News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

What to Expect From TrueNAS 25.10 Open-Source Storage

TrueNAS 25.10 'Goldeye' open-source NAS is on the way, bringing Terabit networking, cloud-driven setup, and new virtualization features.

Episode Cover Image
Episode Cover Image

The Apache Software Foundation Announces Apache Ozone V.2.0.0

First object store to support operational databases, with major usability and compatibility enhancements

Episode Cover Image
Episode Cover Image

Shadow AI: Resistance is Futile

A couple of days ago, I was scrolling through my LinkedIn feed and a post by my friend and fellow tech-watcher Dion Hinchcliffe caught my eye.

Episode Cover Image
Episode Cover Image

What is the Difference Between Agentic and Non-Agentic AI Chatbots?

Agentic vs. Non-Agentic Chatbots: Key Differences, Examples, and Future of AI

Episode Cover Image
Episode Cover Image

Data Velocity: The Key To Turning AI Hype Into Enterprise Advantage

The outlook for digital transformation appears bleak, and there's no indication it's improving. While 90% of C-level leaders surveyed by McKinsey say their companies have undergone a digital transformation in the last two years, the risk of failure falls as high as 95%, according to Bain & Company. For most organizations, becoming truly data-driven remains an aspiration rather than a reality.

Episode Cover Image
Episode Cover Image

AI Hype Cycle: Gartner Charts the Rise of Agents, ModelOps, Synthetic Data, and AI Engineering

Gartner says the average company spent around $1.9 million on GenAI last year, yet fewer than 30% of AI leaders think their CEOs are satisfied with the results. That gap between spending and satisfaction is concerning.

Episode Cover Image
Episode Cover Image

Agentic AI Compliance And Regulation: What To Know

Agentic AI's autonomous nature and its ability to access multiple data layers bring heightened risk. Learn how to ensure its deployment meets compliance standards.

Episode Cover Image
Episode Cover Image

Securing the Cloud in an Age of Escalating Cyber Threats

As threats intensify and cloud adoption expands, organizations must leave outdated security models behind.

Episode Cover Image
Episode Cover Image

Tackling Cybersecurity Today: Your Top Challenge and Strategy

Shadow IT used to be a fringe problem, a rogue Dropbox account here, a personal Gmail there. Now, it's everywhere. One customer said it best: 'We don't have a Shadow IT problem. We are Shadow IT.' That stuck.

Episode Cover Image
Episode Cover Image

Attackers Use ‘Contact Us’ Forms and Fake NDAs to Phish Industrial Manufacturing Firms

A recently uncovered phishing campaign - carefully designed to bypass security defenses and avoid detection by its intended victims - is targeting firms in industrial manufacturing and other companies critical to various supply chains, Check Point researchers have warned.

Episode Cover Image
Episode Cover Image

Empowering The SOC: Stop Detecting Potential Threats, Start Signaling Real Attacks

The cybersecurity landscape is constantly evolving, and security operations centers (SOCs) are feeling the pressure to stay ahead of increasingly sophisticated attackers.

Episode Cover Image
Episode Cover Image

AI Tools Are Making Social Engineering Attacks Even More Convincing, And I Fear That This is Only The Beginning

Wallace and Gromit meet deepfake deception in this sharp take on AI-driven scams

Episode Cover Image
Episode Cover Image

Debunking Common Myths About DDoS Attacks and Protection

Today, enterprises heavily rely on the internet and web-based applications and services, making their continuous availability critical for business growth and long-term sustainability.

Episode Cover Image
Episode Cover Image

Securing the Cloud in An Age of Escalating Cyber Threats

As threats intensify and cloud adoption expands, organizations must leave outdated security models behind.

Episode Cover Image
Episode Cover Image

NIST Outlines Cybersecurity Framework for AI System

The National Institute of Standards and Technology (NIST) this week released a concept paper proposing new cybersecurity guidelines designed to secure artificial intelligence systems.

Episode Cover Image
Episode Cover Image

Cybersecurity Maturity Model Certification (CMMC) 2.0 Final Rule Released

In a significant step to secure the defense industrial base (DIB), the Department of Defense (DoD) has officially released the long-anticipated Cybersecurity Maturity Model Certification (CMMC) Final Rule, which was released October 15, 2024, and will go into effect on December 16, 2024.

Episode Cover Image
Episode Cover Image

Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime

Competition among malware-as-a-service developers has transformed infostealers into refined, accessible tools for cybercriminals worldwide.

Episode Cover Image
Episode Cover Image

How Vulnerability Management Evolves Into Exposure Management

Today, the perimeter is everywhere and nowhere. Devices authorized and unauthorized wander in and out of your network. You subscribe to rather than install software. Half your assets live on other companies' servers, and half your workforce dials in from home.

QR Code