News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

Shadow AI Practices: A Wakeup Call For Enterprises

While executives talk AI strategy, shadow agents are already inside the enterprise, quietly rewriting your risk profile faster than policies can keep up.

Episode Cover Image
Episode Cover Image

Top Data Governance Strategies For Enterprises In 2026

Data governance has evolved beyond basic compliance and has become a strategic priority for businesses worldwide. As organisations manage increasing volumes of structured and unstructured data, the demand for accuracy, security, and accountability continues to intensify.

Episode Cover Image
Episode Cover Image

Gartner Says Worldwide Sovereign Cloud IaaS Spending Will Total $80B In 2026

Sovereign Cloud IaaS Spending to Shift 20% of Current Workloads from Global to Local Cloud Providers

Episode Cover Image
Episode Cover Image

Quantum Computing In 2026: What Is Real And What Is The Hype?

Can Quantum Computing Deliver? 5 Key Real-World Insights You Can't Miss

Episode Cover Image
Episode Cover Image

Holographic Tape Inches Closer To Mass Market Ahead Of Silica, Ceramic Media – 200TB Worm Tech Set To Debut In 2027 After Successful Dry Run In An LTO Tape Library

A UK startup has tested a holographic tape storage system inside a working LTO tape library, showing that it can run within existing data center setups.

Episode Cover Image
Episode Cover Image

Rethinking Identity Management: From Who Has Access To What Really Matters

For years, most organizations have assumed that Identity Governance and Administration (IGA) was all about compliance. With that in mind, most of them invested heavily to ensure they remain in good books with regulators and auditors. Whether it's completing access reviews on time, signing off on certificates, generating necessary reports, you name it! Everything seemed to check out. At least on paper. In reality, things played out a bit differently.

Episode Cover Image
Episode Cover Image

Survey: Most Security Incidents Involve Identity Attacks

A survey of 512 cybersecurity professionals finds 76% report that over half (54%) of the security incidents that occurred in the past 12 months involved some issue relating to identity management.

Episode Cover Image
Episode Cover Image

The Language Of The Cybersecurity Leaders

In cybersecurity, we like to believe that leaders are created by better products, stronger execution, and higher revenue. That belief is incomplete.

Episode Cover Image
Episode Cover Image

CISA Gives Federal Agencies One Year To Replace Outdated Edge Devices

Looking to finally modernize and secure federal government networks, the Cybersecurity and Infrastructure Security Agency (CISA) on Feb. 5 gave civilian agencies one year to replace all end-of-support (EoS) edge devices.

Episode Cover Image
Episode Cover Image

Is Traditional Cybersecurity Dead? How AI And Zero Trust Are Changing Protection

How Behavioral AI and Zero Trust Could be Shaping Cybersecurity Software

Episode Cover Image
Episode Cover Image

AWS Penetration Testing: Definition, Policy Tools, And Process

Amazon Web Services (AWS) is a cloud-computing platform offered by Amazon, which provides cloud services such as computing power, storage, databases, networking, and automated intelligence. AWS replaces data centres, builds applications, and offers pay-as-you-go. The unique features of AWS are scalability, global infrastructure, security, cost-effectiveness, and flexibility.

Episode Cover Image
Episode Cover Image

The Siem Maturity Framework Workbook (V1.0): A Practical Scoring Tool For Security Analytics Platforms

Over the last few weeks I published a post on the architectural and operational gaps that created the new wave of SIEM and AI SOC vendors. A bunch of people asked the same follow-up question: 'Ok, but how do I evaluate vendors consistently without falling back into feature checklists and marketing claims?'

Episode Cover Image
Episode Cover Image

How The GNU C Compiler Became The Clippy Of Cryptography

The creators of security software have encountered an unlikely foe in their attempts to protect us: modern compilers. Today's compilers boil down code into its most efficient form, but in doing so they can undo safety precautions.

Episode Cover Image
Episode Cover Image

Tens Of Thousands Of OpenClaw Systems Exposed By Misconfigurations And Known Exploits

A new report out today from security rating firm SecurityScorecard Inc. warns that widespread vulnerabilities in OpenClaw deployments have left tens of thousands of internet-facing instances exposed to takeover through misconfigured access controls and known exploits.

Episode Cover Image
Episode Cover Image

Passwords Are Dead: Introduction To Modern Authentication Methods

Attackers rarely 'hack' systems directly anymore. Instead, they log in. Phishing, credential stuffing, password reuse, and data breaches have made passwords easy to steal and cheap to abuse.

Episode Cover Image
Episode Cover Image

CIO Agenda 2026: Delivering On The AI Promise (55:28)

Eighty-eight percent of organizations now use AI, yet only 5-6% generate measurable value at scale. The era of experimentation is over, and Boards expect Chief Information Officers to deliver AI value and demonstrate business impact.

Episode Cover Image
Episode Cover Image

Please Grow Up, Coder Launches AI Maturity Self-Assessment Tool (31:49)

Artificial intelligence is transforming enterprise software - but it's not replacing it.

Episode Cover Image
Episode Cover Image

AI Vulnerability Hunting – PSW #913 (2:04:05)

In the security news: Viral AI prompts Things to do in your home security lab I can open your garage door They call me DKnife Beyondtrust RCE Cool AI device Robots need your body Meta is just full of scams, phishing, and malware...

QR Code