Taryn Plumb
tarynplumb.bsky.social
Taryn Plumb
@tarynplumb.bsky.social
Author, tech writer
Pinned
2025 was supposed to be the year of the #AI agent, right? Not quite, say leaders from Replit and Google Cloud #GenerativeAI #ArtificialIntelligence

venturebeat.com/orchestratio...
Even Google and Replit struggle to deploy AI agents reliably — here's why
Even as they build out agentic tools themselves, leaders from the two companies say the capabilities aren’t quite there yet.
venturebeat.com
December 22, 2025 at 5:08 PM
Check out my feature in WPI Journal on Shana Figueroa of Figtastic Films. Check out her work:
figtasticfilms.com

wp.wpi.edu/journal/arti...
FigTastic Films – By Shana Figueroa
figtasticfilms.com
December 19, 2025 at 9:57 PM
Attackers are exploiting a Flight protocol validation failure that allows them to execute arbitrary code without authentication. #CybersecurityNews #AI #DataScience

www.csoonline.com/article/4109...
React2Shell is the Log4j moment for front end development
Attackers are exploiting a Flight protocol validation failure that allows them to execute arbitrary code without authentication.
www.csoonline.com
December 19, 2025 at 6:07 PM
December 17, 2025 at 10:49 PM
Nvidia is positioning its new offerings as a business-ready way for enterprises to build domain-specific agents without first needing to create foundation models. #AI #ArtificialIntelligence #GenerativeAI

www.computerworld.com/article/4106...
Nvidia bets on open infrastructure for the agentic AI era with Nemotron 3
The company is positioning its new offerings as a business-ready way for enterprises to build domain-specific agents without first needing to create foundation models.
www.computerworld.com
December 16, 2025 at 5:19 PM
The company’s new approach is that anything touching Microsoft services is eligible for a bug bounty, regardless of its source. #Cybersecurity #Security #CybersecurityNews

www.csoonline.com/article/4105...
Microsoft flips security script: ‘In scope by default’ makes all vulnerabilities fair game for bug bounties
The company’s new approach is that anything touching Microsoft services is eligible for a bug bounty, regardless of its source.
www.csoonline.com
December 13, 2025 at 5:38 PM
Wiz has found threat actors exploiting GitHub tokens, giving them access to GitHub Action Secrets and, ultimately, cloud environments.

www.csoonline.com/article/4103...
GitHub Action Secrets aren’t secret anymore: exposed PATs now a direct path into cloud environments
Wiz has found threat actors exploiting GitHub tokens, giving them access to GitHub Action Secrets and, ultimately, cloud environments.
www.csoonline.com
December 10, 2025 at 4:07 PM
The integration of Informatica into Salesforce Data 360 aims to give #AI agents the shared metadata, lineage, and real-time understanding they’ve been missing. #ArtificialIntelligence #GenerativeAI #data

www.cio.com/article/4102...
Salesforce’s Agentforce 360 gets an enterprise data backbone with Informatica’s metadata and lineage engine
Salesforce’s integration of Informatica into Data 360 aims to give AI agents the shared metadata, lineage, and real-time understanding they’ve been missing.
www.cio.com
December 9, 2025 at 4:53 PM
Booking "stumbled" into agentic #AI thinking early on. Here's what the company has learned through a hybrid, multi-model approach to development (that isn't fueled by hype). #ArtificialIntelligence #GenerativeAI

venturebeat.com/ai/booking-c...
December 8, 2025 at 5:42 PM
25 frontier proprietary and open-weight models yielded high attack success rates when prompted in verse, indicating a deeper, underlying problem in their ability to process ambiguity veiled in poetry. #AI #ArtificialInteligence #GenerativeAI

www.computerworld.com/article/4099...
Get poetic in prompts and AI will break its guardrails
25 frontier proprietary and open-weight models yielded high attack success rates when prompted in verse, indicating a deeper, underlying problems in their ability to process ambiguity veiled in poetry...
www.computerworld.com
December 3, 2025 at 4:32 PM
Security leaders call the rollback ‘shockingly incompetent,’ warning it removes critical controls implemented after one of the largest breaches in telecom history.

www.csoonline.com/article/4094...
FCC reversal removes federal cyber safeguards targeting telecom weaknesses post-Salt Typhoon attacks
Security leaders call the rollback ‘shockingly incompetent,’ warning it removes critical controls implemented after one of the largest breaches in telecom history.
www.csoonline.com
November 24, 2025 at 4:17 PM
Learn the trade-offs in flexibility, cost, and specialization between TPUs, GPUs, and CPUs for your organization's #AI and machine learning projects. #ArtificialIntelligence #GenerativeAI

www.networkworld.com/article/4093...
What are TPUs? Your guide to tensor processing units and AI acceleration
This guide shows how TPUs crush performance bottlenecks, reduce training time, and offer immense scalability via Google Cloud.
www.networkworld.com
November 21, 2025 at 5:29 PM
Retail infrastructure built for a human pace will buckle unless IT leaders overhaul data hygiene, routing logic, and guardrails to cope with agentic traffic. #AI #GenerativeAI #AIAgents #ArtificialIntelligence

www.computerworld.com/article/4090...
Google is unleashing AI shoppers on enterprises — is your infrastructure ready?
Retail infrastructure built for a human pace will buckle unless IT leaders overhaul data hygiene, routing logic, and guardrails to cope with agentic traffic.
www.computerworld.com
November 17, 2025 at 6:01 PM
Weeks after being declared eradicated, GlassWorm is again infesting open source extensions using the same invisible Unicode and blockchain C2 tricks. #CyberSecurity #malwarecampaign #Security

www.csoonline.com/article/4087...
How GlassWorm wormed its way back into developers’ code — and what it says about open source security
Weeks after being declared eradicated, GlassWorm is again infesting open source extensions using the same invisible Unicode and blockchain C2 tricks.
www.csoonline.com
November 11, 2025 at 4:11 PM
The real challenges in AI? (and the ones top of mind for many tech leaders)? Latency, flexibility and capacity.
#AI #ArtificialIntelligence #GenerativeAI #CloudComputing #HybridComputing

venturebeat.com/data-infrast...
venturebeat.com
November 10, 2025 at 6:50 PM
www.csoonline.com/article/4085...

Google’s Threat Intelligence Group reports that new malware strains use LLMs mid-execution to generate, rewrite, and obfuscate malicious code in real time. #CyberSecurity #AI #artificial_intelligence #GenerativeAI
Google researchers detect first operational use of LLMs in active malware campaigns
Google’s Threat Intelligence Group reports that new malware strains use LLMs mid-execution to generate, rewrite, and obfuscate malicious code in real time.
www.csoonline.com
November 6, 2025 at 5:02 PM
Stop guessing and start optimizing. DCIM provides real-time visibility into power, cooling, space, and asset health to reduce costs, increase reliability, and future-proof your capacity planning. #DataScience #DataManagement #data

www.networkworld.com/article/4075...
DCIM explained: How data center information management powers AI, capacity planning, and sustainability
Stop guessing and start optimizing. DCIM provides real-time visibility into power, cooling, space, and asset health to reduce costs, increase reliability, and future-proof your capacity planning.
www.networkworld.com
November 5, 2025 at 4:43 PM
Anthropic’s Claude can now describe its own reasoning about 20% of the time, drastically cutting interpretability time, but it demands continuous oversight.

www.computerworld.com/article/4083...
Anthropic experiments with AI introspection
Anthropic’s Claude can now describe its own reasoning about 20% of the time, drastically cutting interpretability time, but it demands continuous oversight.
www.computerworld.com
November 4, 2025 at 2:55 PM
That is: Individuals and enterprises must be able to immediately turn creativity into action with #AI. #artificial_intelligence #GenerativeAI

venturebeat.com/ai/why-it-le...
venturebeat.com
November 3, 2025 at 3:24 PM
www.csoonline.com/article/4081...

At-Bay’s 2025 InsurSec Report shows 90% of cyber insurance claims stem from email and VPNs, and larger companies remain prime targets. #CyberSecurity #CyberSecurityAwareness #CybersecurityNews
Old threats, new consequences: 90% of cyber claims stem from email and remote access
At-Bay’s 2025 InsurSec Report shows 90% of cyber insurance claims stem from email and VPNs, and larger companies remain prime targets.
www.csoonline.com
October 30, 2025 at 2:29 PM
Researchers have discovered an inexpensive, full-featured malware-as-a-service kit combining vulnerability scanning, covert access, and DNS hijacking.

www.csoonline.com/article/4080...
Atroposia malware kit lowers the bar for cybercrime — and raises the stakes for enterprise defenders
Researchers have discovered an inexpensive, full-featured malware-as-a-service kit combining vulnerability scanning, covert access, and DNS hijacking.
www.csoonline.com
October 29, 2025 at 2:48 PM
Qualcomm’s AI200 and AI250 move beyond GPU-style training hardware to optimize for inference workloads, offering 10X higher memory bandwidth and reduced energy use. #AI #ArtificialIIntelligence #GenerativeAI #Hardware

www.networkworld.com/article/4079...
Qualcomm goes all-in on inferencing with purpose-built cards and racks
Qualcomm’s AI200 and AI250 move beyond GPU-style training hardware to optimize for inference workloads, offering 10X higher memory bandwidth and reduced energy use.
www.networkworld.com
October 28, 2025 at 2:34 PM
By running production workloads simultaneously on x86 and Arm, Google is signaling a new era of hardware neutrality and accelerating Arm’s growing role in hyperscale cloud environments.

www.networkworld.com/article/4077...
Inside Google’s multi-architecture revolution: Axion Arm joins x86 in production clusters
By running production workloads simultaneously on x86 and Arm, Google is signaling a new era of hardware neutrality and accelerating Arm’s growing role in hyperscale cloud environments.
www.networkworld.com
October 23, 2025 at 4:28 PM
The transition from CSP to KSP has triggered failures in smart card authentication, IIS connectivity, and recovery mode devices. #CyberSecurity #CybersecurityAwarenessMonth #Windows11 #Microsoft

www.computerworld.com/article/4075...
Security patch or self-inflicted DDoS? Microsoft update knocks out key enterprise functions
The transition from CSP to KSP has triggered failures in smart card authentication, IIS connectivity, and recovery mode devices.
www.computerworld.com
October 21, 2025 at 3:10 PM