Alex Calderon

10 ways generative AI and Azure OpenAI Service are transforming businesses

With businesses seeking innovative ways to get an edge in today’s competitive marketplace, many are turning to the creative and streamlining possibilities of generative AI. What would an AI solution do for your operations? If you’d like some ideas, check out this @Microsoft Azure blog exploring 10 ways generative AI is being used to drive growth.

10 ways generative AI and Azure OpenAI Service are transforming businesses Read More »

The on-demand tech paradox: Balancing speed and spend

Cloud consumption models are unlocking speed and agility for businesses. But they also introduce a paradox: costs become harder to predict and control.
Capgemini’s article “The On-Demand Tech Paradox: Balancing Speed and Spend” examines this tension. It shows how organizations are using on-demand technology to accelerate transformation while confronting the governance and financial complexity that comes with it.
The piece offers a timely perspective on how to harness cloud flexibility without losing sight of cost discipline.
👉

The on-demand tech paradox: Balancing speed and spend Read More »

Cybersecurity: An Untapped Competitive Advantage Hiding In Plain Sight

Forbes Tech Council’s “Cybersecurity: An Untapped Competitive Advantage Hiding In Plain Sight” argues that security can do more than prevent attacks — it can fuel growth. Companies that treat cybersecurity as a strategic asset are better positioned to earn trust, innovate confidently, and stand out in their markets.
This article reframes resilience as not just a shield, but a competitive edge.
👉 Read more here:

Cybersecurity: An Untapped Competitive Advantage Hiding In Plain Sight Read More »

Identity-Centric Threats: The New Reality

The way cybercriminals operate has fundamentally changed. The eSentire’s 2025 Identity Threat Research Report, “Identity-Centric Threats: The New Reality” reveals how identity-based attacks have surged 156% since 2023, now representing nearly 60% of all confirmed threat cases.

Powered by Cybercrime-as-a-Service models, these attacks leverage Phishing-as-a-Service platforms like Tycoon2FA to bypass multi-factor authentication and gain rapid access to business email accounts and sensitive data.

Download your complimentary copy of the report for expert insight on:

-Rapid evolution of phishing and infostealer malware that turn stolen credentials into profitable identity marketplaces
-Exploitation of unmonitored endpoints and shadow IT for ransomware deployment
-Strategic recommendations for building a Zero Trust identity architecture and implementing phish-resistant authentication

DM me to discover how Nothing But NET can help you reduce your exposure to ident

Identity-Centric Threats: The New Reality Read More »

Build and Modernize Intelligent Apps

Organizations interested in making a complete digital transformation know that they need to either modernize their current apps or develop intelligent apps that take advantage of cloud capabilities. How have the modernization plans for your enterprise progressed? If you’d like some help, download this @Microsoft Azure eBook outlining the roadmap that will move your transformation forward.

Build and Modernize Intelligent Apps Read More »