Archive for December 19, 2025

2026 predictions from Peer Software

Posted in Commentary with tags on December 19, 2025 by itnerd

The 2026 predictions keep coming. Today I have 2026 predictions from Jimmy Tam, CEO of Peer Software.

Agentic AI Will Converge with Distributed File Services to Enable a New Class of Distributed Digital Teams

2026 will mark the beginning of a major architectural shift: agentic AI systems will merge with distributed file services to create AI digital teams that can autonomously capture data, act on it, and push results across multiple locations and platforms. As organizations deploy distributed AI agents at the edge, in the cloud, and across data centers, they will realize the missing piece is the ability to move information seamlessly and intelligently between those agents. The convergence of agentic AI and distributed file services will become essential for orchestrating workflows, sharing context, and ensuring AI agents can collaborate in real time across heterogeneous environments.

Distributed Storage Will Become a Strategy for Load-Balancing Data, Energy Use, and GPU Costs

As GPU scarcity, energy prices, and power-availability constraints intensify, organizations will turn to distributed storage architectures to balance not just data, but operational costs and resources. In 2026, storage and infrastructure decisions will increasingly factor in electricity rates, regional resource availability, latency impacts, and GPU scheduling considerations. Instead of concentrating workloads in a single region or cloud, enterprises will distribute data and compute to optimize for cost efficiency and sustainability—shifting data to where it is cheapest and most energy-efficient to run AI workloads.

2026 Is the Year Active–Passive Architectures Officially Die

With the rise of real-time AI and globally distributed data pipelines, traditional active–passive replication models will become obsolete. Organizations can no longer tolerate backup systems sitting idle or playing catch-up during failover. Instead, active–active data architectures—where every site participates, synchronizes, and serves traffic continuously—will become the new baseline. High-availability will mean high-utilization, and anything less will be seen as both a performance bottleneck and a business risk.

AI Consolidation Will Accelerate; Driving a Wave of M&A Focused on Integrating Disparate Systems

Large vendors will aggressively acquire smaller AI, data, and edge-platform companies to accelerate capabilities, expand ecosystems, and simplify customer adoption. But the real challenge will be integrating the disparate systems these acquisitions bring. Companies that can rapidly harmonize data, metadata, and file services across newly merged environments will be the ones that deliver value fastest.

Metadata Management Becomes a Critical AI Advantage

Metadata will take center stage in 2026 as organizations struggle with AI-driven data explosion. To control cost, speed up pipelines, and avoid overwhelming GPUs, enterprises will shift from brute-force replication to metadata-driven data orchestration. Instead of moving entire datasets, businesses will filter, curate, and replicate only the specific slices of data required for a given AI, ML, or analytics workflow. Metadata-rich insights, such as access patterns, relevance scoring, or PeerIQ-style analytics, will guide what data moves where. Metadata becomes not just a way to describe data, but a way to control and optimize it.

LastPass Responds To The UK Smacking Them Down Because They Were Pwned

Posted in Commentary with tags on December 19, 2025 by itnerd

You might recall that the UK government served up a £1.2 million fine to LastPass because they got pwned. That fine hasn’t gone over well with LastPass. And I say that because I actually got a statement sent to my inbox about that:

“We have been cooperating with the UK ICO since we first reported this incident to them back in 2022. While we are disappointed with the outcome, we are pleased to see that the ICO’s decision has recognized many of the efforts we have already taken to further strengthen our platform and enhance our data security measures. Our focus remains on delivering the best possible service to the 100,000 businesses and millions of individual consumers who continue to rely on LastPass.”

Clearly they feel that this fine is unfair. But I am not sure what they were expecting. Given how bad this incident was, someone was going to punish them. It happened to be the UK in this case. In short, they had to have seen this coming. If I could offer them some advice, they should forget about the fine and focus on “delivering the best possible service to the 100,000 businesses and millions of individual consumers who continue to rely on LastPass” as that will go a long way towards fixing the reputational damage that this incident created..

Recast Unveils Notable Right Click Tools Updates to Strengthen Endpoint Management

Posted in Commentary with tags on December 19, 2025 by itnerd

Recast today announced the latest Right Click Tools advancements. Features include new tools for administering Intune and Entra environments as organizations continue to blend the capabilities of ConfigMgr and Intune. Right Click Tools enables IT teams to manage endpoints more efficiently, reduce operational costs, and ensure consistent security and performance.

The Right Click Tools product line extends endpoint management with add-ons for PatchingInsights, and Privileged Access. The Intune-first companion unifies today’s ConfigMgr reality with tomorrow’s cloud management future, empowering organizations to accelerate and ensure success on their cloud journey.

Expanded Intune and Entra ID Capabilities in Right Click Tools


In recent months, Right Click Tools has introduced powerful new options for managing devices in Intune and Entra ID environments. Users can now:

  • Run Intune-specific tools simultaneously on multiple devices. This includes deleting devices from Intune/Azure, adding devices to Entra groups, and syncing Intune application and compliance policies. 
  • Remove devices from Intune and/or Entra with a single tool, and trigger policy updates with ease.
  • Leverage new Windows Autopilot management features such as adding/editing group tags and removing devices from Autopilot for streamlined device onboarding and lifecycle management.

Optimizations for Right Click Tools Patching


Recast’s development team completed numerous product enhancements within Right Click Tools Patching throughout 2025. The product now enables users to:

  • Set up automatic email notification templates that alert systems administrators of application deployment successes or failures.
  • Upload and deploy custom applications alongside Recast’s library of nearly 4,500 software titles.  
  • Use pre- and post-deployment PowerShell scripting for advanced configuration.
  • Schedule deployments to align with Microsoft’s Patch Tuesday.
  • Update third-party applications using an existing ConfigMgr Software Update catalog.
  • Create Intune deployment processes for the applications in ConfigMgr ARP inventory.

New Device Visibility in Right Click Tools Insights

The Warranty Information Dashboard now provides real-time visibility into warranty status over time and by manufacturer for devices handled in Microsoft Intune. This enhancement helps IT teams proactively manage hardware lifecycles and ensure device reliability across the enterprise.

The new Insights node in Recast Management Server offers device inventory data from more than a dozen existing Insights inventory classes.

Foxit Releases PDF Editor v2025.3 with Advanced Compliance, Security Upgrades and AI-Powered Productivity Tools for Windows and Mac Users

Posted in Commentary with tags on December 19, 2025 by itnerd

Foxit has announced the release of Foxit PDF Editor v2025.3.  

This latest version strengthens Foxit’s commitment to delivering secure, compliant and intelligent document workflows. 

Enhanced Compliance With Collaboration

Foxit PDF Editor v2025.3 introduces important updates that enhance secure collaboration and responsible data protection. These improvements offer greater transparency and control during shared document workflows and help organizations uphold governance standards. 

  • Consent Collection: Users receive a clear region-specific consent prompt before accessing shared documents. The prompt informs participants that others may see their information and requires them to explicitly opt in. 
  • Invitation Transparency: Collaboration invitations now state that participant names and email addresses may be visible to others and include a direct link to Foxit’s Privacy Policy. 
  • Audit and Data Handling: Consent activity, including user identity, timestamp, IP address and consent text, is securely logged for audit purposes. If users decline consent, the system automatically anonymizes them in shared environments. 

These updates reinforce Foxit’s commitment to delivering secure, compliant document collaboration solutions for enterprise and government customers. 

Strengthened Security in Windows

Foxit PDF Editor v2025.3 introduces important security improvements for Windows users who rely on Microsoft Sensitivity Labels to safeguard confidential content. The update incorporates automatic authentication with the Microsoft Azure Information Protection (AIP) plugin by using the user’s current single sign-on session, removing the need for repeated login prompts and ensuring protected documents open smoothly with the correct access rights. Organizations can control this behavior centrally through registry settings or the Foxit Customization Wizard, thereby enhancing consistency and reducing the risk of access issues. These updates make high-security workflows more efficient, save users time when handling labeled documents, and reinforce compliance with internal policies.  

Additionally, Windows users now have a new option that automatically removes hidden information when saving or closing a document, helping teams protect sensitive metadata and maintain internal privacy standards. These improvements enhance secure document workflows and improve the overall user experience for organizations that handle sensitivity-labeled and compliance-protected content. 

Additional Feature Enhancements Across Windows and Mac 

Foxit PDF Editor v2025.3 enhances its AI features with new tools that help users work smarter and faster. The update introduces AI image generation to create visuals directly from text prompts, moves the Summarize Document feature to the main AI Assistant ribbon for easier access, adds translation support for 9 additional languages, and allows users to export AI-generated answers directly to Word or PDF for instant sharing and editing. Also, Foxit PDF Editor now features an enhanced Smart Command mode that lets users perform PDF tasks using natural language. Turn it on in “More Tools” and simply type what you want to do, whether it’s adding a watermark, applying Bates numbering, or removing pages from a document. In addition to AI improvements, the update also offers broader productivity and usability enhancements to improve collaboration and streamline daily document tasks. Additionally, it adds support for Dropbox Team Folders across Windows and Mac, making it easier for teams to access and share centrally managed content. 

Windows users also experience an improved commenting system that simplifies review tasks. A new favorites toolbox lets teams save and reuse custom markup styles for faster, more consistent annotations. Enhanced compatibility enables users to edit annotation properties for comments created in Bluebeam, supporting review workflows. Finally, the option to export comments to CSV makes it easier to gather feedback and support project or audit workflows. 

Availability

Foxit PDF Editor v2025.3 is available today for Windows and macOS. For more information or to upgrade, click here

Guest Post: Is Your Smart Home A Cyber Playground? North Korean Hackers Could Be Targeting It 

Posted in Commentary with tags on December 19, 2025 by itnerd

The growing number of connected devices and increasing vulnerabilities, including the latest one that has been exploited by North Korean and Chinese hackers, raises concerns among cybersecurity experts. They warn that such attacks will increase, and have severe consequences: from stolen data to private videos leaked on the internet.

​At the beginning of December, a cybersecurity vulnerability dubbed React2Shell that can affect millions of connected home devices worldwide was publicly disclosed. Just days later, security researchers already observed hacker groups from North Korea and China exploiting the vulnerability for malicious purposes. This example illustrates how quickly hackers can exploit weaknesses, often long before vendors fix them.

​A forecast from IoT Analytics predicted that this year, a number of connected home devices is expected to reach 21.1 billion, with double-digit growth projected for the upcoming years. 

Not only traditional cameras and printers, but also new-gen thermostats and wearables are being increasingly incorporated in our daily lives, and potential vulnerabilities increase too.

​Experts at Planet VPN, a free virtual private network provider, say that worldwide, there are many more attacks, most of which are unnoticed by users. According to Konstantin Levinzon, co-founder of the company, hackers are increasingly shifting their focus to smart homes due to their lack of protection.

​“When people think about cybersecurity, they often take care of their smartphones and forget about the rest. However, other devices connected to homes often have weaker security than our smartphones or laptops, making them a more lucrative target for cybercriminals. Your TV, camera, or printer can open the door for cybercriminals to your network, and once they break in, it is hard to stop them,” Levinzon says.

A recent report by Bitdefender and Netgear, which analyzed 58 million smart home devices across the US, Australia, and Europe, found 4.6 billion vulnerabilities and noticed 13.6 billion attacks in the first 10 months of this year.

​According to Levinzon, there are several ways bad actors can hijack your home. One huge security hole is outdated firmware: smart home devices often receive too few security updates, leaving them exposed to all kinds of vulnerabilities.

​In addition, many devices, including routers and cameras, come with default passwords that are easy for hackers to guess. Despite the growing number of cyber incidents, users still rely on default or weak passwords, making hacking into users’ homes an easy task even for unskilled cybercriminals, Levinzon says.

​On top of that, there are a number of potential issues with home network security.

​“Users trust device manufacturers too much and don’t consider the security of smart home devices before buying them. For example, cheap security cameras often promise to secure your home, when in reality, they may act like a Trojan horse. Poor encryption and insecure communication protocols can expose users’ private lives online instead of keeping them safe.,” Levinzon explains.

​The rise of AI assistants also poses security concerns. Earlier this year, researchers at Tel Aviv University published a paper where they described how “Google’s” AI assistant Gemini can be used to do things like open windows in a person’s apartment, after receiving only a calendar invite.

​According to Levinzon, while the latter example was only theoretical, as AI continues to have much more influence in our lives, we will see more similar examples happening in real life.

​Once cybercriminals compromise a person’s network, AI assistant, or device, they can then use it for various purposes: steal the user’s personal data, eavesdrop, hijack smart home equipment to launch cyberattacks, and even control your home.

​To avoid becoming a victim, Levinzon advises using unique passwords and enabling multi-factor authentication. Updating firmware regularly and ensuring that these devices have secure communication protocols, such as WPA3, is also a must.

​“It is also important to protect devices when you are using them,” he says. “Turn on a VPN whenever you are browsing using your smartphone, laptop, or smart TV: it will enhance your security and privacy by hiding your IP address and making your data invisible to anyone, even to your internet service provider. Remember, that for cybercriminals, even one unprotected device may be enough to take control of your entire home.”