News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

How AI Is Changing Your Mind

And here are six ways to protect yourself from a world view determined by AI.

Episode Cover Image
Episode Cover Image

AI Is Changing Cloud Architecture Faster Than Most Teams Realize

For years, cloud architecture followed a familiar pattern. Organizations migrated applications, modernized storage, embraced containers, improved automation, and gradually spread workloads across public and private environments.

Episode Cover Image
Episode Cover Image

12 AI Prompt Templates Every Professional Should Bookmark

AI is only as useful as the instructions you give it. The difference between a generic response and a powerful one often comes down to the prompt.

Episode Cover Image
Episode Cover Image

Beyond The Hype: 5 Surprising Realities Of Enterprise AI

The AI fatigue that defined the late 2023 and 2024 business cycles was, in hindsight, a necessary correction. During that period, many organizations found themselves trapped in what industry observers called 'pilot purgatory.'

Episode Cover Image
Episode Cover Image

Beyond the Green Checkmark: Using Formal Verification to Stop ArgoCD Drift

In the modern cloud-native landscape, GitOps has rightfully emerged as the gold standard for continuous delivery. By utilizing Git as the single source of truth, tools like ArgoCD have revolutionized how platform teams manage Kubernetes clusters.

Episode Cover Image
Episode Cover Image

An Obscure Os Could Surpass ChromeOS By The End Of 2027 – Huawei’s Harmony OS Grows 9X In 12 Months, And It’s Only The Beginning

HarmonyOS expansion accelerates as Huawei challenges global PC market trends

Episode Cover Image
Episode Cover Image

The AI Cybersecurity Arms Race: When Intelligent Threats Meet Intelligent Defenses

Artificial intelligence is transforming nearly every sector of the technology industry, and cybersecurity is quickly becoming one of the most affected. For decades, cybersecurity strategies relied on signature-based detection systems, rule-driven firewalls, and manual monitoring performed by security analysts. While these approaches remain important, the scale and speed of modern cyber threats have grown far beyond what traditional security tools can handle alone.

Episode Cover Image
Episode Cover Image

Why Post-Quantum Cryptography Can’t Wait

Organizations have to prepare to ensure they have cryptography in place in the post-quantum world.

Episode Cover Image
Episode Cover Image

SIEM vs XDR vs MDR: Understanding the Real Differences Between Modern Security Operations Technologies

As cyber threats grow more complex, organizations increasingly rely on security platforms like SIEM, XDR, and MDR. However, many leaders and IT teams still struggle to understand how these technologies differ and how they work together to strengthen an organization's security posture.

Episode Cover Image
Episode Cover Image

AI Phishing, Malicious Svgs Continues After Surge Over Holidays

A report based on millions of phishing emails reported to Hoxhunt in 2025 and early 2026 revealed a massive surge in AI-generated phishing attempts at the end of last year, as well as a 50-fold increase in malicious SVG attachments.

Episode Cover Image
Episode Cover Image

AI Vs AI: Agent Hacked McKinsey’s Chatbot And Gained Full Read-Write Access In Just Two Hour

Researchers at red-team security startup CodeWall say their AI agent hacked McKinsey's internal AI platform and gained full read and write access to the chatbot in just two hours.

Episode Cover Image
Episode Cover Image

The Zero-Day Scramble Is Avoidable: A Guide To Attack Surface Reduction

You can't control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The problem is that most teams have more internet-facing exposure than they realise. Intruder's Head of Security digs into why this happens and how teams can manage it deliberately.

Episode Cover Image
Episode Cover Image

CISO Conversations: Aimee Cardwell

Cardwell started her career at Netscape, become a VP of engineering at American Express, CISO at UnitedHealth Group, and now CISO in Residence at Transcend.

Episode Cover Image
Episode Cover Image

A Guy Who Wrote The Code Died In 2005. I Still Have To Secure It

The real frontline of American cybersecurity is a bidding war on eBay for 30-year-old industrial controllers.

Episode Cover Image
Episode Cover Image

From Submarine Periscopes To The C-Suite W/Roy Cherian (47:16) #405

Roy Cherian is Director of IT at True Manufacturing, a 1,140-person commercial refrigeration company founded in 1945. He's been through the dot-com era, smartphone revolution, and now the AI inflection point across five industries.

Episode Cover Image
Episode Cover Image

What Transformative CTOs Do Differently: Mojgan Lefebvre on Leading in the Age of AI (57:31)

What does it take to lead technology at enterprise scale in a world defined by AI, ambiguity, and nonstop disruption? That's one of the big questions we're exploring in this episode with guest Mojgan Lefebvre, EVP and Chief Technology & Operations Officer at Travelers. Since joining the property casualty insurer in 2018, Mojgan has been the driving force behind its digital and operational transformations, modernizing core platforms, strengthening customer experience, and enabling business growth through technology.

Episode Cover Image
Episode Cover Image

I.T. Doesn’t Just Fix Computers W/Josh Tanner (52:09) #404

Josh Tanner is the one-person IT department at evolvedMD, a Goldman Sachs-backed behavioral health company that integrates mental health into primary care offices across five states. 350 users. PHI in every system. No team. No safety net.

Episode Cover Image
Episode Cover Image

The AI Attack Lifecycle: Digital Forensics And Intelligent Threats (55:00)

CXOTalk episode 910 explores how AI is transforming the full cyberattack lifecycle, from reconnaissance and social engineering through execution and cover-up, and what leaders must do to evolve their digital forensics, governance, and board-level readiness to keep pace with intelligent threats.

QR Code