Today, Enterprise Technology is both Strategy and Global. On CIO Talk Network (CTN), Business IT Thought Leaders from around the globe share their experience and discuss how they are partnering with business to innovate and help grow the top line revenue, better care of customers, and improve the corporate bottom line. If you want to keep up with changes in technology and how it can be leveraged to maximize business potential, listen to CTN: CIO Talk Network
…
continue reading
CIO Talk Network Podcasts
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Welcome to the podcast channel of CIONews, we produce the latest updates in the world of technology and business from CIO perspective. Our show features in-depth discussions with top CIOs, technology leaders, and industry experts who share their insights and experiences on a wide range of topics. We also cover the latest news, and developments in the tech industry. CIONews helps to stay informed and inspired whether you're a seasoned CIO or just starting out in your career, it has something ...
…
continue reading
WGU’s alumni network now has more than 350,000 graduates living in all 50 states. The WGU alumni podcast highlights the incredible work that our alumni are doing in their local communities. We also share benefits, perks, resources and partner information to help our graduates stay engaged and get the most out of the alumni community.
…
continue reading
"Open conversations. Real technology. AI for growth." Open Tech Talks is your weekly sandbox for technology: Artificial Intelligence, Generative AI, Machine Learning, Large Language Models (LLMs) insights, experimentation, and inspiration. Hosted by Kashif Manzoor, AI Evangelist, Cloud Expert, and Enterprise Architect, this Podcast combines technology products, artificial intelligence, machine learning overviews, how-tos, best practices, tips & tricks, and troubleshooting techniques. Whether ...
…
continue reading
Welcome to the Tech Legacies podcast. Join host Fanny Dunagan as she talks with top technology executives and hears their untold stories about their careers, what lessons they have learned, and what advice they have for executives hoping to get ahead. Are you motivated? Are you tech-savvy? Then make sure you follow this show. Leaders from major corporations like AT&T, FedEx, Verizon, Hasbro, Textron, and EY stop by to talk with Fanny. Discover strategies for technology and team culture. Lear ...
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
Frankly IT is the straight-talk podcast for IT leaders who want to boost the performance and efficiency of their technical teams. Tackling everything from service desk and IT project management to tech and business trends that are changing the way you work, we go off the beaten path to bring you interviews, insights, and analysis from worldwide experts and fellow tech leaders who’ve cracked the success code. Featuring practical tips and news you can use, each bi-weekly episode will leave you ...
…
continue reading
1
Bridging the AI Readiness Gap I CIO Talk Network
43:42
43:42
Play later
Play later
Lists
Like
Liked
43:42Organizations are investing heavily in AI training and upskilling programs. Yet many still find that true capability is uneven. AI readiness is not just a list of tools or skills. It is the habit of thinking critically, questioning outputs, and learning continuously when solutions are not fixed. In this episode of CIO Talk Network, Miro Humer, Vice…
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
From Combat to Cabinet — How Nevada’s CIO, Tim Galluzi, is Leading with Purpose
12:15
12:15
Play later
Play later
Lists
Like
Liked
12:15Nevada Chief Information Officer and Marine Corps veteran Tim Galuzzi joins us to talk about his journey from combat tours to the cabinet table—and how a WGU MBA in IT Management helped him turn technology into a force for public good. He shares what it took to elevate IT to a cabinet-level department in Nevada, why that move matters for cybersecur…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
CRSP07: State of AI 2025 pt.2 - For the love of data with Indhira Mani, Intact Insurance
47:33
47:33
Play later
Play later
Lists
Like
Liked
47:33In this second episode of the special AI mini-series, we now explore the human side of transformation, where technology meets purpose and people remain at the center. From future jobs and critical thinking to working with C-level leaders, how human intervention and high-quality data drive success in an AI-powered world. This week, Dave, Esmee, and …
…
continue reading
1
TECH BYTES: Why 7-Eleven Japan Is Years Ahead of U.S. Retail - with Jim Keyes, former CEO of 7-Eleven | E06b
4:36
4:36
Play later
Play later
Lists
Like
Liked
4:36Think 7-Eleven is just cheap snacks and Slurpees? Think again. In this segment of Tech Legacies podcast, former 7-Eleven and Blockbuster CEO, Jim Keyes shares how 7-Eleven Japan quietly became one of the world’s most advanced retail operations… decades before data-driven retail became trendy. Jim explains how, even in the 1990s, 7-Eleven Japan was …
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Relationship Building, Personal Branding, and Authentic Networking in the AI Era with Lirone Glikman
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31Open Tech Talks welcomes Lirone Glikman, author of The Super Connectors Playbook, global speaker, and relationship-building strategist. We dig into practical ways founders, students, and leaders can build authentic relationships, present with clarity, and sustain a personal brand without sounding salesy, especially now that AI makes everyone's writ…
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
continue reading
1
TECH BYTES: The Truth about Blockbuster (nope, it wasn't Netflix) with Jim Keyes, former CEO of Blockbuster | E06a
3:27
3:27
Play later
Play later
Lists
Like
Liked
3:27Everyone thinks Netflix killed Blockbuster… but former CEO Jim Keyes says the real story is very different. In this TECH BYTE clip from Tech Leaders Untold, Jim reveals what really happened behind the scenes: how Blockbuster was actually ahead of its time in streaming, why a potential deal with Enron could have changed entertainment forever, and wh…
…
continue reading
1
CR114: Why human experience matters more than ever with Kevin Magee, All human
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39Technology can scale almost everything—except human experience. In a world driven by efficiency, what does it mean to design for how people truly feel? It's about transforming user interactions into ongoing insight and innovation, rooted in empathy and understanding. This week, Dave, Esmee and Rob talk to Kevin Magee, Chief Technology Officer at Al…
…
continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
Play later
Play later
Lists
Like
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
continue reading
1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
34:35
Play later
Play later
Lists
Like
Liked
34:35Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-524
…
continue reading
1
From Donkeys to Data: Distinguished Graduate Ashley Emsweller Hungate’s Journey
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35On the next episode of the WGU Alumni podcast, Ashley Emsweller Hungate —public servant, farm mom of four, and WGU alum—shares her journey of turning nonstop motion into focused momentum. From mini donkeys braying during proctored exams to leading culture and talent at Indiana’s Management Performance Hub, Ashley shows how purpose and practicality …
…
continue reading
1
Quantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Quantum Computing Isn’t A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
Play later
Play later
Lists
Like
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
continue reading
1
How to Build a Profitable AI-Ready Business in 2026 with Marc Pickren
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Episode 171 of Open Tech Talks brings a powerful conversation with Marc Pickren, the turnaround CEO behind multiple successful SaaS revivals and now the driving force at Springbot. Host Kashif Manzoor explores how today's businesses can stay resilient, profitable, and human-centered amid the rapid evolution of AI and automation. Marc has spent the …
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
…
continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
continue reading
1
Former 7-Eleven CEO's Fight to Fix Education with Tech - James Keyes | E06
1:21:26
1:21:26
Play later
Play later
Lists
Like
Liked
1:21:26What can the former CEO of 7-Eleven and Blockbuster teach us about AI, leadership, education, and resilience? In this wide-ranging conversation, James Keyes shares untold stories from the front lines of corporate transformation. He reveals how perception, not technology, doomed Blockbuster... why 7-Eleven Japan's secret weapon wasn't AI, but human …
…
continue reading
1
Reimagining the IT Team: People, Culture, Leadership | CIO Talk Network
45:02
45:02
Play later
Play later
Lists
Like
Liked
45:02The IT function is evolving fast. It's no longer just about maintaining systems but about shaping culture, driving innovation, and aligning technology with business goals. In this episode of CIO Talk Network, Dominic Redmond, Chief Information Officer at PageGroup Business Technology, joins host Sanjog Aul to explore how CIOs can reimagine their te…
…
continue reading
1
CR113: Bridging the digital skills gap in a complex world with Mike Nayler, AWS
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14The skills we teach today will decide the world we live in tomorrow but the digital skills gap is something we've been dealing with for decades, but it’s growing faster than ever, it starts with kids and stretches all the way into late IT careers, and now we're finally taking a more connected, lifelong approach to closing it. This week, Dave, Esmee…
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Rinki Sethi, Nicole Jiang - BSW #418
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
continue reading
1
The Afterlife, AWS, ClickFix, Agentic AI, Robot Lumberjacks, Robocalls, Aaran Leyland - SWN #522
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
…
continue reading
1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
Play later
Play later
Lists
Like
Liked
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
…
continue reading
1
Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429
1:38:26
1:38:26
Play later
Play later
Lists
Like
Liked
1:38:26Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
…
continue reading
1
Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland... - SWN #521
35:31
35:31
Play later
Play later
Lists
Like
Liked
35:31Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-521
…
continue reading