GenAI boosts productivity by nearly 4 hours a week but gains are highly uneven: Nexthink

Posted in Commentary with tags on February 9, 2026 by itnerd

New research from Nexthink, the global leader in Digital Employee Experience (DEX) management, reveals that users[1] of Generative AI (GenAI) tools save a net average of 3 hours and 47 minutes per week.[2] However, the analysis finds that there are huge discrepancies between the four market-leading tools, with ChatGPT boosting productivity by more than double that of Copilot.

Tool[3]Average engagement time per user per weekEstimated net time saved per user per week
ChatGPT2hr 47mins5hr 46mins
Claude2hr 30mins3hr 23mins
Copilot2hr 40mins2hr 45mins
Gemini2hr 13mins4hr 46mins

The analysis, based on 4.9m sessions per day across 3.4m employees, also finds users tend to engage with GenAI 10 times per day, for a total of three hours and fourteen minutes per week on average.[4] However, there are significant numbers of users who are yet to engage with any of the Big Four tools.

While businesses have been quick to embrace GenAI, a lack of visibility around which tools are being used, by whom, and for what purposes, has been a significant problem in understanding the value they are getting from these investments. Nexthink AI Drive solves this problem by consolidating visibility, usage, guidance, and measurement data into a single vantage point. Combining this robust DEX data with user sentiment analysis, it uncovers employee pain points and adoption barriers, enabling organizations to provide better adoption support and employees to gain confidence faster.

To find out more about GenAI adoption or to discover how such tools are being used in your organization, please visit Nexthink’s AI Activation Playbook.

[1] Employees who log in at least once a week to any GenAI tool

2 Based on self-reporting from 5,000 end users between 30th October – January 29th of estimated time saved when using GenAI tools.

3 Overall averages reflect usage across all GenAI tools observed and are weighted by real-world usage levels (the four tools shown are the most used, but not used equally)

4 Data collected between 30th October 2025 – 29th January 2026 from Nexthink products AI Drive and AppEx. Data has been collected as a benchmark of tools across organizations. As such, in-house tools use has not been included in the analysis. All other product names, logos, brands, and other trademarks included in this release are the property of their respective trademark holders, and use of them does not imply any affiliation with or endorsement by them.

Forcepoint X-Labs Uncovers Low-Noise Phorpiex Campaign Delivering Offline ‘Global Group’ Ransomware

Posted in Commentary with tags on February 9, 2026 by itnerd

Today, the researchers at Forcepoint X-Labs released findings on a high-volume phishing campaign leveraging the Phorpiex botnet to deliver Global Group ransomware, demonstrating how familiar file types and low-friction attack chains continue to enable high-impact compromises.

Authored by Lydia McElligott, Senior Security Researcher, Forcepoint X-Labs researchers observed the following:

  • Weaponized Windows shortcut (.lnk) attachments: Attackers disguise the file as a normal document using double extensions, allowing a single click to trigger code execution. 
  • Stealthy multi-stage execution: The shortcut launches command-line tools that download and execute the payload with no visible installer. 
  • Offline “mute” ransomware: Global Group operates locally without contacting command-and-control infrastructure and generates encryption keys on the host, enabling execution even in air-gapped environments. 
  • No data exfiltration required: The ransomware conducts all activity locally, increasing the likelihood of evading detection strategies that rely on suspicious network traffic. 
  • Aggressive anti-forensics: Artifact removal and self-deletion techniques make detection and recovery particularly challenging. 

Bigger Picture

This campaign highlights how long-standing malware families remain effective when paired with reliable phishing techniques, reinforcing the need for organizations to prioritize endpoint behavior monitoring rather than relying solely on network signals. 

Here’s a link to the full findings: https://www.forcepoint.com/blog/x-labs/phorpiex-global-group-ransomware-lnk-phishing

My Wife Discovered A 407 ETR Email Scam Last Night

Posted in Commentary with tags on February 9, 2026 by itnerd

Now many readers would assume that because my wife hears about yours truly having to deal with clients who almost get scammed or do get scammed, that my wife would be well equipped to avoid scams. And to be fair, she’s likely better equipped than most. The fact that she was led to the discovery of a new 407 ETR scam that is clearly active.

Last night my wife asked me if I had taken the 407 ETR recently. Now for those who don’t live in Ontario. The 407 ETR is a toll road that runs across the greater Toronto area from Burlington in the west to Clarington in the east. I sometimes take it if I want to avoid traffic on Highway 401 and if it is convenient to do so. But it isn’t an everyday occurrence. Now when I do take it, I try to dump some money into our 407 account to make sure that she doesn’t have to pay for anything. But I will admit that I am not consistent about doing that. Which is likely why she asked about this.

Now when she told me the dollar amount that was owing, that was a red flag for me. It was $9.95. There’s only two or three clients that I would contemplate using the 407 ETR to get to or from their location. And any of those locations would be $20 or more in tolls and associated fees. That’s when I asked her to show me the email and I saw this:

Now this is a very, very convincing email that would make you think that this was legitimate. But it isn’t. Here’s why:

  1. There is no mention of my wife’s name or account number. That’s a #fail because companies who send you bills will always refer to you by name or account number.
  2. Looking closely at the sent address and recipient address, I see this:

The to address was sent directly to my wife’s email account. But the reply to didn’t come from the organization that runs the 407 ETR as that would have ended in @407etr.com. Next, if you look at the “from” field, you see this.

This is clearly not from the organization that runs the 407 ETR. Plus, if you look at the link that is referenced in the email, you get this:

The real 407 ETR website is http://www.407etr.com. Thus highlighting that this is a scam email.

Now my wife did not click on any links, but as a precaution we changed the password that’s associated with the account to keep the account safe. But I did go to the link and found a page which was clearly created to steal your credit card details. And on top of that, it looks like the same threat actors sent her two additional emails with different dollar amounts over the last two weeks. I find that interesting because this campaign seems hyper targeted. Perhaps it is related to this data breach from 2020? Who knows. But my wife took the right actions and avoided falling for this scam. Which are not to click anything and question everything. And I am doing my part by putting this story out there so you don’t fall for this scam either seeing as it is clearly an active campaign.

A Q&A On human-AI Collaboration With Aditya Ganjam Of Conviva

Posted in Commentary on February 9, 2026 by itnerd

Here’s a Q&A with  Aditya Ganjam, Co-founder of Conviva human-AI collaboration. This is something that I usually don’t do. But I thought I would give it a shot to see if I get a good response. Please leave a comment and let me know what you think of this.

In what ways might human-AI collaboration move past simple automation to actively shape and guide strategic business choices? 

AI agents are shifting from task runners to partners in decision-making. To achieve this potential, organizations must measure real experience and outcomes, not just accurate responses. By continuously analyzing every interaction and linking consumer behavioral patterns—for example, movement from agents to apps, and websites; long pauses; abandonment—to results like purchases, bookings, or resolution, teams can objectively measure agent effectiveness from the human’s perspective. This approach exposes friction, inefficiencies, and confusion, or where the agent helps or hurts. Furthermore, it can create a virtuous improvement cycle whereby the outcomes continuously sharpen prompts and tools. That outcome loop turns agents into engines of strategic insight that drive growth, reliability, and trust.

Which often overlooked human abilities will become increasingly valuable as AI integrates into the workplace? 

Curiosity with rigor is the superpower. People who design experiments, test assumptions, and learn fast will create outsized value. As agents take over routine execution, humans must become designers of discovery. We will see significant value placed on those willing and confident enough to test boundaries, question assumptions, and learn from failure at speed. The winners will make experimentation a habit, treating every failure as data that sharpens both the product and the agent.

What steps can leaders take to maintain clear accountability and openness as AI is adopted into daily business processes?

Manage AI by outcomes, not outputs. Define success as consistent, efficient achievement of business results, like add-to-cart, purchase, booking, and resolution, and track it with client-side telemetry that reflects experience and engagement from the consumer’s perspective. Pair this with explainability (what the agent did and why) and continuous feedback loops that refine prompts, tools, and policies. Keep human oversight for ethics and alignment, but let data drive iterative improvement.

Which ethical standards and governance structures should organizations establish today to effectively manage AI agents by 2027?

Enterprises should formalize human-in-the-loop governance as their first safeguard with outcome-based metrics as the central focus of agent performance. Require real-time monitoring of agent behavior “in the wild,” tying actions to consumer experience and measurable results, not just model-level accuracy. Mandate traceability for critical decisions, bias checks, and rollback paths, and institutionalize continuous learning so fixes and improvements flow back into prompts, tools, and safeguards. This makes systems provable, auditable, and resilient.

What’s the most important mindset or cultural transformation companies need to make to harness the full potential of human-driven AI?

Move from fear to evidence-driven curiosity. Encourage teams to co-work with agents, instrument experiences end-to-end, and act on what the data shows about outcomes. When people see how agents improve resolution, speed, and satisfaction, and where they don’t, they focus on higher-value work while systematically tuning the rest. That’s how organizations convert AI from novelty into predictable business performance.

Naval Group Announces Partnership with Astrolight to Supply Ships with Jam-Proof Laser Communication Terminals

Posted in Commentary with tags , on February 9, 2026 by itnerd

French shipbuilding giant Naval Group and Lithuanian space-tech company Astrolight signed a memorandum of understanding (MoU). The MoU marks the beginning of a collaboration between the two companies to test Astrolight’s POLARIS laser terminal on Naval Group’s vessels, exploring the potential for future integration of the technology. The partnership comes as Naval Group works to design a new multi-purpose vessel for the Lithuanian Navy, with plans to equip the ship with POLARIS.

Laser communication uses narrow, focused light beams that are nearly impossible to interfere with and detect. This new technology complements today’s cutting-edge technologies by mitigating risks associated with communication security, bandwidth, and data rate.

The new Multi-Purpose Offshore Patrol Vessel developed by Naval Group is designed to be versatile, capable of adapting quickly to changing mission needs. It can be used for combat, transport, launching unmanned aerial vehicles, and even converting into a floating hospital in an emergency.

The MoU between Naval Group and Astrolight was signed at the Lithuanian Maritime Defence Industry Days in Vilnius, where Naval Group, Belgium Naval & Robotics, and Exail showcased their vision for a new ship tailored to the needs of the Lithuanian Navy. The event was organized by the Lithuanian Engineering and Technology Industry Association.

This year, Astrolight’s POLARIS laser terminal was successfully tested with the Lithuanian Navy, as well as at NATO’s REPMUS/Dynamic Messenger, the largest exercise focusing on maritime unmanned systems in the world, and NATO’s largest military exercise in Latvia, DiBax. There, Astrolight demonstrated jam-proof, undetectable, and high-bandwidth ship-to-ship and land-to-land laser-based communication links. 

Tesoro VC and Parallel Works Partner to Support AI + Semiconductor Accelerator Startups 

Posted in Commentary with tags on February 9, 2026 by itnerd

Parallel Works and Tesoro VC today announced a strategic ecosystem partnership that will accelerate innovation at the intersection of AI, semiconductors, and high-performance computing (HPC).

Through the partnership, Tesoro VC connects accelerator startups with advanced compute requirements to Parallel Works, enabling them to access, manage, and scale HPC, GPU, and hybrid cloud resources without infrastructure complexity. Startups gain a consistent, ready-to-use compute framework that supports shared best practices, built-in cost controls, and repeatable workflows, allowing teams to focus on product development rather than platform management.

Tesoro’s Hybrid AI + Semiconductor Accelerator identifies and supports early-stage startups with demanding AI and semiconductor workloads, offering an end-to-end pathway from prototyping and design to funding, scaling, and global market entry.

Companies in the accelerator program gain access to the Parallel Works ACTIVATE platform, enabling teams to integrate complex technology stacks without vendor lock-in while providing a clear path from accelerator environments to enterprise-grade deployments. The collaboration includes technical enablement through training, mentorship, and workshops to help startups effectively access and apply HPC and AI tools to semiconductor design, AI model development, and advanced simulation.

Whitepaper: AI Chatbot and Youth Safety 

Posted in Commentary on February 6, 2026 by itnerd

AI can shift how developing minds understand technology and where they turn for support, leading to issues when chatbots are designed to feel “personal”. Magic School, the educational AI platform, has just released a white paper explaining how these risks can develop and what schools should know about AI in the classroom. 

You can find out more details here: https://www.magicschool.ai/blog-posts/student-safety-companionship

DataBee Launches DataBee RiskFlow

Posted in Commentary with tags on February 6, 2026 by itnerd

DataBee today announced the launch of DataBee RiskFlow™, an innovative agentic AI capability that lets security and IT teams query enterprise security and compliance data in simple conversational language. With DataBee RiskFlow, teams can ask questions like:

  • “Which assets have critical vulnerabilities that haven’t been patched in the last 30 days?”
  • “Show me users with risky login patterns across cloud and on‑prem environments.”
  • “What evidence do I need to demonstrate MFA compliance for my audit?”

DataBee RiskFlow interprets the question, identifies the relevant data, and returns a clear, defensible answer – complete with the underlying logic and data lineage. The result: faster investigations, simplified audits, and more consistent control validation.

Ask. Understand. Act.

DataBee RiskFlow transforms how organizations engage with their data. Any user can ask a question and receive:

  • A clear, concise answer
  • Full data lineage showing exactly where the answer came from
  • Traceable logic that demonstrates how conclusions were drawn
  • Defensible, audit-ready evidence
  • Recommended next actions to validate controls or address deviations

Because it is built directly into the DataBee security data fabric, it requires zero setup. The new capability is already in use across nearly all DataBee customers following its initial rollout, supporting security operations, IT teams, compliance groups, and business leaders who need fast, trustworthy insights.

2025: A Breakout Year for DataBee

The launch of DataBee RiskFlow caps a year of accelerated innovation and market momentum for DataBee. In 2025, the company delivered major advancements that further strengthened its position as a leader in unified security and compliance data.

Key milestones include:

As DataBee continues to expand and enhance its security offerings, organizations across healthcare, financial services, manufacturing, and media are leveraging its unified data foundation to validate controls, uncover previously unknown risks, and drive better security and compliance outcomes.

Understanding Cyber Risk in the Insurance Industry

Posted in Commentary with tags on February 6, 2026 by itnerd

Cyber risk is one of the most significant threats facing financial services, with insurers among the most frequently targeted organizations. Over the past year, there has been a notable increase in the number of attacks on the insurance industry, with several major insurers having reported major cybersecurity incidents, including Allianz Life InsuranceAflacPhiladelphia Indemnity Insurance, and Erie Insurance.

In response to this, Specops Software have published a look at cyber risk in the insurance industry.  You can read it here: https://specopssoft.com/blog/cyber-risk-insurance-industry/

Lessons From 2025: Zero-Day Exploitation Shaping 2026 

Posted in Commentary with tags on February 6, 2026 by itnerd

Outpost24 researchers have published an analysis into the major zero-day exploitations of 2025. Zero-day exploits were some of the most defining cyber threats of last year, with flaws affecting major platforms like React2Shell, Oracle EBS, and CitrixBleed 2.  This analysis is insightful for those who need to defend against zero days.

You can read the analysis here: https://outpost24.com/blog/top-zero-day-exploits-2025/