News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

WD Maps Out 100TB+ HDD Roadmap and Performance Breakthroughs for AI Storage

At its Innovation Day 2026 event, Western Digital (now rebranded as WD) unveiled a customer-centric storage roadmap to reinvent hard drives for AI-era infrastructure, spanning 100TB+ HDDs, new performance- and power-optimized architectures, and an intelligent platform designed to improve storage economics and time-to-value.

Episode Cover Image
Episode Cover Image

Why Most Machine Learning Projects Fail To Reach Production

This article is a summary of my talk at QCon San Francisco 2024. For the past decade, I have worked as an applied scientist and machine learning engineer across multiple domains, including social media, fintech, and productivity tools.

Episode Cover Image
Episode Cover Image

Five Control Domains That Make AI Frameworks Effective

Every major cloud and data platform now publishes guidance on how organizations should secure artificial intelligence (AI). From Google's Secure AI Framework (SAIF) and Amazon Web Services' CAF-AI and Generative AI best practices to Microsoft's Secure AI and Responsible AI standards, enterprises are surrounded by frameworks.

Episode Cover Image
Episode Cover Image

It’s Time To Demand AI That Is Safe By Design’: What AI Experts Think Will Matter Most In 2026

What to look out for over the next year, according to experts

Episode Cover Image
Episode Cover Image

10 AI Predictions For 2026

Last year, we saw the integration of gen AI into everything, the rise of AI agents, and the explosion of vibe computing. As this year gathers pace, we'll see agentic AI move from pilots into production, the emergence of AI payments, and AI redefine how we think of user interfaces.

Episode Cover Image
Episode Cover Image

AI Is Saving Customer Support Teams Time, Survey Finds

Other benefits include scaling support without growing headcount and reduced cost to serve, according to an Intercom survey.

Episode Cover Image
Episode Cover Image

Shadow AI Is The New Shadow IT, And Most Security Teams Are Flying Blind

Over 14,000 Ollama server instances are publicly accessible on the internet right now. According to a recent Cisco analysis, 20% of these actively host models susceptible to unauthorized access. BankInfoSecurity separately reported discovering more than 10,000 Ollama servers with no authentication layer - the result of hurried AI deployments by developers under pressure to deliver.

Episode Cover Image
Episode Cover Image

As Agentic AI Ascends, Companies Are Grappling With Control

The rise of AI agents could put up barriers between customers and brands, leaving leaders to ponder how they can build loyalty and collect customer data in a new environment.

Episode Cover Image
Episode Cover Image

What Does Trustworthy AI Look Like In 2026?

CIOs and CISOs ask AI vendors tougher questions and keep a closer eye on these tools to ensure they deliver on their promised potential.

Episode Cover Image
Episode Cover Image

Ask The Experts: The Cloud Cost Reckoning

At what point did cloud computing stop being cheaper -- and why did you stay, anyway?

Episode Cover Image
Episode Cover Image

Top Cybersecurity Companies

In an era defined by digital transformation, cloud adoption, and hyperconnectivity, cybersecurity has become a top priority for organizations of every size and industry. Cyberattacks are no longer limited to simple malware or phishing emails-they now include ransomware-as-a-service (RaaS), zero-day exploits, insider threats, supply-chain compromises, and nation-state-backed attacks.

Episode Cover Image
Episode Cover Image

Shai-Hulud: The Hidden Cost Of Supply Chain Attacks

Recent supply chain attacks involving self-propagating worms have spread far, but the damage and long-term impact is hard to quantify.

Episode Cover Image
Episode Cover Image

Report Exposes Gap In AI Identity Threat Preparedness

A new report from The Identity Underground reveals a significant disconnect between executive priorities and frontline capabilities in managing AI-driven identity threats, according to BetaNews.

Episode Cover Image
Episode Cover Image

How To Implement A Zero Trust Architecture (And Why Visibility Comes First)

Every organisation now operates across hybrid and multi-cloud, where the traditional perimeter no longer applies. Attackers exploit encrypted and East-West traffic to move laterally and evade detection.

Episode Cover Image
Episode Cover Image

Cybersecurity Planning Keeps Moving Toward Whole-Of-Society Models

National governments already run cybersecurity through a mix of ministries, regulators, law enforcement, and private operators that own most critical systems.

Episode Cover Image
Episode Cover Image

CISA Gives Federal Agencies One Year To Rip Out End-Of-Life Devices

Federal civilian agencies have been ordered to remove end-of-life devices within 12 months due to widespread exploitation campaigns by sophisticated hackers.

Episode Cover Image
Episode Cover Image

What Is IT Security?

In a world where businesses are built on digital infrastructure, IT security has become a critical pillar of organizational resilience and trust. From cloud computing and remote workforces to SaaS applications and connected devices, modern IT environments are larger, more complex, and more exposed than ever before. At the same time, cyber threats are growing in scale, speed, and sophistication-making traditional, reactive security approaches ineffective.

Episode Cover Image
Episode Cover Image

Shift Left Is Dead For Cloud PAM

I first tried to 'shift left' cloud identity in early 2020. We were building a greenfield AWS environment with a strong cloud team and leadership support to do things properly. The idea was familiar: push security decisions earlier, give developers autonomy, and avoid becoming the bottleneck later.

QR Code