News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

Why Businesses Must Rethink Cybersecurity

Relying on an MSP alone fails to provide comprehensive security which can only be achieved through the collaborative efforts of MSP, MSSP and cybersecurity consulting services.

Episode Cover Image
Episode Cover Image

Delivering Value With Advanced IAM

Why is Advanced Identity and Access Management Necessary?

Episode Cover Image
Episode Cover Image

Secure By Design? At RSAC 2025, Experts Warn: We’re Not Winning Yet, But We Could

After five decades of cybersecurity evolution, attackers are still winning more often than defenders - and the clock is ticking to change that.

Episode Cover Image
Episode Cover Image

Why Our Industry Must Shift From Prevention To Cyber Resilience

Over the past year, cyber operations by foreign adversaries, including the People's Republic of China (PRC), have moved away from traditional espionage and data theft to developing strategic plans that could infiltrate and cripple critical U.S. infrastructure.

Episode Cover Image
Episode Cover Image

Key Cybersecurity Considerations For 2025

As we usher in a new year, it's crucial to focus on key areas in cybersecurity that demand our attention.

Episode Cover Image
Episode Cover Image

DevSecOps Reality Check: Context Reduces Critical Security Alerts by 82%

Cutting through security noise, Datadog's 2025 State of DevSecOps report finds most critical alerts aren't actually critical.

Episode Cover Image
Episode Cover Image

5 Myths About Passwords You Should Stop Believing

We've been using computer passwords for decades, yet it seems like no one can agree on how you should pick a password, what it should contain, and if a password is good enough. Let's cut through it.

Episode Cover Image
Episode Cover Image

Are You Confident in Your IAM Solutions?

Is Your Trust in IAM Solutions Justified?

Episode Cover Image
Episode Cover Image

9 Threats A Strong Password Still Doesn’t Protect Against

You've probably heard it a hundred times: 'Use a strong password.' And you should. However, if there's one thing I've learned from studying penetration testing and ethical hacking, it's this: a strong password is just one layer. By itself, it doesn't stop most of the real threats out there.

Episode Cover Image
Episode Cover Image

How NHIs Contribute to IT Stability

Why Are NHIs Crucial for IT Stability?

Episode Cover Image
Episode Cover Image

The Rising Threat Of Zero-Day Exploits Targeting Enterprise Security Products

Zero-day exploits continue to pose one of the most significant and evolving cybersecurity threats to businesses worldwide.

Episode Cover Image
Episode Cover Image

Best Practices For User Authentication And Authorization In Web Applications: A Comprehensive Security Framework

Your authentication system isn't just a door-it's the fortress protecting everything you value. Your authentication system isn't just a door-it's the fortress protecting everything you value.

Episode Cover Image
Episode Cover Image

Preparing Your Business For A Penetration Test

Penetration testing is vital to keeping your business safe in today's digital landscape, where cyber threats are ever present.

Episode Cover Image
Episode Cover Image

Cybersecurity That Fits Your Budget – How?

Is Affordable Cybersecurity a Reality?

Episode Cover Image
Episode Cover Image

DPIT: Bankrupted by ERP with Arick Helmlinger #356

Arick Helmlinger, IT Manager of Business Systems and Data at RIX Industries, shares his path from software developer to IT leadership and managing a challenging ERP implementation during COVID-19.

Episode Cover Image
Episode Cover Image

44% Of The Zero-Days Exploited In 2024 Were In Enterprise Solutions

In 2024, threat actors exploited 75 zero-days - i.e., vulnerabilities previously unknown to vendors, thus without a readily available patch - in a wide variety of attacks.

Episode Cover Image
Episode Cover Image

Top 10 Digital Transformation Skills Every Business Must Master

Stay Ahead: 10 Must-Have Tech Skills for Business Growth

Episode Cover Image
Episode Cover Image

Optimistic About Your Cybersecurity Strategy?

Why is there a growing wave of optimism surrounding cybersecurity strategies, especially with the increasing incidence of cyber threats?

QR Code