News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

The AI Revolution Is Stuck In IT Ops

The AI revolution isn't coming. It's already here. According to the State of Application Strategy 2025 report, 96% of enterprises are deploying AI models.

Episode Cover Image
Episode Cover Image

96% Of IT Pros Say AI Agents Are A Security Risk, But They’re Deploying Them Anyway

The same capabilities that make agents much more powerful than traditional chatbots also make them much bigger potential liabilities.

Episode Cover Image
Episode Cover Image

The Governance Challenge: Aligning AI With ESP Priorities

Exploring how AI governance supports ESG alignment

Episode Cover Image
Episode Cover Image

The Next Generation Cloud: Powering Secure, Seamless Multi-Platform Connectivity

In the age of technology, Naga Swetha Kattula, a researcher in cloud computing architectures, brings forth a compelling exploration of technological innovations redefining enterprise cloud integration and security in a complex multi-cloud world.

Episode Cover Image
Episode Cover Image

Survey: IT Teams See Value In Both Private And Public Cloud Options

A survey of 1,800 senior IT decision makers finds that public and private cloud computing platforms, depending upon security, compliance, management complexity and performance requirements of application workloads, are now being relied on in equal measure

Episode Cover Image
Episode Cover Image

The Future Of Computing: Unlocking The Potential Of Quantum Systems

In the modern digital era, quantum computing is poised to revolutionize industries by solving problems that classical computers struggle with.

Episode Cover Image
Episode Cover Image

Zero-Trust Is Redefining Cyber Security In 2025

The future of zero-trust is about embedding resilience into every facet of an organisation. To achieve this, SRM leaders must reimagine their strategies to address emerging challenges and prioritise key areas.

Episode Cover Image
Episode Cover Image

Why Layoffs Increase Cybersecurity Risks

A wave of layoffs has swept through the tech industry, leaving IT teams in a rush to revoke all access those employees may have had.

Episode Cover Image
Episode Cover Image

Unlocking the Gates: REST API Authentication Methods for Modern Security

Securing your API endpoints isn't just good practice-it's essential survival. As cyber threats grow increasingly sophisticated, understanding the authentication mechanisms that protect your digital assets becomes a critical skill for developers and architects alike.

Episode Cover Image
Episode Cover Image

The Unique Cybersecurity Risks In The Manufacturing Sector

For the fourth year running, in 2025, the IBM X-Force Threat Intelligence Index crowned the manufacturing sector as the number one targeted industry for cybercrime, representing 26% of incidents.

Episode Cover Image
Episode Cover Image

Securing The Digital Supply Chain: Network Security Best Practices For Cloud-Native Logistics

As the logistics industry evolves toward fully digitized, cloud-native infrastructures, security has become an urgent and complex priority.

Episode Cover Image
Episode Cover Image

Rethinking Secure Comms: Are Encrypted Platforms Still Enough?

A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error.

Episode Cover Image
Episode Cover Image

Mandiant Finds More Than 30 Fake AI Websites Spreading Malware

Fake AI video generation websites promoted via Facebook and LinkedIn ads were found to spread various malware payloads with reconnaissance and backdoor capabilities, according to Mandiant.

Episode Cover Image
Episode Cover Image

How Well Do You Know Your Remote IT Worker?

Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into companies around the world, gaining access to sensitive data.

Episode Cover Image
Episode Cover Image

How NHIs Deliver Value to Your Security Architecture

Why Does NHI Value Matter To Your Security Architecture?

Episode Cover Image
Episode Cover Image

How Cyber Security Professionals Are Leveraging AWS Tools

It's now essential for IT security teams to have oversight of cloud computing, and AWS offers a plethora of tools to make managing it easier. Find out how cyber pros are using them in the wild

Episode Cover Image
Episode Cover Image

How CISOs Can Regain Ground In The AI Fraud War

Fraudsters are winning the AI arms race, first-party fraud is rising, and siloed systems are holding back defenses, according to DataVisor.

Episode Cover Image
Episode Cover Image

Essentials Of Identity And Access Management

In an era where digital breaches threaten the very core of businesses, Identity and Access Management (IAM) has transformed into a critical pillar of modern cybersecurity strategy.

QR Code