Fortytwo and Telenor Cyberdefense partnership
Fortytwo and Telenor Cyberdefence are joining forces at a time when many organisations are moving from AI experimentation to real operational use.
Fortytwo and Telenor Cyberdefence are joining forces at a time when many organisations are moving from AI experimentation to real operational use.
This is the final article in a series of five, describing what MCP is, why you need it, and how it helps AI agents talk to your system.
This is the fourth article in a series of five, describing what MCP is, why you need it, and how it helps AI agents talk to your system.
This is the third article in a series of five, describing what MCP is, why you need it, and how it helps AI agents talk to your system.
This is the second article in a series of five, describing what MCP is, why you need it, and how it helps AI agents talk to your system.
AI Cannot Talk Directly to Your Systems or Act for You Without MCP (Model Context Protocol).
This is the first article in a series of five, describing what MCP is, why you need it, and how it helps AI agents talk to your systems.
Attackers still log in. For years, credential theft through phishing has been one of the most persistent and damaging threats to modern organizations, not because it is sophisticated, but because it works.
What started as a Friday afternoon experiment turned into something we actually use. I built a multi-agent AI system for Fortytwo — a 40+-person cloud expert firm — over a weekend. Time tracking, revenue reporting, infrastructure monitoring. A real internal PoC on a real business. This is what worked, what didn’t, and what genuinely caught me off guard.
You want to let teams build and use agents without creating a parallel identity estate you cannot explain, audit, or shut down. You want autonomy with boundaries, and speed with accountability.
AI agents are moving from experiments to infrastructure. They read, decide, and act. Sometimes in response to a human. Sometimes on their own.