Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CIO Talk Network Podcasts

show episodes
 
Artwork

1
CIO Talk Network Podcast

CIO Talk Network - CTN

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Today, Enterprise Technology is both Strategy and Global. On CIO Talk Network (CTN), Business IT Thought Leaders from around the globe share their experience and discuss how they are partnering with business to innovate and help grow the top line revenue, better care of customers, and improve the corporate bottom line. If you want to keep up with changes in technology and how it can be leveraged to maximize business potential, listen to CTN: CIO Talk Network
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork

1
CIONews

CIONews

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the podcast channel of CIONews, we produce the latest updates in the world of technology and business from CIO perspective. Our show features in-depth discussions with top CIOs, technology leaders, and industry experts who share their insights and experiences on a wide range of topics. We also cover the latest news, and developments in the tech industry. CIONews helps to stay informed and inspired whether you're a seasoned CIO or just starting out in your career, it has something ...
  continue reading
 
Artwork

1
WGU Alumni Podcast

WGU Alumni Relations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
WGU’s alumni network now has more than 350,000 graduates living in all 50 states. The WGU alumni podcast highlights the incredible work that our alumni are doing in their local communities. We also share benefits, perks, resources and partner information to help our graduates stay engaged and get the most out of the alumni community.
  continue reading
 
"Open conversations. Real technology. AI for growth." Open Tech Talks is your weekly sandbox for technology: Artificial Intelligence, Generative AI, Machine Learning, Large Language Models (LLMs) insights, experimentation, and inspiration. Hosted by Kashif Manzoor, AI Evangelist, Cloud Expert, and Enterprise Architect, this Podcast combines technology products, artificial intelligence, machine learning overviews, how-tos, best practices, tips & tricks, and troubleshooting techniques. Whether ...
  continue reading
 
Artwork

1
Tech Legacies

Fanny Dunagan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Tech Legacies podcast. Join host Fanny Dunagan as she talks with top technology executives and hears their untold stories about their careers, what lessons they have learned, and what advice they have for executives hoping to get ahead. Are you motivated? Are you tech-savvy? Then make sure you follow this show. Leaders from major corporations like AT&T, FedEx, Verizon, Hasbro, Textron, and EY stop by to talk with Fanny. Discover strategies for technology and team culture. Lear ...
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
Artwork

51
Frankly IT Podcast

Auvik Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Frankly IT is the straight-talk podcast for IT leaders who want to boost the performance and efficiency of their technical teams. Tackling everything from service desk and IT project management to tech and business trends that are changing the way you work, we go off the beaten path to bring you interviews, insights, and analysis from worldwide experts and fellow tech leaders who’ve cracked the success code. Featuring practical tips and news you can use, each bi-weekly episode will leave you ...
  continue reading
 
Loading …
show series
 
Organizations are investing heavily in AI training and upskilling programs. Yet many still find that true capability is uneven. AI readiness is not just a list of tools or skills. It is the habit of thinking critically, questioning outputs, and learning continuously when solutions are not fixed. In this episode of CIO Talk Network, Miro Humer, Vice…
  continue reading
 
Nevada Chief Information Officer and Marine Corps veteran Tim Galuzzi joins us to talk about his journey from combat tours to the cabinet table—and how a WGU MBA in IT Management helped him turn technology into a force for public good. He shares what it took to elevate IT to a cabinet-level department in Nevada, why that move matters for cybersecur…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
In this second episode of the special AI mini-series, we now explore the human side of transformation, where technology meets purpose and people remain at the center. From future jobs and critical thinking to working with C-level leaders, how human intervention and high-quality data drive success in an AI-powered world. This week, Dave, Esmee, and …
  continue reading
 
Think 7-Eleven is just cheap snacks and Slurpees? Think again. In this segment of Tech Legacies podcast, former 7-Eleven and Blockbuster CEO, Jim Keyes shares how 7-Eleven Japan quietly became one of the world’s most advanced retail operations… decades before data-driven retail became trendy. Jim explains how, even in the 1990s, 7-Eleven Japan was …
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Open Tech Talks welcomes Lirone Glikman, author of The Super Connectors Playbook, global speaker, and relationship-building strategist. We dig into practical ways founders, students, and leaders can build authentic relationships, present with clarity, and sustain a personal brand without sounding salesy, especially now that AI makes everyone's writ…
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
Everyone thinks Netflix killed Blockbuster… but former CEO Jim Keyes says the real story is very different. In this TECH BYTE clip from Tech Leaders Untold, Jim reveals what really happened behind the scenes: how Blockbuster was actually ahead of its time in streaming, why a potential deal with Enron could have changed entertainment forever, and wh…
  continue reading
 
Technology can scale almost everything—except human experience. In a world driven by efficiency, what does it mean to design for how people truly feel? It's about transforming user interactions into ongoing insight and innovation, rooted in empathy and understanding. This week, Dave, Esmee and Rob talk to Kevin Magee, Chief Technology Officer at Al…
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
On the next episode of the WGU Alumni podcast, Ashley Emsweller Hungate —public servant, farm mom of four, and WGU alum—shares her journey of turning nonstop motion into focused momentum. From mini donkeys braying during proctored exams to leading culture and talent at Indiana’s Management Performance Hub, Ashley shows how purpose and practicality …
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Episode 171 of Open Tech Talks brings a powerful conversation with Marc Pickren, the turnaround CEO behind multiple successful SaaS revivals and now the driving force at Springbot. Host Kashif Manzoor explores how today's businesses can stay resilient, profitable, and human-centered amid the rapid evolution of AI and automation. Marc has spent the …
  continue reading
 
Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
What can the former CEO of 7-Eleven and Blockbuster teach us about AI, leadership, education, and resilience? In this wide-ranging conversation, James Keyes shares untold stories from the front lines of corporate transformation. He reveals how perception, not technology, doomed Blockbuster... why 7-Eleven Japan's secret weapon wasn't AI, but human …
  continue reading
 
The IT function is evolving fast. It's no longer just about maintaining systems but about shaping culture, driving innovation, and aligning technology with business goals. In this episode of CIO Talk Network, Dominic Redmond, Chief Information Officer at PageGroup Business Technology, joins host Sanjog Aul to explore how CIOs can reimagine their te…
  continue reading
 
The skills we teach today will decide the world we live in tomorrow but the digital skills gap is something we've been dealing with for decades, but it’s growing faster than ever, it starts with kids and stretches all the way into late IT careers, and now we're finally taking a more connected, lifelong approach to closing it. This week, Dave, Esmee…
  continue reading
 
As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
  continue reading
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play