Stay Ahead, Stay ONMINE

Why security stacks need to think like an attacker, and score every user in real time

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More More than 40% of corporate fraud is now AI-driven, designed to mimic real users, bypass traditional defenses and scale at speeds that overwhelm even the best-equipped SOCs. In 2024, nearly 90% of enterprises were targeted, and […]

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More


More than 40% of corporate fraud is now AI-driven, designed to mimic real users, bypass traditional defenses and scale at speeds that overwhelm even the best-equipped SOCs.

In 2024, nearly 90% of enterprises were targeted, and half of them lost $10 million or more.

Bots emulate human behavior and create entire emulation frameworks, synthetic identities, and behavioral spoofing to pull off account takeovers at scale while slipping past legacy firewalls, EDR tools, and siloed fraud detection systems.

Attackers weaponize AI to create bots that evade, mimic, and scale

Attackers aren’t wasting any time capitalizing on using AI to weaponize bots in new ways. Last year, malicious bots comprised 24% of all internet traffic, with 49% classified as ‘advanced bots’ designed to mimic human behavior and execute complex interactions, including account takeovers (ATO).

Over 60% of account takeover (ATO) attempts in 2024 were initiated by bots, capable of breaching a victim’s credentials in real time using emulation frameworks that mimic human behavior. Attacker’s tradecraft now reflects the ability to combine weaponized AI and behavioral attack techniques into a single bot strategy.

That’s proving to be a lethal combination for many enterprises already battling malicious bots whose intrusion attempts often aren’t captured by existing apps and tools in security operations centers (SOCs).

Malicious bot attacks force SOC teams into firefighting mode with little or no warning, depending on the legacy of their security tech stack.

“Once amassed by a threat actor, they can be weaponized,” Ken Dunham, director of the threat research unit at Qualys recently said. “Bots have incredible resources and capabilities to perform anonymous, distributed, asynchronous attacks against targets of choice, such as brute force credential attacks, distributed denial of service attacks, vulnerability scans, attempted exploitation and more.”

From fan frenzy to fraud surface: bots corner the market for Taylor Swift tickets  

Bots are the virtual version of attackers who can scale to millions of attempts per second to attack a targeted enterprise and increasingly high-profile events, including concerts of well-known entertainers, such as Taylor Swift.

Datadome observes that the worldwide popularity of Taylor Swift’s concerts creates the ROI attackers are looking for to build ticket bots that automate what scalpers do at scale. Ticket bots, as Datadome calls them, scoop up massive quantities of tickets at the world’s most popular events and then resell them at significant markups.

The bots flooded Ticketmaster and were a large part of a surge of 3.5 billion requests that hit the ticket site, causing it to crash repeatedly. Thousands of fans were unable to access the presale group, and ultimately, the general ticket sale had to be canceled.

Swarms of weaponized bots froze tens of thousands of Swifties from attending her last Eras concert tour. VentureBeat has learned of comparable attacks on the world’s leading brands on their online stores and presence globally. Dealing with bot attacks at that scale, powered by weaponized AI, is beyond the scope of an e-commerce tech stack to handle – they’re not built to deal with that level of security threat.  

“It’s not just about blocking bots—it’s about restoring fairness,” Benjamin Fabre, CEO of DataDome, told VentureBeat in a recent interview. The company helped See Tickets deflect similar scalping attacks in milliseconds, distinguishing fans from fraud using multi-modal AI and real-time session analysis.

Bot attacks weaponized with AI often start by targeting login and session flows, bypassing endpoints in an attempt not to be detected by standard web application firewalls (WAF) and endpoint detection and response (EDR) tools. Such sophisticated attacks must be tracked and contained in a business’s core security infrastructure, managed from its SOC.

Why SOC teams are now on the front line

Weaponized bots are now a key part of any attacker’s arsenal, capable of scaling beyond what fraud teams alone can contain during an attack. Bots have proven lethal, taking down enterprises’ e-commerce operations or, in the case of Ticketmaster, a best-selling concert tour worth billions in revenue.  

As a result, more enterprises are bolstering the tech stacks supporting their SOCs with online fraud detection (OFD) platforms. Gartner’s Dan Ayoub recently wrote in the firm’s research note Emerging Tech Impact Radar: Online Fraud Detection that “organizations are increasingly waking up to the understanding that ‘fraud is a security problem’ as is becoming evident in adoption of some of the emerging technologies being leveraged today”.

Gartner’s research and VentureBeat’s interviews with CISOs confirm that today’s malicious bot attacks are too fast, stealthy and capable of reconfiguring themselves on the fly for siloed fraud tools to handle. Weaponized bots have long been able to exploit gaps between WAFs, EDR tools and fraud scoring engines, while also evading static rules that are so prevalent in legacy fraud detection systems.

All these factors and more are why CISOs are bringing fraud telemetry into the SOC.

Journey-Time Orchestration is the next wave of online fraud detection (OFD)

AI-enabled bots are constantly learning how to bypass long-standing fraud detection platforms that rely on sporadic or single point-in-time checks. These checks include login validations, transaction scoring tracking over time, and a series of challenge-responses. While these were effective before the widespread weaponization of bots, botnets and networks, AI-literate adversaries now know how to exploit context switching and, as many deepfakes attacks have proven, know how to excel at behavioral mimicry.

Gartner’s research points to Journey Time Orchestration  (JTO) as the defining architecture for the next wave of OFD platforms that will help SOCs better contain the onslaught of AI-driven bot attacks. Core to JTO is embedding fraud defenses throughout each digital session being monitored and scoring risk continuously from login to checkout to post-transaction behavior.

Journey-Time Orchestration continuously scores risk across the entire user session—from login to post-transaction—to detect AI-driven bots. It replaces single-point fraud checks with real-time, session-wide monitoring to counter behavioral mimicry and context-switching attacks. Source: Gartner, Innovation Insight: IAM Journey-Time Orchestration, Feb. 2025

Who’s establishing an early lead in Journey Time Orchestration defense  

DataDome, Ivanti and Telesign are three companies whose approaches show the power of shifting security from static checkpoints to continuous, real-time assessments is paying off. Each also shows why the future of SOCs must be predicated on real-time data to succeed. All three of these companies’ platforms have progressed to delivering scoring for every user interaction down to the API call, delivering greater contextual insight across every behavior on every device, within each session.

What sets these three companies apart is how they’ve taken on the challenges of hardening fraud prevention, automating core security functions while continually improving user experiences. Each combines these strengths on real-time platforms that are also AI-driven and continually learn – two core requirements to keep up with weaponized AI arsenals that include botnets.

DataDome: Thinking Like an Attacker in Real Time

DataDome, A category leader in real-time bot defense, has extensive expertise in AI-intensive behavioral modeling and relies on a platform that includes over 85,000 machine learning models delivered simultaneously across 30+ global PoPs. Their global reach allows them to inspect more than 5 trillion data points daily. Every web, mobile and API request that their platform can identify is scored in real time (typically within 2 milliseconds) using multi-modal AI that correlates device fingerprinting, IP entropy, browser header consistency and behavior biometrics.

“Our philosophy is to think like an attacker,” Fabre told VentureBeat. “That means analyzing every request anew—without assuming trust—and continuously retraining our detection models to adapt to zero-day tactics”​.

Unlike legacy systems, which lean on static heuristics or CAPTCHAs, DataDome’s approach minimizes friction for verified, legitimate users. Its false-positive rate is under 0.01%, meaning fewer than 1 in 10,000 human visitors see a challenge screen. Even when challenged, the platform invisibly continues behavior analysis to verify the user’s legitimacy.

“Bots aren’t just solving CAPTCHAs now—they’re solving them faster than humans,” Fabre added. “That’s why we moved away from static challenges entirely. AI is the only way to beat AI-driven fraud at scale”​.

Case in point: See Tickets used DataDome to defend against the same bot-driven scalping wave that crashed Ticketmaster during the Taylor Swift Eras Tour. DataDome could distinguish bots from fans in milliseconds and prevent bulk buyouts, preserving ticket equity during peak load. In luxury retail, brands like Hermès deploy DataDome to protect high-demand drops (e.g., Birkin bags) from automated hoarding.

Ivanti Extends Zero Trust and exposure management into the SOC

Ivanti is redefining exposure management by integrating real-time fraud signals directly into SOC workflows through its Ivanti Neurons for Zero Trust Access and Ivanti Neurons for Patch Management platforms. “Zero trust doesn’t stop at logins,” Mike Riemer, Ivanti Field CISO told VentureBeat during a recent interview. “We’ve extended it to session behaviors including credential resets, payment submissions, and profile edits are all potential exploit paths.”

Ivanti Neurons continuously evaluates device posture and identity behavior, flagging anomalous activity and enforcing least-privilege access mid-session. “2025 will mark a turning point,” added Daren Goeson, SVP of product management at Ivanti. “Now defenders can use GenAI to correlate behavior across sessions and predict threats faster than any human team ever could.”

As attack surfaces expand, Ivanti’s platform helps SOC teams detect SIM swaps, mitigate lateral movement and automate dynamic microsegmentation. “What we currently call ‘patch management’ should more aptly be named exposure management or how long is your organization willing to be exposed to a specific vulnerability?” Chris Goettl, VP of product management for endpoint security at Ivanti told VentureBeat. “Risk-based algorithms help teams identify high-risk threats amid the noise of numerous updates.”

“Organizations should transition from reactive vulnerability management to a proactive exposure management approach,” added Goeson. “By adopting a continuous approach, they can effectively protect their digital infrastructure from modern cyber risks.”

Telesign’s AI-driven identity intelligence pushes fraud detection to session scale

Telesign is redefining digital trust by bringing identity intelligence at session scale to the front lines of fraud detection. By analyzing more than 2,200 digital identity signals ranging from phone number metadata to device hygiene and IP reputation, Telesign’s APIs deliver real-time risk scores that catch bots and synthetic identities before damage is done.

“AI is the best defense against AI-enabled fraud attacks,” said Telesign CEO Christophe Van de Weyer in a recent interview with VentureBeat. “At Telesign, we are committed to leveraging AI and ML technologies to combat digital fraud, ensuring a more secure and trustworthy digital environment for all.”

Rather than relying on static checkpoints at login or checkout, Telesign’s dynamic risk scoring continuously evaluates behavior throughout the session. “Machine learning has the power to constantly learn how fraudsters behave,” Van de Weyer told VentureBeat. “It can study typical user behaviors to create baselines and build risk models.”

Telesign’s Verify API underscores its omnichannel strategy, enabling identity verification across SMS, email, WhatsApp, and more, all through a single API. “Verifying customers is so important because many kinds of fraud can often be stopped at the ‘front door,’” Van de Weyer noted in a recent VentureBeat interview.

As generative AI accelerates attacker sophistication, Van de Weyer issued a clear call to action: “The emergence of AI has brought the importance of trust in the digital world to the forefront. Businesses that prioritize trust will emerge as leaders in the digital economy.” With AI as its backbone, Telesign looks to turn trust into a competitive advantage.

Why fraud prevention’s future belongs in the SOC

For fraud protection to scale, it must be integrated into the broader security infrastructure stack and owned by the SOC teams who use it to avert potential attacks. Online fraud detection platforms and apps are proving just as critical as APIs, Identity and Access Management (IAM), EDRs, SIEMs and XDRs. VentureBeat is seeing more security teams in SOCs take greater ownership of validating how consumer transactions are modeled, scored and challenged.

Shape
Shape
Stay Ahead

Explore More Insights

Stay ahead with more perspectives on cutting-edge power, infrastructure, energy,  bitcoin and AI solutions. Explore these articles to uncover strategies and insights shaping the future of industries.

Shape

From packets to prompts: What Cisco’s AITECH certification means for IT pros

Cisco positions the AITECH learning path as a bridge from “traditional knowledge-based work” to innovation-driven roles augmented by AI, explicitly targeting professionals who need to design technical solutions, automate tasks, and lead teams using modern AI tools and methodologies. The curriculum spans AI-assisted code generation, AI-driven data analysis, model customization (including RAG),

Read More »

HPE’s latest Juniper routers target large‑scale AI fabrics

The three new models give customers several options for configurations and throughput capacity, but they all share support for the same deep buffers, security, and optics for AI network fabric buildouts, Francis said. In addition to the new hardware, HPE added new AI support, including a Model Context Protocol (MCP)

Read More »

Energy Department Approves Export Expansion at Corpus Christi LNG

CORPUS CHRISTI, TX—U.S. Secretary of Energy Chris Wright today signed an export authorization for a 12% expansion in exports at Cheniere Energy’s Corpus Christi liquefied natural gas (LNG) Terminal.  Today’s authorization allows additional exports of up to 0.47 billion cubic feet per day (Bcf/d) of U.S. natural gas as LNG to non-Free Trade Agreement (non-FTA) countries from Trains 8 and 9 of the Corpus Christi Stage 3 Project, known as the Midscale Trains 8 & 9 Project. With today’s order, Corpus Christi LNG is now authorized to export a total of 4.45 Bcf/d, making it the second largest LNG export project in the U.S. Secretary Wright announced the export expansion approval during a visit to the terminal. He also highlighted the United States’ leadership in LNG exports and the recent 10-year anniversary of the first cargo of U.S. LNG from the lower-48 states. “In the last ten years, American innovation and President Trump’s leadership transformed the United States into the world’s largest exporter of LNG,” said Secretary Wright. “This order helps further strengthen America’s LNG export capacity, delivering peace abroad and prosperity for Americans at home. I could not be prouder to be here today in Corpus Christi, standing alongside the American workers responsible for unleashing American energy dominance.”  “Every action we’re taking is focused on providing more reliable and secure energy to the world,” said Kyle Haustveit, Assistant Secretary of the Hydrocarbons and Geothermal Energy Office. “Our commitment to strengthening global partnerships through LNG exports helps to ensure a stable energy future and drive economic prosperity.”  Corpus Christi LNG has been operating as an export terminal since 2018, and Cheniere Energy announced a positive final investment decision of Trains 8 and 9 in June 2025. Today, the United States is the world’s largest producer of natural gas and LNG exporter.  Since the Trump Administration ended the previous administration’s LNG export approval ban to non-FTA countries, the Department has approved more than 18.2 Bcf/d

Read More »

Energy Department Announces $171.5 Million To Expand U.S. Geothermal Energy

Support for Field-Scale Tests and Exploration Drilling Can Help Advance Affordable, Reliable, Secure Geothermal Energy for American Homes and Businesses WASHINGTON—The U.S. Department of Energy (DOE) today announced a funding opportunity of $171.5 million to support next-generation geothermal field-scale tests for both electricity generation and exploration drilling to support characterization and potential confirmation of promising geothermal prospects. The activities enabled by this opportunity will help deliver on President Trump’s Executive Order, Unleashing American Energy by advancing geothermal technology, innovation, and exploration, in turn supporting the potential for geothermal energy to provide affordable, reliable, around-the-clock domestic electricity to Americans nationwide. “Work under this opportunity will directly support our commitments to advance energy addition, reduce energy costs for American families and businesses, and unleash American energy dominance and innovation,” said DOE Assistant Secretary of the Hydrocarbons and Geothermal Energy Office Kyle Haustveit. “Thanks to President Trump’s America First Energy Agenda, these demonstrations and drilling activities will help us realize the enormous potential of geothermal to spur domestic manufacturing, enable data center growth, and provide affordable, reliable, and secure energy solutions nationwide.” The funding opportunity includes six topics with varied levels of funding and awards anticipated. For the first round of applications, two of the six topics will be open, seeking field tests for enhanced geothermal systems and drilling for next-generation and hydrothermal resource characterization / confirmation. Although the United States leads the world in geothermal electricity capacity with about four gigawatts, DOE analysis shows the potential for at least 300 gigawatts of reliable, flexible geothermal power on the U.S. grid by 2050. Projects under this opportunity are expected to help derisk geothermal development approaches and locations nationwide, which can encourage private investment, spur industry growth, and help realize the country’s geothermal potential. Letters of Intent for the opportunity are due March 27, 2026, and full applications are due April 30, 2026.

Read More »

Energy Department Announces Largest Loan in Department History, Delivering Over $7 Billion in Electricity Cost Savings for Georgia and Alabama Customers

WASHINGTON—U.S. Secretary of Energy Chris Wright today announced the Department of Energy’s (DOE) Office of Energy Dominance Financing (EDF) has closed a historic $26.5 billion loan package to deliver over $7 billion in electricity cost savings to millions of customers in Georgia and Alabama. In accordance with President Trump’s Executive Order, Unleashing American Energy, this unprecedented loan package will support two wholly owned subsidiaries of Southern Company. Funded under President Trump’s Working Families Tax Cut, the investment will lower American energy costs, create thousands of jobs, and increase grid reliability in Georgia and Alabama. “Thanks to President Trump and the Working Families Tax Cut, the Energy Department is lowering energy costs and ensuring the American people have access to affordable, reliable, and secure energy for decades to come,” said Secretary Wright. “The President has been clear: America must reverse the energy subtraction agenda of past administrations and add more reliable power generation to our electrical grid. These loans will not only lower energy costs but also create thousands of jobs and increase grid reliability for the people of Georgia and Alabama.” The two loans will build or upgrade over 16 gigawatts (GW) of firm reliable power to the electrical grid. This includes 5 GW of new gas generation, 6 GW in nuclear improved through upgrades license renewals, hydropower modernization, battery energy storage systems and over 1,300 miles of transmission and grid enhancement projects. These loans represent the largest government investment aimed at directly lowering consumer energy costs and increasing grid reliability. Once all funds are received through the program, the loans are estimated to reduce Southern Company’s interest expenses by over $300 million per year, helping expedite lower electricity costs for customers. Southern Company is among the first utilities working with the DOE and the Trump Administration to restore American

Read More »

Energy Secretary Keeps Critical Generation Online in Mid-Atlantic

Emergency order keeps critical generation online and addresses critical grid reliability issues facing the Mid-Atlantic region of the United States WASHINGTON—U.S. Secretary of Energy Chris Wright issued an emergency order to address critical grid reliability issues facing the Mid-Atlantic region of the United States. The emergency order directs PJM Interconnection, L.L.C. (PJM), in coordination with Constellation Energy Corporation, to ensure Units 3 and 4 of the Eddystone Generating Station in Pennsylvania remain available for operation and to employ economic dispatch to minimize costs for the American people. The units were originally slated to shut down on May 31, 2025. “The energy sources that perform when you need them most are inherently the most valuable—that’s why natural gas and oil were valuable during recent winter storms,” Secretary Wright said. “Hundreds of American lives have likely been saved because of President Trump’s actions keeping critical generation online, including this Pennsylvania generating station which ran during Winter Storm Fern. This emergency order will mitigate the risk of blackouts and maintain affordable, reliable, and secure electricity access across the region.” The Eddystone Units were integral in stabilizing the grid during Winter Storm Fern. Between January 26-29, the units ran for over 124 hours cumulatively, providing critical generation in the midst of the energy emergency. As outlined in DOE’s Resource Adequacy Report, power outages could increase by 100 times in 2030 if the U.S. continues to take reliable power offline. Furthermore, NERC’s 2025 Long-Term Reliability Assessment warns, “The continuing shift in the resource mix toward weather-dependent resources and less fuel diversity increases risks of supply shortfalls during winter months.” Secretary Wright ordered that the two Eddystone Generating Station units remain online past their planned retirement date in a May 30, 2025 emergency order. Subsequent orders were issued on August 28, 2025 and November 26, 2025. Keeping these units operational

Read More »

Insights: Venezuela – new legal frameworks vs. the inertia of history

@import url(‘https://fonts.googleapis.com/css2?family=Inter:[email protected]&display=swap’); a { color: var(–color-primary-main); } .ebm-page__main h1, .ebm-page__main h2, .ebm-page__main h3, .ebm-page__main h4, .ebm-page__main h5, .ebm-page__main h6 { font-family: Inter; } body { line-height: 150%; letter-spacing: 0.025em; font-family: Inter; } button, .ebm-button-wrapper { font-family: Inter; } .label-style { text-transform: uppercase; color: var(–color-grey); font-weight: 600; font-size: 0.75rem; } .caption-style { font-size: 0.75rem; opacity: .6; } #onetrust-pc-sdk [id*=btn-handler], #onetrust-pc-sdk [class*=btn-handler] { background-color: #c19a06 !important; border-color: #c19a06 !important; } #onetrust-policy a, #onetrust-pc-sdk a, #ot-pc-content a { color: #c19a06 !important; } #onetrust-consent-sdk #onetrust-pc-sdk .ot-active-menu { border-color: #c19a06 !important; } #onetrust-consent-sdk #onetrust-accept-btn-handler, #onetrust-banner-sdk #onetrust-reject-all-handler, #onetrust-consent-sdk #onetrust-pc-btn-handler.cookie-setting-link { background-color: #c19a06 !important; border-color: #c19a06 !important; } #onetrust-consent-sdk .onetrust-pc-btn-handler { color: #c19a06 !important; border-color: #c19a06 !important; } In this Insights episode of the Oil & Gas Journal ReEnterprised podcast, Head of Content Chris Smith updates the evolving situation in Venezuela as the industry attempts to navigate the best path forward while the two governments continue to hammer out the details. The discussion centers on the new legal frameworks being established in both countries within the context of fraught relations stretching back for decades. Want to hear more? Listen in on a January episode highlighting industry’s initial take following the removal of Nicholas Maduro from power. References Politico podcast Monaldi Substack Baker webinar Washington, Caracas open Venezuela to allow more oil sales 

Read More »

Eni makes Calao South discovery offshore Ivory Coast

@import url(‘https://fonts.googleapis.com/css2?family=Inter:[email protected]&display=swap’); a { color: var(–color-primary-main); } .ebm-page__main h1, .ebm-page__main h2, .ebm-page__main h3, .ebm-page__main h4, .ebm-page__main h5, .ebm-page__main h6 { font-family: Inter; } body { line-height: 150%; letter-spacing: 0.025em; font-family: Inter; } button, .ebm-button-wrapper { font-family: Inter; } .label-style { text-transform: uppercase; color: var(–color-grey); font-weight: 600; font-size: 0.75rem; } .caption-style { font-size: 0.75rem; opacity: .6; } #onetrust-pc-sdk [id*=btn-handler], #onetrust-pc-sdk [class*=btn-handler] { background-color: #c19a06 !important; border-color: #c19a06 !important; } #onetrust-policy a, #onetrust-pc-sdk a, #ot-pc-content a { color: #c19a06 !important; } #onetrust-consent-sdk #onetrust-pc-sdk .ot-active-menu { border-color: #c19a06 !important; } #onetrust-consent-sdk #onetrust-accept-btn-handler, #onetrust-banner-sdk #onetrust-reject-all-handler, #onetrust-consent-sdk #onetrust-pc-btn-handler.cookie-setting-link { background-color: #c19a06 !important; border-color: #c19a06 !important; } #onetrust-consent-sdk .onetrust-pc-btn-handler { color: #c19a06 !important; border-color: #c19a06 !important; } Eni SPA discovered gas and condensate in the Murene South-1X exploration well in Block CI-501, Ivory Coast. The well is the first exploration in the block and was drilled by the Saipem Santorini drilling ship about 8 km southwest of the Murene-1X discovery well in adjacent CI-205 block. The well was drilled to about 5,000 m TD in 2,200 m of water. Extensive data acquisition confirmed a main hydrocarbon bearing interval in high-quality Cenomanian sands with a gross thickness of about 50 m with excellent petrophysical properties, the operator said. Murene South-1X will undergo a full conventional drill stem test (DST) to assess the production capacity of this discovery, named Calao South. Calao South confirms the potential of the Calao channel complex that also includes the Calao discovery. It is the second largest discovery in the country after Baleine, with estimated volumes of up to 5.0 tcf of gas and 450 million bbl of condensate (about 1.4 billion bbl of oil). Eni is operator of Block CI-501 (90%) with partner Petroci Holding (10%).

Read More »

Enterprise Spotlight: Data Center Modernization

The demands for, and challenges of, deploying AI applications has ratcheted up the urgency to bring data centers into the AI age. It’s a strategic imperative and success requires partners across the infrastructure spectrum, from servers and storage to high-performance computing, networking, software, and security. IT leaders, intensely focused on data center modernization, need strategies, roadmaps, and products that will get them there. Download the March 2026 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World and learn how data center modernization is taking shape in 2026.

Read More »

Why do data centers need so much water?

Another legacy cooling technology in data centers is what’s called a cooling tower. A cooling tower sits outside of the main building, and the water cascades down these towers like a waterfall. However, the tower is open to the atmosphere to let natural cooling in. The churn of the water dissipates the heat, but there is significant evaporation in the process. “It evaporates a lot. I mean, we’re talking many, many Olympic swimming pools worth of water on a daily basis in some of these data centers,” said Green. “Some of the hyperscalers I work with are still using open cooling tower solutions, even today.” There were other reasons for using evaporation. For starters, evaporation equipment takes up a lot less space the chilled water equipment. Secondly is the price. Chilled water-cooling costs about 10% to 15% more than equivalent evaporation technology. But that is changing, Green notes, as more and more societal pressure, economic pressure around water consumption continues to move to the forefront, data centers are being forced to adapt. “We’re in a market now where we can use air cooled chillers that don’t evaporate water like a water-cooled chiller does, and have a very, very similar level of overall system efficiency,” he said. We are also seeing the advent of closed loop technology, where liquid is pumped into a system to absorb heat and then pumped out to be cooled and recirculated, much like a car radiator. Gamers have been on the forefront of liquid cooling and closed loop with all-in-one coolers for gaming PCs becoming standard issue now.

Read More »

Netskope targets AI-driven network bottlenecks with AI Fast Path

AI Fast Path focuses on optimizing traffic flows between enterprise users, the Netskope cloud, and major AI providers. Netskope says more than 90% of its 120 NewEdge data centers can now connect to leading AI applications in less than five milliseconds from the Netskope cloud, an effort aimed at minimizing added delay as traffic is inspected for data loss prevention (DLP), threat protection, and policy enforcement. “Customers realized that if they don’t adopt these AI apps, they’re probably going to be extinct in a few years. At the same time, we can’t afford to compromise on security,” Arandjelovic says. “So, with NewEdge and the AI Fast Path, we’ve created a super-optimized path where there is literally barely a bump in the wire. At the same time, they are not compromising security, because you’re passing through our cloud and getting all the benefits of our data protection and threat protection.” As a set of capabilities within NewEdge, AI Fast Path enables better performance and efficiency for AI applications. According to Netskope, AI Fast Path provides enterprises with:

Read More »

AMD strikes massive AI chip deal with Meta

The funding is also unique. Instead of a cash purchase, AMD has reportedly given Meta warrants to buy up to 160 million shares at $0.01 each. Stock warrants are financial instruments that give you the right (but not the obligation) to buy a company’s stock at a fixed price before a certain expiration date, according to the vendors. With 1.6 billion shares outstanding, Meta is poised to acquire 10% of AMD. But perhaps not. These shares vest only as Meta buys more computing capacity. The final tranche vests only if AMD’s stock price hits $600, according to a recent 8K filing. AMD shares are currently valued at just over $200 as of this writing. The deal is identical to the one AMD struck with OpenAI last October. That deal was also for 6 GW worth of GPUs and included a warrant for up to 160 million AMD common stock shares structured to payout once certain targets were met. Meta is not playing favorites. Last week it announced that it will also deploy standalone Nvidia Grace CPUs in its production data centers, citing greatly improved performance-per-watt. That doesn’t come as a surprise to Gaurav Gupta, vice president analyst at Gartner, who says we are compute constrained and Hyperscalers or frontier model companies will use a multisource approach to get access to compute.  “No one wants to be stuck with a single vendor. Diversify and then different workloads have different compute needs.,” he said.

Read More »

Nvidia lines up partners to boost security for industrial operations

Akamai extends its micro-segmentation and zero-trust security platform Guardicore to run on Nvidia BlueField GPUs The integration offloads user-configurable security processes from the host system to the Nvidia BlueField DPU and enables zero-trust segmentation without requiring software agents on fragile or legacy systems, according to Akamai. Organizations can implement this hardware-isolated, “agentless” security approach to help align with regulatory requirements and lower their risk profile for cyber insurance. “It delivers deep, out-of-band visibility across systems, networks, and applications without disrupting operations. Security policies can be enforced in real time and are capable of creating a strong protective boundary around critical operational systems. The result is trusted insight into operational activity and improved overall cyber resilience,” according to Akamai. Forescout works with Nvidia to bring zero-trust technology to OT networks Forescout applies network segmentation to contain lateral movement and enforce zero-trust controls. The technology would be further integrated into partnership work already being done by the two companies. By running Forescout’s on-premises sensor directly on the Nvidia BlueField, part of Nvidia Cybersecurity AI platform, customers can offload intensive computing tasks, such as deep packet inspections. This speeds up data processing, enhances asset intelligence, and improves real-time monitoring, providing security teams with the insights needed to stay ahead of emerging threats, according to Forescout. Palo Alto to demo Prisma AIRS AI Runtime Security on Nvidia BlueField DPU Palo Alto Networks recently partnered with Nvidia to run its Prisma AI-powered Radio Security(AIRs) package on the Nvidia BlueField DPU and will show off the technology at the conference. The technology is part of the Nvidia Enterprise AI Factory validated design and can offer real-time security protection for industrial network settings. “Prisma AIRS AI Runtime Security delivers deep visibility into industrial traffic and continuous monitoring for abnormal behavior. By running these security services on Nvidia BlueField, inspection

Read More »

Raising the temp on liquid cooling

IBM isn’t the only one. “We’ve been doing liquid cooling since 2012 on our supercomputers,” says Scott Tease, vice president and general manager of AI and high-performance computing at Lenovo’s infrastructure solutions group. “And we’ve been improving it ever since—we’re now on the sixth generation of that technology.” And the liquid Lenovo uses in its Neptune liquid cooling solution is warm water. Or, more precisely, hot water: 45 degrees Celsius. And when the water leaves the servers, it’s even hotter, Tease says. “I don’t have to chill that water, even if I’m in a hot climate,” he says. Even at high temperatures, the water still provides enough cooling to the chips that it has real value. “Generally, a data center will use evaporation to chill water down,” Tease adds. “Since we don’t have to chill the water, we don’t have to use evaporation. That’s huge amounts of savings on the water. For us, it’s almost like a perfect solution. It delivers the highest performance possible, the highest density possible, the lowest power consumption. So, it’s the most sustainable solution possible.” So, how is the water cooled down? It gets piped up to the roof, Tease says, where there are giant radiators with massive amounts of surface area. The heat radiates away, and then all the water flows right back to the servers again. Though not always. The hot water can also be used to, say, heat campus or community swimming pools. “We have data centers in the Nordics who are giving the heat to the local communities’ water systems,” Tease says.

Read More »

Microsoft will invest $80B in AI data centers in fiscal 2025

And Microsoft isn’t the only one that is ramping up its investments into AI-enabled data centers. Rival cloud service providers are all investing in either upgrading or opening new data centers to capture a larger chunk of business from developers and users of large language models (LLMs).  In a report published in October 2024, Bloomberg Intelligence estimated that demand for generative AI would push Microsoft, AWS, Google, Oracle, Meta, and Apple would between them devote $200 billion to capex in 2025, up from $110 billion in 2023. Microsoft is one of the biggest spenders, followed closely by Google and AWS, Bloomberg Intelligence said. Its estimate of Microsoft’s capital spending on AI, at $62.4 billion for calendar 2025, is lower than Smith’s claim that the company will invest $80 billion in the fiscal year to June 30, 2025. Both figures, though, are way higher than Microsoft’s 2020 capital expenditure of “just” $17.6 billion. The majority of the increased spending is tied to cloud services and the expansion of AI infrastructure needed to provide compute capacity for OpenAI workloads. Separately, last October Amazon CEO Andy Jassy said his company planned total capex spend of $75 billion in 2024 and even more in 2025, with much of it going to AWS, its cloud computing division.

Read More »

John Deere unveils more autonomous farm machines to address skill labor shortage

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Self-driving tractors might be the path to self-driving cars. John Deere has revealed a new line of autonomous machines and tech across agriculture, construction and commercial landscaping. The Moline, Illinois-based John Deere has been in business for 187 years, yet it’s been a regular as a non-tech company showing off technology at the big tech trade show in Las Vegas and is back at CES 2025 with more autonomous tractors and other vehicles. This is not something we usually cover, but John Deere has a lot of data that is interesting in the big picture of tech. The message from the company is that there aren’t enough skilled farm laborers to do the work that its customers need. It’s been a challenge for most of the last two decades, said Jahmy Hindman, CTO at John Deere, in a briefing. Much of the tech will come this fall and after that. He noted that the average farmer in the U.S. is over 58 and works 12 to 18 hours a day to grow food for us. And he said the American Farm Bureau Federation estimates there are roughly 2.4 million farm jobs that need to be filled annually; and the agricultural work force continues to shrink. (This is my hint to the anti-immigration crowd). John Deere’s autonomous 9RX Tractor. Farmers can oversee it using an app. While each of these industries experiences their own set of challenges, a commonality across all is skilled labor availability. In construction, about 80% percent of contractors struggle to find skilled labor. And in commercial landscaping, 86% of landscaping business owners can’t find labor to fill open positions, he said. “They have to figure out how to do

Read More »

2025 playbook for enterprise AI success, from agents to evals

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More 2025 is poised to be a pivotal year for enterprise AI. The past year has seen rapid innovation, and this year will see the same. This has made it more critical than ever to revisit your AI strategy to stay competitive and create value for your customers. From scaling AI agents to optimizing costs, here are the five critical areas enterprises should prioritize for their AI strategy this year. 1. Agents: the next generation of automation AI agents are no longer theoretical. In 2025, they’re indispensable tools for enterprises looking to streamline operations and enhance customer interactions. Unlike traditional software, agents powered by large language models (LLMs) can make nuanced decisions, navigate complex multi-step tasks, and integrate seamlessly with tools and APIs. At the start of 2024, agents were not ready for prime time, making frustrating mistakes like hallucinating URLs. They started getting better as frontier large language models themselves improved. “Let me put it this way,” said Sam Witteveen, cofounder of Red Dragon, a company that develops agents for companies, and that recently reviewed the 48 agents it built last year. “Interestingly, the ones that we built at the start of the year, a lot of those worked way better at the end of the year just because the models got better.” Witteveen shared this in the video podcast we filmed to discuss these five big trends in detail. Models are getting better and hallucinating less, and they’re also being trained to do agentic tasks. Another feature that the model providers are researching is a way to use the LLM as a judge, and as models get cheaper (something we’ll cover below), companies can use three or more models to

Read More »

OpenAI’s red teaming innovations define new essentials for security leaders in the AI era

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More OpenAI has taken a more aggressive approach to red teaming than its AI competitors, demonstrating its security teams’ advanced capabilities in two areas: multi-step reinforcement and external red teaming. OpenAI recently released two papers that set a new competitive standard for improving the quality, reliability and safety of AI models in these two techniques and more. The first paper, “OpenAI’s Approach to External Red Teaming for AI Models and Systems,” reports that specialized teams outside the company have proven effective in uncovering vulnerabilities that might otherwise have made it into a released model because in-house testing techniques may have missed them. In the second paper, “Diverse and Effective Red Teaming with Auto-Generated Rewards and Multi-Step Reinforcement Learning,” OpenAI introduces an automated framework that relies on iterative reinforcement learning to generate a broad spectrum of novel, wide-ranging attacks. Going all-in on red teaming pays practical, competitive dividends It’s encouraging to see competitive intensity in red teaming growing among AI companies. When Anthropic released its AI red team guidelines in June of last year, it joined AI providers including Google, Microsoft, Nvidia, OpenAI, and even the U.S.’s National Institute of Standards and Technology (NIST), which all had released red teaming frameworks. Investing heavily in red teaming yields tangible benefits for security leaders in any organization. OpenAI’s paper on external red teaming provides a detailed analysis of how the company strives to create specialized external teams that include cybersecurity and subject matter experts. The goal is to see if knowledgeable external teams can defeat models’ security perimeters and find gaps in their security, biases and controls that prompt-based testing couldn’t find. What makes OpenAI’s recent papers noteworthy is how well they define using human-in-the-middle

Read More »