Operations | Monitoring | ITSM | DevOps | Cloud

How Legal IT Can Escape the Graveyard of Recurring Tickets

It’s 3:30 p.m. A partner’s laptop refuses to authenticate to the VDI. The urgent filing is in two hours. The ticket title reads like a headstone you’ve seen a hundred times: “Can’t connect, tried rebooting, please help.” Another “undead” incident claws its way out of the queue. By home time, the backlog becomes a graveyard of recurring tickets, and your team, although brilliant and capable, is exhausted and applying the same fixes again and again.

Downtime on the Docket: The Death Sentence for Productivity in Legal Firms

When minutes matter, IT leaders need more than quick fixes; they need foresight. That’s where Teneo’s Managed DEX (Digital Experience Monitoring) comes in. Managed DEX is designed to detect what legal teams can’t afford to miss. It monitors for “ghost traffic”- those eerie, unexplained signals of abnormal network activity that often signal compromise or instability- and other anomalous device behaviors that can precede full-blown outages or cyber incidents.

The Blind Spots That Haunt Legal IT

In a recent survey, Udacity’s team explored the evolving landscape of AI adoption by asking 2000 professionals (including those in the legal sector) if they used AI. Unsurprisingly, over 90% of respondents said they did. More concerning, 72% of managers reported personally paying out of pocket for AI tools to use at work, introducing uncontrolled risk into corporate environments.

The Next Evolution of AI: Forget Smarter Models - It's All About the Data

It’s been a noisy summer in the AI world. Headlines have been filled with doom and gloom: For example, OpenAI’s ChatGPT-5 landing with a thud, and an MIT report claiming 95% of AI pilots are failing. For the sceptics, this is “proof” that AI is just hype. I don’t buy it. The MIT study looked at just 50 projects, a sample size so small you’d fail a basic stats exam for using it. And as someone who uses AI every single day, I can tell you the benefits are real.

GPT-OOS: A Secure Step Forward, But Not a Free Pass

The release of OpenAI’s new open-source model, GPT-OOS, has sparked a wave of excitement across the AI community. And rightly so. For organizations that want the benefits of generative AI without sending data out to the web, this is a compelling option. Running locally, GPT-OOS offers a level of privacy, control, and cost-efficiency that’s hard to ignore. It’s fast, lean and at least in its early benchmarks, surprisingly capable in coding, math, and STEM-heavy workloads.

Weaponized AI vs. AI Driven Security Posture Management: Why the Battle Starts in Misconfigurations

August 5, 2025, Las Vegas Black Hat 2025, Abnormal AI officially launched its Security Posture Management for Microsoft 365. This release marks a critical turning point. In an era where attackers weaponized AI to uncover and exploit misconfigured cloud environments at machine speed, reactive security simply can’t keep pace. Threat actors are now leveraging automated AI to scan systems, identify configuration drift, escalate privileges, and deploy zero‑day exploits in seconds.

Securing the Invisible: Why Ambient AI Needs Next-Gen Security

If, like me, you’re continuously striving to keep pace with the ever-evolving world of artificial intelligence, you’re probably hearing a lot about how Ambient AI is poised to dominate discussions and developments throughout the second half of 2025. Ambient AI refers to artificial intelligence systems that operate unobtrusively in the background of our daily environments, constantly sensing, analyzing, and responding to various inputs without explicit human interaction.

SD-WAN, SASE, SSE, and the Coffee Shop Network: From Distraction to AI Superpower

Back in 2018, I wondered (perhaps loudly if SD-WAN was just IT’s hype-of-the-year, destined for the same eye-rolls as signature-based antivirus and GDPR compliance drives. Even then, I knew we couldn’t let messaging fatigue blind us to real technology shifts. Fast-forward to 2025: SD-WAN (Software-Defined Wide Area Network) not only stuck around, but became the springboard to something far bigger – SASE (Secure Access Service Edge).

Seeing the Bigger Picture: Why Security Needs Depth, Not Just Products

A recent BBC article, “Weak password allowed hackers to sink a 158-year-old company,” outlined a serious security lapse. This case reinforces the message that we, at Teneo, advocate every day: true resilience comes from defense in depth, i.e. policy, product and process, not just tools at the edge. In a recent customer engagement, we discussed a transition from VPN to ZTNA. While ZTNA offers enhanced security including continual checking, improved segmentation and a minimized attack surface.