hello@commercis.com
+44 (0)20 3318 1500

Impactful Innovation

AI double edged sword, the dark side or powerful ally
Impactful Innovation Jan 8, 2026

AI double edged sword, the dark side or powerful ally

Contributors: Nasser Bostan, Founder & CEO, Simulacra. X, Saket Modi, CEO of Safe Security and Vipul Narula CEO, Commercis Technology & Intelligence Artificial intelligence is transforming cybersecurity empowering defenders while arming attackers. In this episode, David McClelland explores how AI is reshaping the digital battlefield with Nasser Bostan, Founder and CEO of Simulacra.X, Saket Modi, CEO of Safe Security, and Vipul Narula CEO of Commercis Technology & Intelligence. Together, they reveal how AI-driven systems are redefining resilience, automating threat detection, and managing risk even as AI-enabled attacks grow more advanced. The conversation examines the ethics, risks, and opportunities of AI...

Read

January 5, 2026
Robotic intelligence in the lab, how AI and automation are redefining discovery
The new science engine In laboratories around the world, a transformation is quietly accelerating. Once powered by manual precision and...
January 4, 2026
AI-powered cyberattacks & social engineering 2.0
Understanding the evolving face of cyber threats in the age of intelligent deception Artificial intelligence has moved from a defensive...
December 31, 2025
From vendors to ecosystems, why partnerships now outperform products.
The most successful enterprises today are no longer defined by the technology they buy, but by the ecosystems they belong...
January 11, 2026
Living-off-the-Land (LOTL) techniques in major cyber incidents
Source: Analysis inspired by Bitdefender’s 2025 research In 2025, cybersecurity researchers conducted an extensive review of over 700,000 security incidents...
January 10, 2026
Building intelligent resilience through AIOps integration
Client context A global energy infrastructure provider operating across 30 countries faced escalating operational complexity. Its environment combined legacy on-prem...
January 7, 2026
Turning fibre into intelligence, a new business model for Telecom Operators
Overview Telecom networks are among the most capital-intensive infrastructures in the world, vast webs of optical fibre designed to move...
January 8, 2026
Unearthing efficiency, a strategic analysis of AI and automation in the oil & gas industry.
Executive Summary The oil and gas sector, historically characterized by capital-intensive operations and high risks, is undergoing a transformative shift...
January 8, 2026
The Rise of Ransomware-as-a-Service (RaaS), professionalizing cybercrime in 2025
Abstract Ransomware-as-a-Service (RaaS) has evolved into one of the most significant cybersecurity challenges of the 2020s, transforming ransomware from isolated...
January 6, 2026
Unlocking additional applications for existing optical fibre infrastructure
Executive summary Optical fibre networks have long been the backbone of global digital communication transmitting massive volumes of data at...
January 4, 2026
Defending against HID-Based USB intrusions, the next frontier in endpoint security.
In 2024, cyber defenders began shifting from reactive incident response toward proactive detection of hardware-level threats — particularly attacks using...
January 8, 2026
What post-quantum cryptography means for businesses and how to prepare
Quantum computing is no longer a far-off concept confined to research labs. As rapid advancements continue, this emerging technology promises...
January 4, 2026
Connectivity as an enabler of social inclusion and national progress
Across Africa, conversations around innovation often centre on the latest breakthroughs in artificial intelligence, robotics, or advanced computing. Yet one...
January 2, 2026
The strategic acceleration of AI in energy & critical infrastructure.
Why AI is no longer an optimisation tool but an operational survival imperative The energy sector, particularly oil and gas,...
January 9, 2026
AI-Driven DevOps (AIOps), transforming IT operations in 2025
Executive summary In 2025, IT operations are no longer measured by uptime alone but by their ability to adapt in...
January 5, 2026
Cybersecurity for smart homes and IoT devices, best practices to secure your connected lifestyle
Executive Summary The modern home has evolved into a connected ecosystem. From smart TVs and voice assistants to security cameras,...
December 31, 2025
The cybersecurity skills Gap in 2025. Addressing talent shortages, upskilling, and the role of automation
Executive Summary As we move deeper into 2025, the cybersecurity skills gap remains one of the most pressing challenges in...

Latest Podcast

AI double edged sword, the dark side or powerful ally
January 12, 2026
AI double edged sword, the dark side or powerful ally
In this episode, David McClelland explores how AI is reshaping the digital battlefield with Nasser Bostan, Founder and CEO of...
The dynamic of safeguarding our digital world
December 4, 2025
The dynamic of safeguarding our digital world
In this episode David McClelland speaks with Manit Sahib Founder & CEO of Cytadel, Dave Davis Director at The Institute...
The next frontier, can the development of chip lead the change?
November 13, 2025
The next frontier, can the development of chip lead the change?
In this episode Mihai Raneti CEO of CyberSwarm, Duncan Clubb Senior Partner-Datacenters, Edge& Cloud at Cambridge Management Consulting, Vipul Narula...
ESG/AI, can a datacentre really be green?
October 23, 2025
ESG/AI, can a datacentre really be green?
In this episode Sultan Ennab Senior Vise President, Software, EPE Consulting, Dr Simon Thomas CEO of Paragraf, and Paul Ziegler...

Bites and Tips

January 5, 2026
Project Kuiper signs MoU with Uzbekistan
The constellation will support global broadband connectivity, particularly in underserved regions. Recently, Kuiper signed an MoU with Uzbekistan to expand...
External Source
January 3, 2026
Backups don’t matter if you’ve never rehearsed recovery.
Most companies think they have backups. Very few can recover. If your team hasn’t simulated a full live recovery scenario...
January 9, 2026
Cloud complexity is the new shadow IT.
Unmanaged cloud accounts, forgotten access keys, and complex permissions introduce blind spots that hackers exploit. Action! Treat cloud governance as seriously...
January 8, 2026
Edge Computing moves from cloud extension to autonomous intelligence
Recent reports show the global edge computing market is expected to surpass $260 billion in 2025, driven by real-time analytics,...
External Source
Acquisition strengthens communications infrastructure
Network Innovations has completed its acquisition of Infosat Communications (U.S. and Canada arms), consolidating capabilities in satellite operations, terrestrial networks, and connectivity services. This signals consolidation in the comms/infrastructure sector.
AI is now an attack surface, not just a tool.
Your enterprise AI and LLM pilots are not “internal toys.” They are live inbound data ingestion points. Treat AI prompts like exposed input fields, because attackers already are. Anything that...