News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

ITSM Buyer’s Guide: Top 21 It Service Management Tools

IT service management has evolved into a key function for keeping the enterprise humming. These platforms can help you track and hone service workflows.

Episode Cover Image
Episode Cover Image

10 Ways To Optimize Data Center Operations

Running a data center efficiently is no small feat. From managing energy costs to preventing downtime, there's a lot that can go wrong-and a lot that can be optimized.

Episode Cover Image
Episode Cover Image

Why Are So Many Organizations Dragging Their Feet On NIS2 Compliance?

Strategies for organizations to close the NIS2 compliance gap

Episode Cover Image
Episode Cover Image

Why Compliance-First Cybersecurity Programs Fail (And What Actually Works)

Most B2B companies build cybersecurity programs backwards - starting with compliance instead of real security. Learn why this approach fails and how fractional CISO services can help you build effective security that actually prevents breaches while achieving compliance.

Episode Cover Image
Episode Cover Image

Who Is A Chief Compliance Officer?

The role of a chief compliance officer (CCO) has become indispensable for organizations operating in diverse industries. The CCO is responsible for ensuring that the organization adheres to internal policies as well as external legal and regulatory requirements.

Episode Cover Image
Episode Cover Image

Is Storage The Weak Link In Your Cyber-Resilience Strategy?

While challenges exist in applying cyber resilience to storage platforms, vendors are starting to make it easier for organizations to add that needed layer of protection.

Episode Cover Image
Episode Cover Image

Why Model Context Protocols Are The Next AI Security Blind Spot

AI agents are moving from novelty to infrastructure at record speed. In the race to make them more capable, developers are bolting on Model Context Protocols (MCPs) - plugins that act as connectors between agents and the APIs, tools, or execution environments they control.

Episode Cover Image
Episode Cover Image

AI Is Taking Over Cybersecurity – But Businesses Still Know The Risks

99% agree AI will influence their cybersec purchases or renewals

Episode Cover Image
Episode Cover Image

Why Enterprise AI’s Next Breakthrough Lies In Spatial Intelligence

Spatial intelligence represents a critical evolution in AI

Episode Cover Image
Episode Cover Image

Multi-Cloud Security

Enterprises today are no longer confined to a single IT environment. Instead, they are embracing multi-cloud strategies-leveraging services from AWS, Microsoft Azure, Google Cloud, and private clouds to achieve flexibility, scalability, and cost efficiency. This shift enables digital transformation at scale but also introduces unprecedented security challenges.

Episode Cover Image
Episode Cover Image

The Era Of Desktop PCs Could End Sooner Than You Think

There was a time that the only shape computers came in was a desktop or tower case. All computers were big, bulky, and plugged into the wall. Then, as components shrank and became less power-hungry, computers became portable, and later truly mobile.

Episode Cover Image
Episode Cover Image

No Time For Cybersecurity Complacency In 2025

Cybersecurity is not a 'set it and forget it' affair. It requires continuous vigilance, adaptability, and a proactive approach to stay ahead of increasingly savvy cyber criminals capable of attacks that can cripple a company in many ways.

Episode Cover Image
Episode Cover Image

Cybersecurity Signals: Connecting Controls And Incident Outcomes

There is constant pressure on security leaders to decide which controls deserve the most attention and budget. A new study offers evidence on which measures are most closely linked to lower breach risk and how organizations should think about deploying them.

Episode Cover Image
Episode Cover Image

Boards Are Being Told To Rethink Their Role In Cybersecurity

Boards of directors are being told that cybersecurity is now central to business resilience and growth, and that they must engage more directly in the way their organizations manage risk.

Episode Cover Image
Episode Cover Image

DDoS Is The Neglected Cybercrime That’s Getting Bigger. Let’s Kill It Off

Don't worry, there's a twist at the end

Episode Cover Image
Episode Cover Image

In The Rush To Adopt Hot New Tech, Security Is Often Forgotten. AI Is No Exception

Cisco finds hundreds of Ollama servers open to unauthorized access, creating various nasty risks

Episode Cover Image
Episode Cover Image

Aligning It And Security Teams For Optimal Business Success

How can IT and Security teams become more aligned?

Episode Cover Image
Episode Cover Image

I Am A Cybersecurity Expert – Here’s Why It’s Time For Businesses To Bolster Defenses, Beyond Just Tech

How to build a proactive and adaptive cyber defence ecosystem

QR Code