News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

Best Project Management Certifications Of 2025

No matter what your IT role or how senior your position, a project management certification can add value to your career. Here are the top PM certs for every step of your career, along with their requirements and costs.

Episode Cover Image
Episode Cover Image

DDoS Attacks Jump 358% Compared to Last Year

Cloudflare says it mitigated 20.5 million DDoS attacks in the first quarter of 2025.

Episode Cover Image
Episode Cover Image

What The **** Did You Put In That Code? The Client Thinks It’s A Cyberattack

When your customers work in super-sensitive situations, bad jokes make for bad business

Episode Cover Image
Episode Cover Image

10 Legendary Pranks That Tech Companies Pulled Off Perfectly

Every year, nearly all tech companies come up with new prank concepts that are fun to experience.

Episode Cover Image
Episode Cover Image

FOSS Weekly #25.18: Linux Magazine, Modern Terminals, Muse Pi, apt Guide and More

Before the age of blogs, forums, and YouTube tutorials, Linux users relied on printed magazines to stay informed and inspired. Titles like Linux Journal, Linux Format, and Maximum Linux were lifelines for enthusiasts, packed with tutorials, distro reviews, and CD/DVDs.

Episode Cover Image
Episode Cover Image

Microsoft Sender Requirements Enforced – How To Avoid 550 5.7.15 Rejections

From May 5, 2025, Microsoft is strictly enforcing its email sender requirements. This move requires anyone sending over 5,000 emails per day to Outlook.com, Hotmail, and other Microsoft consumer mailboxes to properly authenticate their messages.

Episode Cover Image
Episode Cover Image

10 Ways To Reduce Your MTTR

Mean time to repair is a critical metric for BCDR professionals. Learn how to calculate and reduce MTTR with this tip.

Episode Cover Image
Episode Cover Image

World Password Day 2025: Rethinking Security in the Age of MFA and Passkeys

Despite the rising use of biometrics, passkeys, and identity-based threat detection tools, one thing remains clear: passwords continue to be the frontline defence for digital access and often, the weakest link.

Episode Cover Image
Episode Cover Image

5 Reasons Now Is The Right Time To Buy A Linux Laptop

Most people only consider Windows or macOS when looking at laptops, with a smattering of ChromeOS thrown in for good measure. However, the next time you configure a laptop before purchase, you might just see the option to buy it with Linux pre-installed.

Episode Cover Image
Episode Cover Image

You Can Run Arch Linux In Windows Now – Here’s How

This is not a drill. Thanks to WSL, you can now run a virtual instance of Arch Linux.This is not a drill. Thanks to WSL, you can now run a virtual instance of Arch Linux.

Episode Cover Image
Episode Cover Image

19 Linux Performance Monitoring Utilities

Monitoring Linux server performance is vital for optimal operation. System admins should consider these 19 performance monitoring utilities to ensure maximum server performance.

Episode Cover Image
Episode Cover Image

Best SQL Databases to Enhance Your Data Skills in 2025

In 2025, it is essential to know SQL if one wants to be successful in their career in data science or analysis.

Episode Cover Image
Episode Cover Image

Best 10 SOC Tools for Security Operations and Threat Detection

In today's digital world, cybersecurity is as much about smart tools as it is about the people who use them. Modern Security Operations Centers (SOCs) are at the heart of an organization's defense.

Episode Cover Image
Episode Cover Image

Bridging The IT And Security Team Divide For Effective Incident Response

Greater alignment between IT and security teams is crucial for effective incident response - here's how to lay down the foundations

Episode Cover Image
Episode Cover Image

Compliance Challenges In Cloud Data Governance

Adopting cloud computing allows organizations of all shapes and sizes to access data and collaborate in the most flexible ways imaginable. While it brings many benefits, it also brings along compliance issues in data governance, particularly when data crosses borders. Ensuring data is safe, private and organized is paramount.

Episode Cover Image
Episode Cover Image

4 Compliance Questions For CIOs Considering AI Projects

IT leaders must consider the legal implications of potential use cases in order to rein in risks.

Episode Cover Image
Episode Cover Image

SC Award Winners 2025 ISACA – Best Professional Certification Program

ISACA's Certified Information Security Manager (CISM) certification has been named the Best Professional Certification Program at the 2025 SC Awards, recognized for its pivotal role in preparing cybersecurity professionals for leadership in an increasingly complex threat landscape.

Episode Cover Image
Episode Cover Image

What Enterprise Leaders Need To Know About The Hidden Economics Of Exabyte Storage

Your company could be overpaying for storage-not because you bought the wrong drives or chose the wrong vendor, but because the true economics of enterprise storage remain largely hidden from view.

QR Code