Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Tech Newsday Podcasts
Technology changes fast, yet leadership is still about people. “Flourish” is your dose of inspiration, growth, and practical wisdom in healthcare IT. Hosted by Sarah Richardson—health system executive and trusted mentor, this channel shares personal stories, career journeys, and leadership lessons from across the industry. Whether it’s a rapid-fire Q&A, a culture-building conversation, or a behind-the-scenes look at someone’s career pivot, each episode helps health leaders thrive in work and ...
…
continue reading
In this episode, host David Shipley discusses a significant cybersecurity breach at the University of Pennsylvania, which involved offensive emails sent from legitimate university addresses. The attackers claim to have accessed sensitive data, though their statements remain unverified. Shipley emphasizes the importance of vigilant communication and…
…
continue reading
1
Newsday: The CxO Pulse - Insights and Lessons from 229 Summits with This Week Health
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53November 3, 2025: What are healthcare IT leaders really concerned about? Fresh from three 229 Project summits across the country, Bill Russell, Sarah Richardson, and Drex DeFord pull back the curtain on the most pressing conversations happening right now. From simplifying AI governance with a two-track vendor approach to rethinking hiring strategie…
…
continue reading
1
Cybersecurity Today: October Recap - Addressing AI, DNS Failures, and Security Vulnerabilities
1:14:17
1:14:17
Play later
Play later
Lists
Like
Liked
1:14:17In this episode of 'Cybersecurity Today,' the panel, including Laura Payne from White TOK and David Shipley from Boer on Securities, reviews the major cybersecurity events of October. Key topics include DNS failures at AWS and Microsoft, the rise of AI and its associated security concerns, and several severe cloud and on-premises vulnerabilities in…
…
continue reading
1
Massive Data Exposures, Insider Threats, and State-Sponsored Cyber Attacks
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14In this episode of Cybersecurity Today, host Jim Love covers a series of alarming cybersecurity incidents. Key highlights include Ernst and Young exposing a massive 4TB database to the open internet, a former L3 Harris executive guilty of selling zero-day exploits to a Russian broker, a sophisticated zero-day spyware campaign hitting Chrome, and a …
…
continue reading
1
Flourish Sound Bytes: Stepping Away to Step Forward - Lessons From Sabbatical with Erik Howell
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27October 30, 2025: After 25 years leading transformational change in healthcare IT, Erik Howell, VP and Head of Technology at Callen-Lorde Community Health Center, made an unconventional decision that most leaders only dream about: he took a sabbatical. Following major EHR implementations, enterprise PMO leadership, and scaling a Silicon Valley AI s…
…
continue reading
1
Is Russia Cracking Down on Cyber Criminals? Fake Death Scams & Exposed AI Servers | Cybersecurity Today
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24In this episode of Cybersecurity Today, host Jim Love explores the potential shift in Russia's stance on cyber criminals, including arrests of major network operators. Discover the latest phishing scams where hackers fabricate death notices to steal passwords, a critical vulnerability exposing thousands of AI servers, and a massive malware campaign…
…
continue reading
1
Pwn2Own Ireland 2025: Major Cybersecurity Revelations & Critical Vulnerabilities
13:45
13:45
Play later
Play later
Lists
Like
Liked
13:45In this episode of Cybersecurity Today, host David Shipley covers the latest updates from the Pwn2Own 2025 event in Ireland, where top hackers earned over $1 million for uncovering 73 zero-day vulnerabilities. Despite significant hype, AI's impact on cybersecurity remains limited. We also dive into a critical Microsoft WSUS flaw under active exploi…
…
continue reading
1
Newsday: Why Constraints Drive Innovation - AI Agents and the Jobs They Can’t Fill
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07October 27, 2025: Bill, Drex, and Sarah discuss the realities of implementing AI agents across organizations. The group tackles uncomfortable questions about workforce displacement, the critical thinking skills being lost to automation, and the massive energy demands threatening AI sustainability. From simplifying complex systems to understanding w…
…
continue reading
1
Navigating Cybersecurity in Small and Medium Businesses with White Hat Hacker Graham Berry
41:10
41:10
Play later
Play later
Lists
Like
Liked
41:10In this episode of Cybersecurity Today, host Jim Love sits down with Graham Barrie a CISO and white hat hacker, to discuss the critical importance of cybersecurity for small and medium-sized businesses. From the moment Berry fell in love with technology through a Tandy TRS 80 to his current role helping businesses secure their data, this conversati…
…
continue reading
1
Cybersecurity Today: New Threats from AI and Code Extensions
8:14
8:14
Play later
Play later
Lists
Like
Liked
8:14In today's episode, host Jim Love discusses the discovery of the 'Glass Worm,' a self-spreading malware hidden in Visual Studio Code extensions downloaded over 35,000 times. The worm, hiding its malicious JavaScript in invisible unicode characters, steals developer credentials and drains crypto wallets. He also covers the security flaws in AI-power…
…
continue reading
1
Ransomware Dominates Cyber Attacks & AI Tools for Cybersecurity | Tech News Update
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01In this episode of Cybersecurity Today, your host Jim Love discusses Microsoft's latest findings on how ransomware and extortion account for over half of all cyber attacks globally, highlighting the shift toward financially driven crimes. Learn about the breach at the Kansas City National Security Campus due to a SharePoint vulnerability and how An…
…
continue reading
1
Flourish: Brainwave Tech Exposes Healthcare's Shocking Gap in Pain Data with Martha Lawrence
43:16
43:16
Play later
Play later
Lists
Like
Liked
43:16October 21, 2025: Martha Lawrence, CEO and Co-Founder of AccendoWave, reveals a stunning gap in healthcare: pain is the number one reason patients seek care, yet no system actually measures it. After observing 300 ER intakes, she discovered the chaos of subjective pain reporting—some rating their pain a "10" while calmly chatting, others ashamed to…
…
continue reading
1
Critical Security Alerts: TikTok Malware & Europol's SIM Farm Takedown
14:42
14:42
Play later
Play later
Lists
Like
Liked
14:42In this episode of Cybersecurity Today, host David Shipley covers the latest developments in cyber threats and law enforcement victories. Topics include: cybercriminals using TikTok videos to disseminate malware through click-fix attacks, Europol shutting down a massive SIM farm powering 49 million fake online accounts, and Microsoft's emergency pa…
…
continue reading
1
Newsday: MFA Isn't Enough and Why Healthcare Can’t Just Hack Back with Preston Duren
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07Multi-factor authentication isn't the bulletproof security measure it once was. Preston Duren, VP of Threat Services at Fortified Health Security, explores how cybercriminals are outsmarting traditional MFA through sophisticated phishing tactics and MFA bombing. The conversation shifts to the debate over platform consolidation—does fewer mean safer…
…
continue reading
1
Exploring the Dark Web: A Conversation with Criminology Researcher David Décary-Hétu
51:19
51:19
Play later
Play later
Lists
Like
Liked
51:19In this episode, Jim Love interviews David Décary-Hétu, a criminologist at the Universite´de Montréal, discussing the dark web and its impact on criminal activity and cybersecurity. They delve into what the dark web is, how it operates, its primary users, and its role in cybercrime. They also explore the dynamics of online criminal networks, challe…
…
continue reading
1
Flourish Sound Bytes: Customer Trust, Grit, and Spartan Races with Rebekah Panepinto
14:21
14:21
Play later
Play later
Lists
Like
Liked
14:21October 16, 2025: Rebekah Panepinto, Enterprise Account Executive at Artisan Studios, has built a powerhouse career in healthcare IT sales by embracing Amazon's leadership principles and proving that grit isn't just a buzzword. From navigating the complexities of healthcare transformation to driving innovation in retail with brands like Shutterfly …
…
continue reading
1
Satellite Internet Data Is Discovered To Be Unencrypted And Easy To Intercept
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44This episode of Cybersecurity Today, hosted by Jim Love, covers several critical topics in the realm of cybersecurity. Researchers found that unencrypted data from satellites is accessible with cheap equipment, leading to potential eavesdropping on sensitive information worldwide. A new botnet campaign is aggressively scanning for unsecured RDP ser…
…
continue reading
1
FBI Shuts Down Breach Forums and New Cyber Threats Unveiled
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45In this episode of Cybersecurity Today, host David Shipley discusses several major events, including the FBI's takedown of the Breach Forums portal. This site was associated with a significant Salesforce data breach and extortion campaign led by groups like Shiny Hunters and Scattered Lapses Hunters. Oracle users are also warned about a new critica…
…
continue reading
1
Newsday: CIO Turnover - Leadership Challenges in a Fast-Paced Era with Laura O’Toole
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51October 13, 2025: Healthcare IT leaders are exhausted, CIO positions remain unfilled for months, and the pressure keeps mounting. In this candid conversation, Laura O'Toole, CEO and Founder of SureTest, explores why traditional CIO roles are transforming faster than organizations can define them. They discuss the widening gap between leadership exp…
…
continue reading
1
The Role and Evolution of Virtual CISOs with Craig Taylor
51:54
51:54
Play later
Play later
Lists
Like
Liked
51:54In this episode of Cybersecurity Today, Jim hosts Craig Taylor, a seasoned virtual Chief Information Security Officer (vCISO) with over 25 years of experience. They discuss the evolution and significance of the vCISO role, Taylor's career path, and the founding of his company, Cyber Hoot, which provides cybersecurity education and vCISO services. T…
…
continue reading
1
Teenage Ransomware Arrest In Day Care Ransom
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Cybersecurity Today: Teenage Ransomware Arrests, GoAnywhere Critical Flaw, and Google AI Vulnerability In this episode of Cybersecurity Today, hosted by Jim Love, two teenagers were arrested in London for a ransomware attack on Kiddo International preschools, involving child data extortion. The show discusses a critical vulnerability in GoAnywhere …
…
continue reading
1
Flourish Sound Bytes: Leadership Lessons from Women Healthcare IT Executives at SOAR 2025
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05October 9, 2025: Join Sarah Richardson live from SOAR 2025 in Boulder, Colorado, as she sits down with remarkable women in healthcare IT and their allies for candid conversations about leadership transformation. Hear personal stories about climbing literal mountaintops in Italy, learning from their children's courage, and standing firm when asked t…
…
continue reading
North Korean Hackers Target Crypto Wealth, LinkedIn Fights Data Scraping, and AI Tools Leak Corporate Data In this episode of Cybersecurity Today, host Jim Love covers the latest cybersecurity headlines including North Korean hackers targeting wealthy crypto investors, LinkedIn suing a firm for creating fake accounts to scrape user data, a massive …
…
continue reading
AI Browsers Turn Rogue, Discord Data Breach, and Surge in Palo Alto Scans In this episode of Cybersecurity Today, host David Shipley discusses several significant cybersecurity concerns. Firstly, researchers at Layer X have uncovered a flaw in the Perplexity Comet AI browser that allows malicious prompts to turn the browser into a data thief with j…
…
continue reading
1
Newsday: IT Expecting 18% Hiring Cut and Innovating Access in the AI World with Bill Willis
28:17
28:17
Play later
Play later
Lists
Like
Liked
28:17October 6, 2025: New research reveals an expected 18% reduction in hiring over the next two years, but this isn't about downsizing—it's about strategic reallocation. Bill Willis, CTO of IDMWORKS, joins to discuss these new breaking statistics. With 62% of organizations prioritizing AI skills over traditional development experience, the industry fac…
…
continue reading
1
October Cybersecurity Month in Review: Insider Threats, AI's Role, and Cybercrime Trends
51:43
51:43
Play later
Play later
Lists
Like
Liked
51:43In this episode of 'Cybersecurity Today: Our Month in Review,' host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of their plans for Cybersecurity Month, including reviving the MapleSEC show and the CIO of the Year award…
…
continue reading
1
Cybersecurity Today: Red Hat Breach, CLOP Targets Oracle, and CISA Cuts Critical Support
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03Cybersecurity Today: Red Hat Breach, CLOP Targets Oracle, and CISA Cuts Critical Support In this episode of Cybersecurity Today, host Jim Love covers a recent breach of Red Hat's consulting GitLab server, highlighting concerns over exposed network maps and tokens. The CLOP extortion gang targets Oracle E-Business Suite clients, demanding ransom for…
…
continue reading
1
Flourish Sound Bytes: Healthcare IT Transformation - Burning It Down to Build It Back
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30October 2, 2025: What if the only way to truly fix healthcare IT is to burn it all down and start over? Join me for a provocative conversation with transformation powerhouse Cheryl Dilley, who's spent 25 years leading enterprise-wide change across healthcare and high tech. We dive into why healthcare's technical debt has reached a breaking point, w…
…
continue reading
Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices. The show highlights efforts by national security agencies in the…
…
continue reading
1
Newsday: The Perfect Storm in Healthcare Cybersecurity: AI, Costs, and Risk with Russell Teague
24:19
24:19
Play later
Play later
Lists
Like
Liked
24:19September 29, 2025: In this episode of Newsday, Drex is joined by Russell Teague of Fortified Health Security for a candid look at the storm brewing in healthcare IT. From the promises and pitfalls of AI to the growing sophistication of cyber threats, they explore how health systems are balancing innovation with risk. The conversation dives into fi…
…
continue reading
Emerging Cybersecurity Threats: Lockbit 5.0, Salesforce AI Vulnerabilities, and China's Cyber Intelligence Advancements In this episode of 'Cybersecurity Today,' host Jim Love discusses the latest cybersecurity threats, including the emergence of Lockbit 5.0 ransomware which can attack multiple platforms simultaneously, and a critical vulnerability…
…
continue reading