Next week, thousands of IT leaders will gather in Atlanta for Red Hat Summit. The agenda covers everything from AI to digital sovereignty, but in the customer conversations I have continued to have over the past 24 months, a different topic keeps coming up: whether the virtualization platform they've been running for years and depend on is still the right foundation for their workloads today, and whether it sets them up for what's coming next. Most of them are already evaluating alternatives.For a long time, virtualization was a "set it and forget it" part of the stack. That isn't the case any
A financial services firm is deploying an AI assistant to help underwriters review policies, analyze risk documents, and answer compliance questions. The model is grounded in the firm’s own document collection, drawing answers directly from underwriting manuals, regulatory filings, and internal procedures. The business case is solid.Then the security review starts:Can a crafted prompt trick the model into ignoring its system instructions and exposing confidential data?What happens when a response surfaces personally identifiable information (PII) that's embedded in the retrieved documents?Is