logo
TCS & SAP join forces to boost cloud migration & AI uptake

TCS & SAP join forces to boost cloud migration & AI uptake

Techday NZ08-05-2025
Tata Consultancy Services has announced a collaboration with SAP to accelerate the migration of SAP customers to cloud environments and enhance the use of generative artificial intelligence across enterprises.
The two companies, both long-term players in enterprise IT and business applications, outlined plans to support SAP customers as they move from on-premises systems to the cloud under the 'RISE with SAP' initiative. The collaboration aims to facilitate wide-scale business transformation, focusing on improved service management and end-user experiences.
Building on more than twenty years of partnership, TCS and SAP will provide infrastructure and frameworks intended to make the cloud transition more straightforward for enterprises globally. This includes the establishment of a centralised ecosystem for customers utilising SAP platforms.
V Rajanna, President, Technology, Software and Services at TCS, said, "Over the past two decades, TCS and SAP have consistently delivered industry-leading solutions, empowering global enterprises on their digital transformation journeys. As we embark on the next phase, we remain committed to creating sustainable value and fostering growth for our customers. Together, we will continue to transform end-user experiences and drive innovation across the enterprise landscape."
TCS stated it will create an Innovation Council to support this effort, utilising its Agile Innovation Cloud framework to focus on areas such as the democratisation of artificial intelligence, advancements in generative AI, and the expansion of automation ecosystems. The council is designed to encourage innovation at scale for SAP customers.
The collaboration also includes the use of the TCS Pace Port network, which spans twelve cities worldwide, to support joint ideation, development, and deployment of solutions. According to TCS, the Aim of the TCS Pace network is to foster systematic and scalable innovation for enterprise clients working with SAP technologies.
Thomas Saueressig, Member of the Executive Board of SAP for Customer Services & Delivery, said, "Our collaboration with TCS continues to drive meaningful impact for customers by bringing together leading cloud solutions and proven delivery expertise. Together, we are helping organizations simplify their transformation journeys, accelerate cloud adoption, and harness the power of AI and data."
Vikram Karakoti, Global Head, Enterprise Solutions at TCS, said, "TCS looks forward to building on its twenty-year partnership with SAP to launch an accelerated path to RISE with SAP adoption and E2E automation with GenAI. TCS enjoys a 360° relationship with SAP, and, together, we provide our clients with seamless and flexible digital cloud adoption, reinforcing operational resilience and efficiency. The new endeavor combines our agile, scalable methodologies with cutting-edge GenAI innovations to help global enterprises adapt, grow, and unlock new opportunities through technology."
TCS has been SAP's partner for cloud migration and digital transformation projects since early in their relationship. The alliance has enabled global clients to use SAP enterprise cloud, business AI and analytics offerings for evolving operational and data-driven business needs.
TCS reported consolidated revenues of more than USD $30 billion in the fiscal year ended March 2025. The company operates with a workforce of nearly 608,000 consultants and a network of 180 service delivery centres across 55 countries.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Infoblox upgrades DNS defence to counter AI-driven cyberattacks
Infoblox upgrades DNS defence to counter AI-driven cyberattacks

Techday NZ

time15 hours ago

  • Techday NZ

Infoblox upgrades DNS defence to counter AI-driven cyberattacks

Infoblox has introduced enhancements to its Protective DNS solution aimed at countering increasingly sophisticated, AI-driven cyberthreats for organisations across a range of sectors. With a global rise in cyberattacks and new tactics from adversaries leveraging artificial intelligence (AI) to target vulnerabilities, Infoblox's improvements focus on providing protection before threats can cause disruption or damage to users, devices, Internet of Things (IoT)/Operational Technology (OT), and cloud environments. Pre-emptive defence The recent upgrades to Infoblox Threat Defence utilise predictive threat intelligence combined with algorithmic and machine learning-based detection capabilities. This preventative approach is designed to stop high-risk and malicious domains on average 68 days earlier than traditional security tools, while maintaining a reported false positive rate of 0.0002 per cent. "The difference between most DNS security tools and our approach is like the difference between law enforcement chasing street-level drug dealers versus taking down the cartel," said Mukesh Gupta, Chief Product Officer at Infoblox. "We target the suppliers behind the cyberattackers - the cartel - so threats can be blocked before they ever reach the network. This preemptive strategy helps security teams reduce risk, eliminate noise and stop threats at the DNS layer before they ever reach the network." The advancements are designed to provide tighter security through features such as more comprehensive visibility, actionable insights, flexible token-based licensing models, and improved reporting on threats stopped prior to causing impact. Infoblox reports that these tools provide clear, quantifiable metrics that may assist security teams in demonstrating return on investment by highlighting threats intercepted before reaching critical systems. Cloud integration and proactive threat blocking In addition to protecting traditional networks, Infoblox's Protective DNS technology is set to power Google Cloud's DNS Armour, a move that will bring native security to cloud workloads. The public preview of Google Cloud's DNS Armour, supported by Infoblox, is expected later this year. By blocking attacks earlier in the cyber kill chain, the company suggests it can reduce reliance on downstream detection and response systems, such as XDR (Extended Detection and Response) and SIEM (Security Information and Event Management). This shift aligns with recommendations from analysts such as Gartner and guidelines like the NIST SP 800-81, which highlight the value of DNS-layer defences in preventing incidents at an earlier stage. Industry response and regional focus Scott Harrell, President and CEO of Infoblox, commented on shifts in the cyber threat landscape, stating, "Traditional 'detect and respond' security simply can't keep pace with today's AI-driven attackers and malware. Cybercrime is evolving faster than ever, costing the world trillions and exploiting gaps in legacy defences. The legacy kill chain approach depends on someone else being 'patient zero' so those legacy systems can learn and react - but attackers today customise malware to target individual businesses or industries, rendering legacy, reactive approaches ineffective against modern AI-enabled attackers. When you're patient zero, the only thing being 'killed' is your business. The future of cybersecurity must be preemptive: stop threats before they ever reach your organisation." Paul Wilcox, Vice President of Regional Sales, APJ, drew attention to regional trends, saying, "Across APAC, cyberattacks are growing more aggressive and calculated. From exploiting third-party access points to targeting critical systems - attackers are finding the cracks in our digital foundations and are using AI to strike faster and smarter than ever." He continued, "For businesses in Singapore, where digital services are tightly woven into daily life, any downtime or confidentiality breach can be deeply disruptive. That's why organisations here need to invest in earlier threat detection that starts at the DNS layer. Stopping an attack before it begins is far less costly than dealing with the aftermath." Reporting and security operations enhancements The updated Infoblox solution introduces a centralised Security Workspace for deeper visibility, and a Detection Mode that highlights missed threats without necessitating changes to existing DNS configurations, aiming to minimise operational risk for organisations. The Asset Data Integration feature offers additional context for analysts conducting further investigations. Flexible token-based licensing aligns pricing with usage, simplifying procurement and potentially offering clearer value for cost-conscious enterprises. The enhancements come as analysts predict global cybercrime costs could reach USD $23 trillion by 2027. The company's approach is designed to stop attacks before impact, rather than waiting for an initial breach to trigger a response, aiming to help organisations remain resilient against the evolving tactics of cyber adversaries.

CrowdStrike report warns of GenAI driving surge in cyberattacks
CrowdStrike report warns of GenAI driving surge in cyberattacks

Techday NZ

time17 hours ago

  • Techday NZ

CrowdStrike report warns of GenAI driving surge in cyberattacks

CrowdStrike has released its 2025 Threat Hunting Report detailing how adversaries are using generative AI (GenAI) to enhance and scale cyberattacks, with a particular focus on emerging threats to autonomous AI systems within enterprises. The report draws on intelligence from CrowdStrike's team of threat hunters and analysts, surveying attacks by over 265 known adversary groups. The findings highlight how attack vectors are evolving with increased automation and use of AI, as well as the targeting of AI-driven systems themselves. AI-powered attacks According to the report, GenAI-built malware is now operational, with lower-tier cybercriminals and hacktivist groups utilising AI to generate scripts, troubleshoot technical issues, and develop new forms of malware. Early examples cited include attacks named Funklocker and SparkCat, which underscore how the barrier to entry for sophisticated cybercrime has been lowered. China-linked adversaries have driven a significant increase in attacks on cloud infrastructure, accounting for 40% of a 136% rise in such incidents during the first half of 2025. The report notes that actors like GENESIS PANDA and MURKY PANDA exploited cloud misconfigurations and access privileges to carry out attacks, while GLACIAL PANDA focused on embedding itself in telecommunications networks, leading to a 130% year-over-year surge in nation-state activity in that sector. Accelerating social engineering Beyond technical exploits, the report outlines how AI is being leveraged to automate social engineering campaigns. FAMOUS CHOLLIMA, a North Korea-linked group, used GenAI to generate fraudulent résumés, create deepfake videos for interviews, and complete technical assignments under assumed identities. This group reportedly infiltrated more than 320 companies worldwide, constituting a 220% year-over-year increase. The report also references Russia-linked EMBER BEAR's amplification of pro-Russia narratives and Iran-linked CHARMING KITTEN's deployment of phishing emails crafted with large language models targeting US and EU organisations. AI agents: A new target The rise of agentic AI - autonomous AI agents handling key business workflows - has created new opportunities for attackers. Several threat actors have reportedly exploited vulnerabilities in the tools used to build and manage these agents. Access was gained through unauthenticated channels, followed by credential harvesting, malware deployment, and ransomware installation. According to CrowdStrike, this marks the emergence of AI systems, and the identities they use, as a key part of the enterprise attack surface. "The AI era has redefined how businesses operate, and how adversaries attack. We're seeing threat actors use GenAI to scale social engineering, accelerate operations, and lower the barrier to entry for hands-on-keyboard intrusions. At the same time, adversaries are targeting the very AI systems organizations are deploying. Every AI agent is a superhuman identity: autonomous, fast, and deeply integrated, making them high-value targets. Adversaries are treating these agents like infrastructure, attacking them the same way they target SaaS platforms, cloud consoles, and privileged accounts. Securing the AI that powers business is where the cyber battleground is evolving," said Adam Meyers, Head of Counter Adversary Operations at CrowdStrike. Trend observations The report also highlights the resurgence of the SCATTERED SPIDER group, which has accelerated its use of identity-based attacks across multiple domains. The group's tactics in 2025 included using phone-based social engineering (vishing) and impersonation of help desk personnel to reset credentials, bypass multi-factor authentication measures, and deploy ransomware in less than 24 hours after gaining initial access. CrowdStrike's data shows a clear trend of increased adversary sophistication with the use of AI-enabled tools, not only for direct attacks but also for the exploitation of cloud, SaaS, and AI agent infrastructure. This shift is rapidly transforming both the methods and preferred targets of cybercriminal and nation-state actors. The report suggests that as enterprises further integrate AI agents into their operations, additional security measures are required to safeguard these autonomous, non-human identities and workflows from being compromised or manipulated.

Sensitive data exposure rises with employee use of GenAI tools
Sensitive data exposure rises with employee use of GenAI tools

Techday NZ

time4 days ago

  • Techday NZ

Sensitive data exposure rises with employee use of GenAI tools

Harmonic Security has released its quarterly analysis finding that a significant proportion of data shared with Generative AI (GenAI) tools and AI-enabled SaaS applications by employees contains sensitive information. The analysis was conducted on a dataset comprising 1 million prompts and 20,000 files submitted to 300 GenAI tools and AI-enabled SaaS applications between April and June. According to the findings, 22% of files (total 4,400) and 4.37% of prompts (total 43,700) included sensitive data. The categories of sensitive data encompassed source code, access credentials, proprietary algorithms, merger and acquisition (M&A) documents, customer or employee records, and internal financial information. Use of new GenAI tools The data highlights that in the second quarter alone, organisations on average saw employees begin using 23 previously unreported GenAI tools. This expanding variety of tools increases the administrative load on security teams, who are required to vet each tool to ensure it meets security standards. A notable proportion of AI tool use occurs through personal accounts, which may be unsanctioned or lack sufficient safeguards. Almost half (47.42%) of sensitive uploads to Perplexity were made via standard, non-enterprise accounts. The numbers were lower for other platforms, with 26.3% of sensitive data entering ChatGPT through personal accounts, and just 15% for Google Gemini. Data exposure by platform Analysis of sensitive prompts identified ChatGPT as the most common origin point in Q2, accounting for 72.6%, followed by Microsoft Copilot with 13.7%, Google Gemini at 5.0%, Claude at 2.5%, Poe at 2.1%, and Perplexity at 1.8%. Code leakage represented the most prevalent form of sensitive data exposure, particularly within ChatGPT, Claude, DeepSeek, and Baidu Chat. File uploads and risks The report found that, on average, organisations uploaded 1.32GB of files in the second quarter, with PDFs making up approximately half of all uploads. Of these files, 21.86% contained sensitive data. The concentration of sensitive information was higher in files compared to prompts. For example, files accounted for 79.7% of all stored credit card exposure incidents, 75.3% of customer profile leaks, and 68.8% of employee personally identifiable information (PII) incidents. Files accounted for 52.6% of exposure volume related to financial projections. Less visible sources of risk GenAI risk does not only arise from well-known chatbots. Increasingly, regular SaaS tools that integrate large language models (LLMs) - often without clear labelling as GenAI - are becoming sources of risk as they access and process sensitive information. Canva was reportedly used for documents containing legal strategy, M&A planning, and client data. Replit and were involved with proprietary code and access keys, while Grammarly and Quillbot edited contracts, client emails, and internal legal content. International exposure Use of Chinese GenAI applications was cited as a concern. The study found that 7.95% of employees in the average enterprise engaged with a Chinese GenAI tool, leading to 535 distinct sensitive exposure incidents. Within these, 32.8% were related to source code, access credentials, or proprietary algorithms, 18.2% involved M&A documents and investment models, 17.8% exposed customer or employee PII, and 14.4% contained internal financial data. Preventative measures "The good news for Harmonic Security customers is that this sensitive customer data, personally identifiable information (PII), and proprietary file contents never actually left any customer tenant, it was prevented from doing so. But had organizations not had browser based protection in place, sensitive information could have ended up training a model, or worse, in the hands of a foreign state. AI is now embedded in the very tools employees rely on every day and in many cases, employees have little knowledge they are exposing business data." Harmonic Security Chief Executive Officer and Co-founder Alastair Paterson made this statement, referencing the protections offered to their customers and the wider risks posed by the pervasive nature of embedded AI within workplace tools. Harmonic Security advises enterprises to seek visibility into all tool usage – including tools available on free tiers and those with embedded AI – to monitor the types of data being entered into GenAI systems and to enforce context-aware controls at the data level. The recent analysis utilised the Harmonic Security Browser Extension, which records usage across SaaS and GenAI platforms and sanitises the information for aggregate study. Only anonymised and aggregated data from customer environments was used in the analysis.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store