News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

Healthcare’s AI Agent Reality Check

Keebler Health CEO Isaac Park dives into the impact artificial intelligence (AI) is having across the healthcare sector.

Episode Cover Image
Episode Cover Image

7 Tips For A More Effective Multicloud Strategy

As organizations increasingly find themselves operating in multiple clouds, IT leaders must get more intentional about how they address the resulting complexity, security issues, and cost concerns.

Episode Cover Image
Episode Cover Image

A Data Sovereignty Primer For Cloud Admins

Data sovereignty is a critical part of any cloud deployment that cloud administrators must understand. Implement these best practices to ensure compliance now and in the future.

Episode Cover Image
Episode Cover Image

7 Enterprise Cloud Strategy Trends Shaking Up IT Today

The cloud is moving rapidly in new directions. Here's a rundown of the latest top strategy trends.

Episode Cover Image
Episode Cover Image

Cybersecurity Threats Surge In First Half, Report Finds

Threat actors have launched a deluge of cyberattacks during the first six months of 2025, resulting in record-high credential theft, ransomware, and data breach incidence, Cybernews reports.

Episode Cover Image
Episode Cover Image

AI Security Spend Surges, But Most Cloud Data Unencrypted, Thales Warns

In a stark warning for cloud security teams, a new Thales report reveals that while enterprises are pouring resources into AI-specific protections, only 8% are encrypting the majority of their sensitive cloud data -- leaving critical assets exposed even as AI-driven threats escalate and traditional security budgets shrink.

Episode Cover Image
Episode Cover Image

Artemis: Open-Source Modular Vulnerability Scanner

Artemis is an open-source modular vulnerability scanner that checks different aspects of a website's security and translates the results into easy-to-understand messages that can be shared with the organizations being scanned.

Episode Cover Image
Episode Cover Image

Taming Cyber Reporting Pressures

Organizations are increasingly inundated with cybersecurity reporting demands from a growing community of stakeholders. Follow these tips to eliminate reporting chaos, regain control, and enjoy peace of mind.

Episode Cover Image
Episode Cover Image

Building The Perfect Post-Security Incident Review Playbook

By creating a safe environment for open discussion, prioritizing human context alongside technical data, and involving diverse stakeholders, organizations can turn security incidents into accelerators of resilience.

Episode Cover Image
Episode Cover Image

Getting A Cybersecurity Vibe Check On Vibe Coding

Following a number of high-profile security and development issues surrounding the use of LLMs and GenAI to code and create applications, it's worth taking a temperature check to ask: Is this technology ready for prime time?

Episode Cover Image
Episode Cover Image

Global Cybersecurity Spending Is Going To Hit $213 Billion In 2025 – Here’s What’s Driving Investment

Spending across major fronts comes in the wake of rising cloud security threats and growing skills gaps

Episode Cover Image
Episode Cover Image

How The Browser Became The Main Cyber Battleground

Until recently, the cyber attacker methodology behind the biggest breaches of the last decade or so has been pretty consistent

Episode Cover Image
Episode Cover Image

Enterprises Neglect AI Security – And Attackers Have Noticed

IBM report shows a rush to embrace technology without safeguarding it, and as for governance...

Episode Cover Image
Episode Cover Image

Translating Cyber-Risk For The Boardroom

When security leaders embrace this truth and learn to speak in the language of leadership, they don't just protect the enterprise, they help lead it forward.

Episode Cover Image
Episode Cover Image

Why Stolen Credentials Remain Cybercriminals’ Tool Of Choice

It's often the case that the simplest tools have the longest staying power, because they ultimately get the job done.

Episode Cover Image
Episode Cover Image

Google Cloud/Forrester Report: Top Challenges To Effective Threat Intelligence

Too many threat intelligence data feeds and not enough skilled analysts top the list of challenges for cybersecurity teams, says a new Google Cloud/Forrester report.

Episode Cover Image
Episode Cover Image

From Tool To Strategic Partner: A 4-Step Blueprint For CIOs

Stop treating IT like a utility! CIOs who lead with strategy, not servers, will win the digital race before their competitors know it started.

Episode Cover Image
Episode Cover Image

Why CISOs Should Rethink Identity Risk Through Attack Paths

Identity-based attack paths are behind most breaches today, yet many organizations can't actually see how those paths form.

QR Code