Generative AI is dissolving the economic logic that made standardized enterprise software the only practical choice for most companies. What replaces it will be shaped not just by the rapidly evolving capabilities of this new technology, but by leaders willing to ask a harder question: Which workflows do we actually need to own?
Long-range radio waves can pass through obstacles more easily, which makes them perfect for monitoring expansive factories or outdoor infrastructure. A recent report by Fabrity highlighted that these systems use very little power. This allows sensors to operate for 5 to 10 years on a single battery. Using such tech means you do not have to install expensive wiring across your entire site.
As vehicles become platforms for software and subscriptions, their longevity is increasingly tied to the survival of the companies behind their code. When those companies fail, the consequences ripple far beyond a bad app update and into the basic question of whether a car still functions as a car. Over the years, automotive software has expanded from performing rudimentary engine management and onboard diagnostics to powering today's interconnected, software-defined vehicles.
All of the appliances and systems are brand-new: the HVAC, the lighting, the entertainment. Touch screens of various shapes and sizes control this, that, and the other. Rows of programmable buttons sit where traditional light switches would normally be. The kitchen even has outlets designed to rise up from the countertop when you need them, and slide away when you don't.
Baron traces the origin story back to his time building high-scale systems at Instana (which exited to IBM in 2020), where the reality of "always-on" platforms made one thing obvious: the tooling we rely on is often too low-level, too rigid, and too disconnected from real-world use cases. That gap has only widened as environments have exploded in complexity-more cloud providers, more managed services, more hybrid setups, more internal APIs, and "gillions" of tools stitched together into brittle workflows.
Siemens has published eight new advisories. The company has released patches and mitigations for high-severity issues in Desigo CC, Sentron Powermanager, Simcenter Femap and Nastran, NX, Sinec NMS, Solid Edge, and Polarion products. A medium-severity flaw has been found in Siveillance Video Management Servers. Exploitation of the vulnerabilities can lead to unauthorized access, XSS, DoS, code execution, and privilege escalation.
The vulnerability, related to an insufficiently protected cryptographic key, could allow a remote, unauthenticated attacker to bypass verification and connect to a targeted controller by mimicking an engineering workstation. In a real-world industrial environment, the vulnerability could allow remote attackers to manipulate PLC logic and disrupt manufacturing processes, or even cause physical damage to equipment.
The Indurex platform ingests and correlates data from multiple sources across the cyber-physical stack, with a strong focus on industrial historians, instrumentation and asset management systems (IAMS), alarm management, and OT network and endpoint data. The platform, which can be integrated with third-party OT security solutions, is designed to unify cyber, process, and safety context into a single operational view, using adaptive risk scoring to highlight issues and prioritize response actions.
Retail point-of-sale systems today offer a wide range of options for peripherals and hardware. Their technical specifications play a major role in selection, and big retailers often choose multiple vendors to reduce a single point of failure. This gives them an advantage to negotiate price or support as well. Technically, these peripherals also require updating with new models and may have new feature sets. This necessitates the redevelopment of point-of-sale applications, increasing development costs.
The findings are based on several years of deploying OMICRON's intrusion detection system (IDS) StationGuard in protection, automation, and control (PAC) systems. The technology, which monitors network traffic passively, has provided deep visibility into real-world OT environments. The results underscore the growing attack surface in energy systems and the challenges operators face in securing aging infrastructure and complex network architectures.