News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

Justifying Investments In Machine Identity Management

Why is Investment Justification in Machine Identity Management Essential?

Episode Cover Image
Episode Cover Image

How IT Leaders Use Agentic AI For Business Workflows

Tech-forward execs share how they tap agentic AI to automate tedious tasks and supercharge business-critical activities.

Episode Cover Image
Episode Cover Image

Confidential Computing: CIOs Move To Secure Data In Use

Chief information officers are embracing confidential computing to secure sensitive data in use, but successful deployment requires careful integration, performance planning, and regulatory alignment.

Episode Cover Image
Episode Cover Image

The CIO’s Guide To Managing Agentic AI Systems

The rapid transition from suggestion-based AI to decision-making agents creates urgent new governance challenges for enterprise technology leaders. Here's how to stay ahead of the curve.

Episode Cover Image
Episode Cover Image

Top Data Breaches In April 2025 That Made The Headlines

As April 2025 drew to a close, it left a string of high-profile data breaches in its wake, rattling major organizations. Yale New Haven Health saw 5.5 million patient records exposed, and Hertz dealt with a breach impacting over a million customers.

Episode Cover Image
Episode Cover Image

CIOs Say Security Systems Not Delivering Value For Money, Too Complex To Manage

Survey also finds that over half of CIOs say their security patch systems are too complex to manage effectively and believe they have overinvested

Episode Cover Image
Episode Cover Image

SANS Top 5: Cyber Has Busted Out of the SOC

This year's top cyber challenges include cloud authorization sprawl, ICS cyberattacks and ransomware, a lack of cloud logging, and regulatory constraints keeping defenders from fully utilizing AI's capabilities.

Episode Cover Image
Episode Cover Image

Cybersecurity Is Not Working: Time To Try Something Else

The bottom-up approaches most have been pushing for 20 years around cybersecurity have simply failed

Episode Cover Image
Episode Cover Image

CISOs Take Note: Is Needless Cybersecurity Strangling Your Business?

Building strong, resilient cybersecurity is essential. On the other hand, obsolete, redundant, and defective cybersecurity technologies can make things worse -- much worse.

Episode Cover Image
Episode Cover Image

Enterprises Need To Beware Of These 5 Threats

A panel of SANS Institute leaders detailed current threats and provided actionable steps for enterprises to consider.

Episode Cover Image
Episode Cover Image

Innovative Measures In Cybersecurity For 2025

Are Concerns Over Cloud Security Limiting Your Innovation?

Episode Cover Image
Episode Cover Image

Future Of 5G: Why Quality Of Experience Is The Real Game Changer

Chip Strange on Why Measuring 5G Experience Matters Now More Than Ever

Episode Cover Image
Episode Cover Image

OpenJDK News Roundup: Compact Source, Module Import Declarations, Key Derivation, Scoped Values

There was a flurry of activity in the OpenJDK ecosystem during the week of April 14th, 2025, highlighting eight new JEPs having been elevated from their JEP Drafts to Candidate status. Four of these will be finalized after their respective rounds of preview.

Episode Cover Image
Episode Cover Image

Techie Diagnosed Hardware Fault By Checking Customer’s Coffee

y the time Friday morning rolls around, starting the day with a stimulating beverage feels like a fine idea. And so does delivering a freshly brewed installment of On Call, The Register's reader-contributed column in which you share tales of tech support triumph and torture.

Episode Cover Image
Episode Cover Image

Developer Scored Huge Own Goal By Deleting Almost Every Football Fan In Europe

Fiddling with the production database - what could possibly go wrong?

Episode Cover Image
Episode Cover Image

‘Untappable’ Encryption Edges Closer After Quantum Messaging Breakthrough

Scientists have made the first-ever coherent quantum communication using existing telecomms infrastructure

Episode Cover Image
Episode Cover Image

IT Pros Share Disaster Preparedness, VMware Migration Plans

IT pros at VeeamON shared disaster preparedness strategies, including DR planning, using immutable storage and moving away from VMware.

Episode Cover Image
Episode Cover Image

What Do U.S. Customers Really Want From A Contact Center Interaction?

'The US Customer Experience Decision-Makers' Guide (2024-25)' is based on a survey of hundreds of US organizations and 1,000+ US customers. This is the 7th annual edition of the report.

QR Code