News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

Your Infrastructure Has A Mind Of Its Own

Enterprise IT is undergoing a foundational transformation. The age of passive automation, scripts triggered by humans and bots that follow fixed logic, is giving way to something far more profound.

Episode Cover Image
Episode Cover Image

Is AI Killing The Resume?

As applicants use AI to quickly create job-specific resumes, some companies are shifting focus to skills assessments, portfolios, and real-world tasks.

Episode Cover Image
Episode Cover Image

GenAI Is Exposing Sensitive Data At Scale

Sensitive data is everywhere and growing fast. A new report from Concentric AI highlights how unstructured data, duplicate files, and risky sharing practices are creating serious problems for security teams.

Episode Cover Image
Episode Cover Image

Glossary Of 25 Top Data Storage Terms You Should Know

This collection of data storage terms covers newer technologies, such as blockchain storage, and legacy tech, including network-attached storage and tape drives.

Episode Cover Image
Episode Cover Image

AI Dominates 2025 Future Of Memory And Storage Conference

Techs discussed at the Future of Memory and Storage event included high-capacity and high-performance SSDs, all against the backdrop of AI. Explore expert analysis from the show.

Episode Cover Image
Episode Cover Image

5 Tips For Improving Data Storage Efficiency

Update on-premises infrastructure, refine DLM strategies, employ data reduction techniques and continuously monitor storage systems to improve storage efficiency.

Episode Cover Image
Episode Cover Image

Why Dataops Is Critical To Successfully Scaling AI

AI projects often fail to scale due to poor data quality and siloed pipelines. Learn how DataOps provides the governance, automation, and real-time capabilities needed to deliver reliable AI at enterprise scale.

Episode Cover Image
Episode Cover Image

LLMs vs SLMs: What’s the Difference Between Language Models?

Understanding LLMs and SLMs: Key Differences and Features Explained in 2025

Episode Cover Image
Episode Cover Image

Employee Trust Is Key To AI Adoption

The adoption of AI in enterprises is accelerating steeply, and it's hitting a critical inflection point, says Sunil Agrawal, Chief Information Security Officer at the platform Glean.

Episode Cover Image
Episode Cover Image

Cybersecurity AI (CAI): Open-Source Framework For AI Security

Cybersecurity AI (CAI) is an open-source framework that helps security teams build and run AI-driven tools for offensive and defensive tasks.

Episode Cover Image
Episode Cover Image

AI Is Rewriting The Rules Of Cyber Defense

Enterprise security teams are underprepared to detect new, adaptive AI-powered threats. The study, published by Lenovo, surveyed 600 IT leaders across major markets and shows widespread concern about external and internal risks, along with low confidence in current defenses.

Episode Cover Image
Episode Cover Image

11 Real-World Agentic AI Examples And Use Cases

AI that doesn't just follow instructions but figures out how to get things done -- that's the promise of agentic AI, an emerging approach that's already changing some sectors.

Episode Cover Image
Episode Cover Image

Compare GPUs Vs. CPUs For AI And Machine Learning Use Cases

Choosing which AI hardware option makes more sense for an AI or machine learning project depends on multiple factors, including speed, memory and cost.

Episode Cover Image
Episode Cover Image

Zero Trust: Strengths And Limitations In The AI Attack Era

Zero Trust could help organizations fight back against attackers who use artificial intelligence, but new threats will require the architecture to evolve.

Episode Cover Image
Episode Cover Image

Why Sase Vendors Are Finally Admitting The Need For Browser Security Solutions

In early September, Palo Alto Networks publicly acknowledged that Secure Web Gateways (SWGs) are architecturally unable to defend against Last Mile Reassembly attacks.

Episode Cover Image
Episode Cover Image

The Three Types Of Insider Threats That Could Destroy Your Company

When most people think about cybersecurity, they picture hackers in hoodies breaking through firewalls from some remote location.

Episode Cover Image
Episode Cover Image

The Threat Of Privilege Abuse In Active Directory

In early 2024, the BlackCat ransomware attack against Change Healthcare caused massive disruption across the U.S. healthcare sector. It later emerged that the cause of this major national incident was traced back to compromised credentials used to remotely access a Change Healthcare Citrix portal. Access to the portal wasn't secured with multi-factor authentication (MFA).

Episode Cover Image
Episode Cover Image

Predicting DDoS Attacks: How Deep Learning Could Give Defenders An Early Warning

Distributed denial-of-service (DDoS) attacks remain one of the most common and disruptive forms of cybercrime. Defenders have traditionally focused on detecting these attacks once they are underway.

QR Code