AI Productivity Gains Collide with Economic and Geopolitical Volatility, Forcing a Strategic Reset for Technology Leaders, Reveal Survey Finds

Posted in Commentary on February 2, 2026 by itnerd

AI continues to deliver measurable productivity and performance gains across organizations, but global economic uncertainty and geopolitical risk are reshaping technology investment, hiring, and innovation strategies for 2026, according to the annual Reveal Top Software Development Challenges Survey from Infragistics, released today. The study surveyed 250 senior technology leaders in December 2025, including C-suite executives, CIOs, CTOs, VPs, IT managers, and directors responsible for software development and business intelligence at mid-market and enterprise organizations across industries.

The findings reveal a technology landscape defined by tension: strong momentum from AI-driven productivity improvements on one side, and growing constraints from talent shortages, budget pressure, and global instability on the other. While most organizations reported positive outcomes in 2025, many are entering 2026 with a more cautious, execution-focused mindset.

Talent and AI Complexity Top the List of Business Challenges

Recruiting and retaining skilled technology talent has emerged as the single biggest business challenge for 2026, cited by 50% of respondents. This increase highlights a gap between the pace of AI adoption and the availability of experienced professionals who can implement, govern, and scale these technologies effectively.

AI itself remains a double-edged sword. While it is a critical driver of productivity, 42% of respondents cited incorporating AI as a major business challenge, reflecting the growing complexity of moving from experimentation to full-scale deployment. Additional business challenges include increasing employee productivity (54%), economic cutbacks (35%), limited resources (31%), and the inability to make data-driven decisions (12%). Together, these pressures are making it harder for organizations to execute long-term technology roadmaps.

Despite these constraints, growth remains evident. In 2025, 53% of organizations reported productivity gains, 47% took on new projects, and 46% increased adoption of new technologies. These results build on strong momentum from 2024, when a majority of companies reported revenue growth, increased headcount, and rising demand. Heading into 2026, however, execution capacity—not demand—is emerging as the primary limiter of growth.

Productivity Gains Face Economic Reality

Technology-driven initiatives were the primary drivers of productivity gains in 2025. Two-thirds (66%) of respondents credited AI adoption, while similar percentages pointed to embedded analytics (62%), automation of repetitive tasks (62%), and investments in skills development (63%) as the engines behind rising productivity. The data confirms a clear shift: productivity is increasingly achieved through smarter systems, not longer hours.

Yet these gains are under threat. One-quarter of organizations plan to cut spending in 2026 due to a weakening economy. Inflation (60%), rising costs (58%), economic instability (53%), tariffs (50%), and higher interest rates (40%) are among the top pressures influencing planning decisions. This creates a growing disconnect between the technologies that drive performance and the budget constraints that may limit further investment.

Economic and Geopolitical Pressures Drive a Strategic Reset

More than half of technology leaders report delaying launches or expansions (54%), while 43% are reducing innovation budgets and 35% are changing development team locations. Only 17% say global conditions have had no impact on their plans.

These findings point to a broad shift in strategy across the industry. Organizations are shifting from aggressive growth strategies toward defensive optimization—prioritizing resilience, cost control, and risk management. As a result, even successful AI and analytics initiatives must now clearly demonstrate business value to survive in tighter budget environments. Companies are pushing AI investments that deliver measurable efficiency gains, cost reduction, or near-term revenue impact.

AI Integration Becomes the Top Software Development Challenge

In 2026, the biggest software development challenge is no longer whether to use AI, but how to integrate it safely and effectively. Nearly six in ten respondents (57%) cite AI integration into the development process as their top challenge, up from 44% in 2025. Security threats (49%) and data privacy and regulatory compliance (48%) closely follow, underscoring the increasing risk and governance complexity associated with AI-driven systems.

Operational challenges persist as well. Managing cloud applications and heavy workloads (29%) and maintaining legacy software (27%) reflect the realities of hybrid environments where innovation must coexist with aging infrastructure. Compared with 2025, the data shows a clear shift from exploratory AI concerns, such as AI-generated code quality, to full lifecycle integration, security, and compliance pressures.

AI-Centered Expansion Plans Signal Measured Optimism

Despite economic uncertainty, organizations are not retreating from growth entirely. Instead, they are pursuing more targeted expansion strategies anchored in AI. More than three-quarters of respondents (77%) plan to increase their use of AI in 2026, reinforcing its central role in productivity and competitiveness.

Notably, revenue ambitions have doubled year over year: 46% plan to increase revenue in 2026, compared with 23% in 2025. Plans to adopt new applications (40%), expand into new markets (35%), and develop new applications (34%) indicate a shift from internal optimization toward outward, commercially focused growth. AI investments are increasingly expected to deliver tangible, measurable business outcomes rather than experimental gains.

Embedded Analytics and BI Move from Insight to Action

Embedded analytics and business intelligence continue to gain momentum. Today, 76% of organizations use embedded analytics internally, and 84% expect their BI focus to increase in 2026. The emphasis is shifting from visualization to action: organizations cite better decision-making, faster trend identification, productivity gains, and automated analysis as top priorities.

Most companies now embed analytics directly into applications rather than relying on standalone BI tools. While 42% still build in-house, a majority (54%) turn to vendors to accelerate delivery, reduce costs, and avoid overburdening already stretched teams.

Looking Ahead

The 2026 Reveal survey underscores a defining reality for technology leaders: AI, analytics, and embedded BI are no longer optional—they are essential to competitive performance. However, success in 2026 will depend on execution. Organizations that can navigate talent shortages, security risks, and economic pressure while focusing investment on high-impact AI initiatives will be best positioned to sustain productivity, drive growth, and adapt in an increasingly uncertain global environment.

If You Use Notepad ++, You Should Download The Latest Version ASAP

Posted in Commentary with tags , on February 2, 2026 by itnerd

I am a big user of Notepad ++ as I find it to be the best way to go through logs. Especially big ones. Thus I will be downloading the latest version of the app as soon as I get home for this reason:

Following the security disclosure published in the v8.8.9 announcement https://notepad-plus-plus.org/news/v889-released/ the investigation has continued in collaboration with external experts and with the full involvement of my (now former) shared hosting provider.

According to the analysis provided by the security experts, the attack involved infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org. The exact technical mechanism remains under investigation, though the compromise occured at the hosting provider level rather than through vulnerabilities in Notepad++ code itself. Traffic from certain targeted users was selectively redirected to attacker-controlled served malicious update manifests.

And:

I recommend downloading v8.9.1 (which includes the relevant security enhancement) and running the installer to update your Notepad++ manually.

I have to admit that I completely missed this. That’s bad on me. The only good news is that I run Notepad ++ inside of a Windows 11 virtual machine on my Mac. So since it is largely isolated, I don’t believe that either yours truly or my customers were at risk. But for everybody who runs Notepad ++, update ASAP to keep yourself safe.

Ricoh acquires leading Canadian workplace technology and collaboration integrator ET Group

Posted in Commentary with tags on February 2, 2026 by itnerd

Ricoh today announced the acquisition of ET Group, a leading Canadian workplace technology and collaboration integrator. This strategic acquisition by Ricoh Canada Inc. accelerates Ricoh’s expansion into high‑growth digital services, strengthens its position as a leading provider of end‑to‑end workplace experience solutions in Canada, and reinforces its global strategy to support an evolving workplace environment.

By integrating ET Group’s audiovisual (AV) engineering expertise and long‑standing reputation for designing, delivering and supporting enterprise-wide collaboration environments — particularly within government and other highly regulated sectors — Ricoh further enhances its ability to provide scalable, technology‑driven workplace solutions across Canada.

Advancing Ricoh’s Digital Services Strategy

This strategic investment expands Ricoh’s digital workplace capabilities with:

  • Enterprise grade AV design, integration, and support
  • Hybrid meeting and collaboration solutions
  • Managed digital workplace services
  • Workplace experience and on-site staffing services

The acquisition formalizes and expands the existing partnership between Ricoh and ET Group, which will operate as a wholly owned subsidiary of Ricoh Canada.

Building a Stronger Service Network for Public‑ and Private‑Sector Organizations

ET Group brings a highly skilled team of AV engineers, designers, project managers, and support specialists trusted by major corporations, government agencies, and judicial systems. Its expertise in secure, resilient environments complements Ricoh’s footprint with Canada’s large enterprises and public institutions.

Customers will benefit from a more comprehensive service ecosystem that now integrates:

  • Audiovisual and collaboration technologies
  • Office and workplace experience services
  • Mailroom automation
  • Managed print, scan, and fleet services
  • On‑site staffing and managed services

This combined portfolio enables organizations to design, connect, and manage the workplace as a unified, intelligent environment.

Ricoh continues to make investments globally to deliver enhanced meeting experiences and hybrid work solutions for organizations worldwide, including the acquisitions of Presentation Products, Inc. (PPI) and Cenero (United States); DataVision, Pure AV, and AVC (EMEA); and Videocorp and Go2neXt (Latin America).

Panera Bread Pwned… Sigh

Posted in Commentary with tags on February 2, 2026 by itnerd

It appears that Panera Bread has had a data breach. Initial reports have said that 14 million people have been affected. Which is bad. Especially given that they had a data leak in 2018. Well, news has surfaced that the Panera Bread data breach has affected 5.1 million accounts, not 14 million customers as previously reported.

Ensar Seker, CISO at SOCRadar:

“The distinction matters, but it doesn’t materially reduce the risk. Accounts are what attackers monetize, credentials, contact data, and reuse potential, not abstract “customers.” From a defender’s perspective, 5.1 million compromised accounts still represents a massive downstream risk for credential stuffing, phishing, and identity-based attacks well beyond Panera itself.


This incident reinforces a clear trend: attackers are no longer “breaking in,” they’re logging in. Vishing-driven SSO compromise bypasses many traditional security controls because authentication flows are trusted by design. If identity becomes the new perimeter, then SSO misconfiguration, MFA fatigue, and help-desk social engineering are now tier-one attack vectors.

What’s notable here is scale and repeatability. Targeting identity providers allows attackers to industrialize access across hundreds of organizations with similar playbooks. This isn’t about Panera specifically, it’s about systemic weaknesses in identity assurance, employee verification, and SSO recovery workflows.

Companies need to treat identity telemetry with the same rigor as endpoint or network signals. That means stricter SSO enrollment controls, hardened help-desk verification, phishing-resistant MFA, and continuous monitoring for anomalous authentication behavior, especially for admin and customer-facing identity systems.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech

“It’s reasonable to ask whether ShinyHunters or Panera Bread is lying about how many people were compromised in this attack. I would defer to Panera. ShinyHunters estimated the number of customers in the database based on the total number of records, but it didn’t account for duplicates and other outliers. According to breach disclosure laws, Panera Bread combed through the data and found contact information to notify every person affected. Therefore, Panera’s investigation is much more thorough and it’s legally obligated to tell the truth.”

Chris Hauk, Consumer Privacy Champion at Pixel Privacy:

“As always in breaches like this, Panera needs to be upfront with their customers and employees as to how bad the breach is and what the company is doing to protect their data and to guard against future attacks such as this. Employees and customers both should take advantage of any free credit and identity monitoring services that Panera will surely offer.

Unfortunately, this breach exposes the flaws in single sign-on (SSO) services such as those offered by Google, Microsoft, and others. Such services are susceptible to social engineered phishing schemes that trick employees and customers into entering their SSO credentials into fake company portal sites. Once that information is harvested, any site or service that uses those credentials could likely be accessed.”

While a lower number is good. It doesn’t change the fact that Panera got pwned. Whether this is one or one million people who got affected, pwnage is bad. The universe has to get to a place where pwnage isn’t a thing so that nobody has to worry about being affected.

Forcepoint X-Labs Researcher Reveals Sophisticated Dropbox PDF Phishing Campaign 

Posted in Commentary with tags on February 2, 2026 by itnerd

a new research blog post published today by Forcepoint’s X-Labs threat research team that uncovers a highly evasive phishing campaign abusing trusted cloud storage and PDF files to harvest user credentials.

In the blog post — “Fake Dropbox Phishing Campaign via PDF and Cloud Storage” — X-Labs Sr. Security Researcher Prashant Kumar details how attackers are now using multi-stage delivery techniques that evade traditional email, content and link scanning by:

  • Sending a seemingly benign PDF attachment via a business-themed email that bypasses standard filters.
  • Hosting a secondary PDF on a legitimate cloud infrastructure to exploit trust in “safe” services.
  • Redirecting users to a spoofed Dropbox login page designed to steal credentials and deliver them to attacker-controlled infrastructure.

This research highlights how trusted file types and cloud platforms are being weaponized to bypass security controls — a significant shift from traditional phishing vectors and an emerging concern for enterprises and users alike.

You can read the research here: Dropbox PDF Phishing Abuse of Trusted Cloud Storage

Cybernews researchers analyze leaked Bumble data and finds sensitive company documents and user-related identifiers

Posted in Commentary with tags on February 2, 2026 by itnerd

Cybernews researchers analyzed a data sample allegedly stolen from dating app Bumble after the ShinyHunters cybercrime group claimed responsibility for a breach involving internal company systems.

ShinyHunters added Bumble to its dark web leak site on January 29, claiming it exfiltrated approximately 30GB of data from the company’s Google Drive and Slack channels. According to the attackers, the data was obtained by compromising a contractor’s account through phishing. The gang claims to possess “thousands of internal documents” belonging to the company.

Bumble confirmed to Cybernews that a contractor’s account with limited privileges was compromised in a phishing incident. The company stated that the intrusion was detected and contained quickly.

“Our InfoSec team rapidly eliminated the access, and the incident is contained. We have engaged external cybersecurity experts and notified law enforcement. Importantly, there was no access to our member database, member accounts, the Bumble application, or member direct messages or profiles,” a Bumble spokesperson told Cybernews.

Bumble is a widely used dating platform with over 40 million active users and hundreds of millions of downloads globally. The app is operated by Bumble Inc., which also owns Badoo and Bumble For Friends (BFF).

Following the attackers’ claims, the Cybernews research team analyzed the data sample attached to the ShinyHunters dark web post. Researchers say the exposed files appear legitimate, but the dataset shared by the attackers is limited, making it unclear whether it represents the full scope of the allegedly stolen data or only a partial sample.

Based on the analysis, the majority of the exposed material consists of internal corporate information rather than user-facing data. The files include internal company documents such as contracts with partner companies, invoices, policy reviews, onboarding guides, internal reports, and CVs containing candidate employment history and personally identifiable information (PII).

While Bumble stated that no user accounts or messages were accessed, the Cybernews team noted that the sample contains some technical data, including user IDs, session IDs, and authentication cookies. In theory, such data could be abused by sophisticated attackers to attempt account takeover via session hijacking, although no evidence suggests this has occurred.

The dataset also includes information related to a limited number of Bumble in-app groups, known as Hives. While no group members were exposed, some group names, descriptions, welcome messages, rules, and change logs were present in the sample.

ShinyHunters is currently running a broader campaign targeting dating platforms and technology companies. Last week, Cybernews researchers analyzed a leaked Hinge data sample and found it contains user dating profile information, such as names and bios, as well as Hinge subscription data, including transaction IDs and amounts paid.

Cybernews continues to monitor the situation and analyze new information as it becomes available.

You can find a full technical breakdown of the Bumble data sample, the attackers’ claims, and expert analysis on potential risks in the complete investigation published on the Cybernews website here.  

Top Internet Outages of 2025 Studied By Cisco ThousandEyes

Posted in Commentary with tags on January 30, 2026 by itnerd

The folks at Cisco ThousandEyes have put out a study on the Top Internet Outages of 2025. It highlights the top outages and what happened as well as what to expect going forward. It’s an interesting piece and is worth your time to read.

You can find it here: https://www.thousandeyes.com/blog/the-top-internet-outages-of-2025-analyses-and-takeaways

TELUS CEO Darren Entwistle named Distinguished Entrepreneur of the Year

Posted in Commentary with tags on January 29, 2026 by itnerd

Darren Entwistle, president and chief executive officer (CEO) of TELUS, has been named the University of Victoria (UVic) Peter B. Gustavson School of Business 2026 Distinguished Entrepreneur of the Year Award (DEYA) recipient. 

This recognition highlights exceptional entrepreneurial leadership that has reshaped an entire industry, including:

  • Entwistle is the longest-serving CEO in the global telecommunications industry, leading TELUS since 2000
  • Under his 26-year tenure, he transformed TELUS from a regional Western Canadian telephone company into a global communications and IT leader
  • TELUS now holds a brand value of $12.1 billion — making it Canada’s most valuable telecommunications brand
  • Since 2000, TELUS and its team members have contributed $1.8 billion to communities, including more than 2.5 million days of volunteer service, which is more than any other company in the world. 

For more information, please see the University of Victoria’s media release here.

Quorum Cyber’s 2026 Global Cyber Risk Outlook Reveals Cyber Crime Enters an Industrial Phase

Posted in Commentary with tags on January 29, 2026 by itnerd

Quorum Cyber today reveals the extensive, but alarming findings of its 2026 Global Cyber Risk Outlook report. AI automation and Ransomware-as-a-Service (RaaS) platforms have fundamentally altered the threat landscape, enabling nation-state actors to automate up to 90% of intrusions, and pushing vulnerability disclosures past 35,000 for the first time. Attackers abandon slow-encryption tactics, as evidenced by ransom demands in financial services exploding by 179%. Organizations face a stark reality: detection windows are shrinking, barriers to hacker entry are collapsing, and even modestly skilled criminals now wield capabilities once reserved for elite operators.

Insights from the 2026 Global Cyber Risk Outlook are derived from incidents and investigations observed across over 350 global organizations ranging in staff size from 10 to 10,000 throughout calendar year 2025. Highlighted report findings that need to reshape 2026 cyber risk considerations include: 

  • The number of newly formed ransomware groups increased by 30% in the year to October 2025 
  • Global vulnerability disclosures rose 21%, surpassing 35,000 
  • Early evidence of a nation-state group using AI agents to automate up to 90% of an intrusion 
  • Cybercriminals are increasingly shifting away from encryption toward faster, lower-cost data exfiltration attacks 
  • New white-label RaaS platforms enabling rapid launch of branded criminal operations 
  • Average ransom demands surged across multiple sectors, including 179% in financial services and 97% in manufacturing 
  • Nation-state threat actors associated with Russia, China, and Iran remain the top threats to the public sector, while North Korea-linked actors likely earned over $2 billion from cybercrime in 2025 

Industry Sector Companion Reports

In addition, the 2026 Global Cyber Risk Outlook includes companion reports focused on nine industry sectors, including energy, financial services and insurance, healthcare and pharmaceuticals, higher education, housing and construction, legal and professional services, manufacturing, public sector, and retail. Each companion report outlines sector-specific threat dynamics and practical considerations for strengthening cyber resilience. 

Quorum Cyber Teams With Microsoft

To help organizations interpret these findings and prioritize action, Quorum Cyber will host a live webinar on February 25 featuring Lesley Kipling, Chief Security Advisor at Microsoft, alongside Quorum Cyber’s Threat Intelligence leadership. The session will examine how evolving threat actor tactics intersect with modern cloud, identity, and AI-driven environments — and what security leaders should focus on to strengthen resilience heading into 2026.

The 2026 Global Cyber Risk Outlook reflects Quorum Cyber’s Microsoft-first approach to security, informed by deep visibility into cloud, identity, and AI-driven environments. Founded as a Microsoft-first security services provider, Quorum Cyber is a long-standing member of the Microsoft Intelligent Security Association (MISA) and holds all four Microsoft Security specializations: Cloud Security, Identity and Access Management, Information Protection and Governance, and Threat Protection. 

Palo Alto Networks Completes Chronosphere Acquisition

Posted in Commentary with tags on January 29, 2026 by itnerd

As enterprises increasingly rely on AI to run digital operations, protect assets, and drive growth, success depends on one critical factor: trusted, high-quality, real-time data. Palo Alto Networks® (NASDAQ: PANW), the global cybersecurity leader, today announced it has completed its acquisition of Chronosphere addressing a core challenge of the AI era: the inability to see and secure the massive data volumes running modern businesses.

Chronosphere, a Leader in the 2025 Gartner® Magic Quadrant™ for Observability Platforms,1 was purpose-built to handle this scale. While legacy tools break down in cloud-native environments, Chronosphere gives customers deep visibility across their entire digital estate. With this acquisition, Palo Alto Networks is redefining how organizations run at the speed of AI — by enabling customers to gain deep, real-time visibility into their applications, infrastructure, and AI systems — while maintaining strict control over data cost and value.

The planned integration of Palo Alto Networks Cortex® AgentiX™ with Chronosphere’s cloud-native observability platform will allow customers to apply AI agents that can now find and fix security and IT issues automatically — before they impact the customer or the bottom line. AI security without deep observability is blind; this acquisition delivers the essential context across models, prompts, users, and performance to move from manual guessing to autonomous remediation.

The Chronosphere Telemetry Pipeline remains available as a standalone solution, enabling organizations to eliminate the ‘data tax’ associated with modern security operations. By acting as an intelligent control layer, the pipeline can filter low-value noise to reduce data volumes by 30% or more and has been shown to require 20x less infrastructure than legacy alternatives. This will be key to Palo Alto Networks Cortex XSIAM® strategy, ensuring customers can scale their security posture—not their spending—as they transition to autonomous, AI-driven operations.