45 billion in adjusted EBITDA, up from CAD 2.4 billion for Q4 2024. The Mainline System, which carries

Read More »

Analyst Highlights Focus of IEW Event

Focus at the London International Energy Week (IEW) last week was the balancing of geopolitics versus assessed surplus of oil globally in 2026. That’s what Skandinaviska Enskilda Banken AB (SEB) Chief Commodities Analyst Bjarne Schieldrop noted in a SEB report sent to Rigzone on Monday morning, adding that one delegate at the event stated that “if OPEC doesn’t cut, we’ll have $45 per barrel in June”. “That may be true,” Schieldrop said in the report. “But OPEC+ is meeting every month, taking a measure of the state of the global oil market and then decides what to do on the back of that. The group has been very explicit that they may cut, increase, or keep production steady depending on their findings,” he added. “We believe they will and thus we do not buy into $45 per barrel by June because, if need-be, they will trim production as they say they will,” he continued, pointing out that OPEC+ is next scheduled to meet on March 1 “to discuss production for April”. Schieldrop highlighted in the report that, in its February oil market report, the International Energy Agency (IEA) “restated its view that the world will only need 25.7 million barrels per day of crude from OPEC in 2026 versus a recent production by the group of 28.8 million barrels per day”. “I.e. that to keep the market balanced the group will need to cut production by some three million barrels per day,” he said. “Though strategic stock building around the world needs to be deducted from that. And the appetite for such stock building could be solid given elevated geopolitical risks. Thus what will flow to commercial stocks in the end remains to be seen,” he stated. Schieldrop went on to note in the report that increased Iranian tension could drive Brent

Read More »

Hungary Asks Croatia to Allow Russian Crude Shipments

Hungary requested that Croatia allow the shipment of Russian crude via the Adriatic pipeline while a key route through Ukraine remains blocked. Hungarian Foreign Minister Peter Szijjarto and Slovak Economy Minister Denisa Sakova jointly wrote to the Croatian government in Zagreb with the request, Szijjarto said in a statement Sunday. Oil transit along the Druzhba pipeline via Ukraine has been halted since late last month amid large-scale Russian attacks on Ukraine’s energy infrastructure, with the governments in Budapest and Kyiv in a standoff over the fallout. Budapest relies on the Druzhba pipeline connecting Hungary with Russia through war-torn Ukraine for most of its oil flows. Hungarian Prime Minister Viktor Orban, who has remained committed to buying Russian energy sources for his landlocked country, has also frequently engaged in debate with neighboring Croatia over the capacity of the Adriatic pipeline.  Energy policy is also likely to feature in Orban’s talks in Budapest with US Secretary of State Marco Rubio on Monday. Orban has found an ally in Slovak counterpart Robert Fico, who on Sunday echoed his views that Ukraine was using the Druzhba pipeline for political leverage, which officials in Kyiv have denied. What do you think? We’d love to hear from you, join the conversation on the Rigzone Energy Network. The Rigzone Energy Network is a new social experience created for you and all energy professionals to Speak Up about our industry, share knowledge, connect with peers and industry insiders and engage in a professional community that will empower your career in energy.

Read More »

Adani bets $100 billion on AI data centers as India eyes global hub status

The sovereignty question Adani framed the investment as a matter of national digital sovereignty, saying it would reserve a significant portion of GPU capacity for Indian AI startups and research institutions. Analysts were not convinced the structure supported the claim. “I believe it is too distant from digital sovereignty if the majority of the projects are being built to serve leading MNC AI hyperscalers,” said Shah. “Equal investments have to happen for public AI infrastructure, and the data of billions of users — from commerce to content to health — must remain sovereign.” Gogia framed the gap in operational terms. “Ownership alone does not define sovereignty,” he said. “The practical determinants are who controls privileged access during incidents, where critical workloads fail over when grids are stressed, and what regulatory oversight mechanisms are contractually enforceable.” Those are questions Adani has not yet answered and the market, analysts say, will be watching for more than just construction progress. But Banerjee said the market would not wait nine years to judge the announcement. “In practice, I think the market will judge this on near-term proof points, grid capacity secured, power contracting in place, and anchor tenants signed, rather than the headline capex or long-dated targets,” he said.

Read More »

Arista laments ‘horrendous’ memory situation

Digging in on campus Arista has been clear about its plans to grow its presence campus networking environments. Last Fall, Ullal said she expects Arista’s campus and WAN business would grow from the current $750 million-$800 million run rate to $1.25 billion, representing a 60% growth opportunity for the company. “We are committed to our aggressive goal of $1.25 billion for ’26 for the cognitive campus and branch. We have also successfully deployed in many routing edge, core spine and peering use cases,” Ullal said. “In Q4 2025, Arista launched our flagship 7800 R4 spine for many routing use cases, including DCI, AI spines with that massive 460 terabits of capacity to meet the demanding needs of multiservice routing, AI workloads and switching use cases. The combined campus and routing adjacencies together contribute approximately 18% of revenue.” Ethernet leads the way “In terms of annual 2025 product lines, our core cloud, AI and data center products built upon our highly differentiated Arista EOS stack is successfully deployed across 10 gig to 800 gigabit Ethernet speeds with 1.6 terabit migration imminent,” Ullal said. “This includes our portfolio of EtherLink AI and our 7000 series platforms for best-in-class performance, power efficiency, high availability, automation, agility for both the front and back-end compute, storage and all of the interconnect zones.” Ullal said she expects Ethernet will get even more of a boost later this year when the multivendor Ethernet for Scale-Up Networking (ESUN) specification is released.  “We have consistently described that today’s configurations are mostly a combination of scale out and scale up were largely based on 800G and smaller ratings. Now that the ESUN specification is well underway, we need a good solid spec. Otherwise, we’ll be shipping proprietary products like some people in the world do today. And so we will tie our

Read More »

From NIMBY to YIMBY: A Playbook for Data Center Community Acceptance

Across many conversations at the start of this year, at PTC and other conferences alike, the word on everyone’s lips seems to be “community.” For the data center industry, that single word now captures a turning point from just a few short years ago: we are no longer a niche, back‑of‑house utility, but a front‑page presence in local politics, school board budgets, and town hall debates. That visibility is forcing a choice in how we tell our story—either accept a permanent NIMBY-reactive framework, or actively build a YIMBY narrative that portrays the real value digital infrastructure brings to the markets and surrounding communities that host it. Speaking regularly with Ilissa Miller, CEO of iMiller Public Relations about this topic, there is work to be done across the ecosystem to build communications. Miller recently reflected: “What we’re seeing in communities isn’t a rejection of digital infrastructure, it’s a rejection of uncertainty driven by anxiety and fear. Most local leaders have never been given a framework to evaluate digital infrastructure developments the way they evaluate roads, water systems, or industrial parks. When there’s no shared planning language, ‘no’ becomes the safest answer.” A Brief History of “No” Community pushback against data centers is no longer episodic; it has become organized, media‑savvy, and politically influential in key markets. In Northern Virginia, resident groups and environmental organizations have mobilized against large‑scale campuses, pressing counties like Loudoun and Prince William to tighten zoning, question incentives, and delay or reshape projects.1 Loudoun County’s move in 2025 to end by‑right approvals for new facilities, requiring public hearings and board votes, marked a watershed moment as the world’s densest data center market signaled that communities now expect more say over where and how these campuses are built. Prince William County’s decision to sharply increase its tax rate on

Read More »

Nomads at the Frontier: PTC 2026 Signals the Digital Infrastructure Industry’s Moment of Execution

Each January, the Pacific Telecommunications Council conference serves as a barometer for where digital infrastructure is headed next. And according to Nomad Futurist founders Nabeel Mahmood and Phillip Koblence, the message from PTC 2026 was unmistakable: The industry has moved beyond hype. The hard work has begun. In the latest episode of The DCF Show Podcast, part of our ongoing ‘Nomads at the Frontier’ series, Mahmood and Koblence joined Data Center Frontier to unpack the tone shift emerging across the AI and data center ecosystem. Attendance continues to grow year over year. Conversations remain energetic. But the character of those conversations has changed. As Mahmood put it: “The hype that the market started to see is actually resulting a bit more into actions now, and those conversations are resulting into some good progress.” The difference from prior years? Less speculation. More execution. From Data Center Cowboys to Real Deployments Koblence offered perhaps the sharpest contrast between PTC conversations in 2024 and those in 2026. Two years ago, many projects felt speculative. Today, developers are arriving with secured power, customers, and construction underway. “If 2024’s PTC was data center cowboys — sites that in someone’s mind could be a data center — this year was: show me the money, show me the power, give me accurate timelines.” In other words, the market is no longer rewarding hypothetical capacity. It is demanding delivered capacity. Operators now speak in terms of deployments already underway, not aspirational campuses still waiting on permits and power commitments. And behind nearly every conversation sits the same gating factor. Power. Power Has Become the Industry’s Defining Constraint Whether discussions centered on AI factories, investment capital, or campus expansion, Mahmood and Koblence noted that every conversation eventually returned to energy availability. “All of those questions are power,” Koblence said.

Read More »

Cooling Consolidation Hits AI Scale: LiquidStack, Submer, and the Future of Data Center Thermal Strategy

As AI infrastructure scales toward ever-higher rack densities and gigawatt-class campuses, cooling has moved from a technical subsystem to a defining strategic issue for the data center industry. A trio of announcements in early February highlights how rapidly the cooling and AI infrastructure stack is consolidating and evolving: Trane Technologies’ acquisition of LiquidStack; Submer’s acquisition of Radian Arc, extending its reach from core data centers into telco edge environments; and Submer’s partnership with Anant Raj to accelerate sovereign AI infrastructure deployment across India. Layered atop these developments is fresh guidance from Oracle Cloud Infrastructure explaining why closed-loop, direct-to-chip cooling is becoming central to next-generation facility design, particularly in regions where water use has become a flashpoint in community discussions around data center growth. Taken together, these developments show how the industry is moving beyond point solutions toward integrated, scalable AI infrastructure ecosystems, where cooling, compute, and deployment models must work together across hyperscale campuses and distributed edge environments alike. Trane Moves to Own the Cooling Stack The most consequential development comes from Trane Technologies, which on February 10 announced it has entered into a definitive agreement to acquire LiquidStack, one of the pioneers and leading innovators in data center liquid cooling. The acquisition significantly strengthens Trane’s ambition to become a full-service thermal partner for data center operators, extending its reach from plant-level systems all the way down to the chip itself. LiquidStack, headquartered in Carrollton, Texas, built its reputation on immersion cooling and advanced direct-to-chip liquid solutions supporting high-density deployments across hyperscale, enterprise, colocation, edge, and blockchain environments. Under Trane, those technologies will now be scaled globally and integrated into a broader thermal portfolio. In practical terms, Trane is positioning itself to deliver cooling across the full thermal chain, including: • Central plant equipment and chillers.• Heat rejection and controls

Read More »

Infrastructure Maturity Defines the Next Phase of AI Deployment

The State of Data Infrastructure Global Report 2025 from Hitachi Vantara arrives at a moment when the data center industry is undergoing one of the most profound structural shifts in its history. The transition from enterprise IT to AI-first infrastructure has moved from aspiration to inevitability, forcing operators, developers, and investors to confront uncomfortable truths about readiness, resilience, and risk. Although framed around “AI readiness,” the report ultimately tells an infrastructure story: one that maps directly onto how data centers are designed, operated, secured, and justified economically. Drawing on a global survey of more than 1,200 IT leaders, the report introduces a proprietary maturity model that evaluates organizations across six dimensions: scalability, reliability, security, governance, sovereignty, and sustainability. Respondents are then grouped into three categories—Emerging, Defined, and Optimized—revealing a stark conclusion: most organizations are not constrained by access to AI models or capital, but by the fragility of the infrastructure supporting their data pipelines. For the data center industry, the implications are immediate, shaping everything from availability design and automation strategies to sustainability planning and evolving customer expectations. In short, extracting value from AI now depends less on experimentation and more on the strength and resilience of the underlying infrastructure. The Focus of the Survey: Infrastructure, Not Algorithms Although the report is positioned as a study of AI readiness, its primary focus is not models, training approaches, or application development, but rather the infrastructure foundations required to operate AI reliably at scale. Drawing on responses from more than 1,200 organizations, Hitachi Vantara evaluates how enterprises are positioned to support production AI workloads across six dimensions as stated above: scalability, reliability, security, governance, sovereignty, and sustainability. These factors closely reflect the operational realities shaping modern data center design and management. The survey’s central argument is that AI success is no longer

Read More »

Microsoft will invest $80B in AI data centers in fiscal 2025

And Microsoft isn’t the only one that is ramping up its investments into AI-enabled data centers. Rival cloud service providers are all investing in either upgrading or opening new data centers to capture a larger chunk of business from developers and users of large language models (LLMs).  In a report published in October 2024, Bloomberg Intelligence estimated that demand for generative AI would push Microsoft, AWS, Google, Oracle, Meta, and Apple would between them devote $200 billion to capex in 2025, up from $110 billion in 2023. Microsoft is one of the biggest spenders, followed closely by Google and AWS, Bloomberg Intelligence said. Its estimate of Microsoft’s capital spending on AI, at $62.4 billion for calendar 2025, is lower than Smith’s claim that the company will invest $80 billion in the fiscal year to June 30, 2025. Both figures, though, are way higher than Microsoft’s 2020 capital expenditure of “just” $17.6 billion. The majority of the increased spending is tied to cloud services and the expansion of AI infrastructure needed to provide compute capacity for OpenAI workloads. Separately, last October Amazon CEO Andy Jassy said his company planned total capex spend of $75 billion in 2024 and even more in 2025, with much of it going to AWS, its cloud computing division.

Read More »

John Deere unveils more autonomous farm machines to address skill labor shortage

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Self-driving tractors might be the path to self-driving cars. John Deere has revealed a new line of autonomous machines and tech across agriculture, construction and commercial landscaping. The Moline, Illinois-based John Deere has been in business for 187 years, yet it’s been a regular as a non-tech company showing off technology at the big tech trade show in Las Vegas and is back at CES 2025 with more autonomous tractors and other vehicles. This is not something we usually cover, but John Deere has a lot of data that is interesting in the big picture of tech. The message from the company is that there aren’t enough skilled farm laborers to do the work that its customers need. It’s been a challenge for most of the last two decades, said Jahmy Hindman, CTO at John Deere, in a briefing. Much of the tech will come this fall and after that. He noted that the average farmer in the U.S. is over 58 and works 12 to 18 hours a day to grow food for us. And he said the American Farm Bureau Federation estimates there are roughly 2.4 million farm jobs that need to be filled annually; and the agricultural work force continues to shrink. (This is my hint to the anti-immigration crowd). John Deere’s autonomous 9RX Tractor. Farmers can oversee it using an app. While each of these industries experiences their own set of challenges, a commonality across all is skilled labor availability. In construction, about 80% percent of contractors struggle to find skilled labor. And in commercial landscaping, 86% of landscaping business owners can’t find labor to fill open positions, he said. “They have to figure out how to do

Read More »

2025 playbook for enterprise AI success, from agents to evals

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More 2025 is poised to be a pivotal year for enterprise AI. The past year has seen rapid innovation, and this year will see the same. This has made it more critical than ever to revisit your AI strategy to stay competitive and create value for your customers. From scaling AI agents to optimizing costs, here are the five critical areas enterprises should prioritize for their AI strategy this year. 1. Agents: the next generation of automation AI agents are no longer theoretical. In 2025, they’re indispensable tools for enterprises looking to streamline operations and enhance customer interactions. Unlike traditional software, agents powered by large language models (LLMs) can make nuanced decisions, navigate complex multi-step tasks, and integrate seamlessly with tools and APIs. At the start of 2024, agents were not ready for prime time, making frustrating mistakes like hallucinating URLs. They started getting better as frontier large language models themselves improved. “Let me put it this way,” said Sam Witteveen, cofounder of Red Dragon, a company that develops agents for companies, and that recently reviewed the 48 agents it built last year. “Interestingly, the ones that we built at the start of the year, a lot of those worked way better at the end of the year just because the models got better.” Witteveen shared this in the video podcast we filmed to discuss these five big trends in detail. Models are getting better and hallucinating less, and they’re also being trained to do agentic tasks. Another feature that the model providers are researching is a way to use the LLM as a judge, and as models get cheaper (something we’ll cover below), companies can use three or more models to

Read More »

OpenAI’s red teaming innovations define new essentials for security leaders in the AI era

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More OpenAI has taken a more aggressive approach to red teaming than its AI competitors, demonstrating its security teams’ advanced capabilities in two areas: multi-step reinforcement and external red teaming. OpenAI recently released two papers that set a new competitive standard for improving the quality, reliability and safety of AI models in these two techniques and more. The first paper, “OpenAI’s Approach to External Red Teaming for AI Models and Systems,” reports that specialized teams outside the company have proven effective in uncovering vulnerabilities that might otherwise have made it into a released model because in-house testing techniques may have missed them. In the second paper, “Diverse and Effective Red Teaming with Auto-Generated Rewards and Multi-Step Reinforcement Learning,” OpenAI introduces an automated framework that relies on iterative reinforcement learning to generate a broad spectrum of novel, wide-ranging attacks. Going all-in on red teaming pays practical, competitive dividends It’s encouraging to see competitive intensity in red teaming growing among AI companies. When Anthropic released its AI red team guidelines in June of last year, it joined AI providers including Google, Microsoft, Nvidia, OpenAI, and even the U.S.’s National Institute of Standards and Technology (NIST), which all had released red teaming frameworks. Investing heavily in red teaming yields tangible benefits for security leaders in any organization. OpenAI’s paper on external red teaming provides a detailed analysis of how the company strives to create specialized external teams that include cybersecurity and subject matter experts. The goal is to see if knowledgeable external teams can defeat models’ security perimeters and find gaps in their security, biases and controls that prompt-based testing couldn’t find. What makes OpenAI’s recent papers noteworthy is how well they define using human-in-the-middle

Read More »