Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Tech Newsday Podcasts

show episodes
 
Technology changes fast, yet leadership is still about people. “Flourish” is your dose of inspiration, growth, and practical wisdom in healthcare IT. Hosted by Sarah Richardson—health system executive and trusted mentor, this channel shares personal stories, career journeys, and leadership lessons from across the industry. Whether it’s a rapid-fire Q&A, a culture-building conversation, or a behind-the-scenes look at someone’s career pivot, each episode helps health leaders thrive in work and ...
  continue reading
 
Loading …
show series
 
In this episode, host David Shipley discusses a significant cybersecurity breach at the University of Pennsylvania, which involved offensive emails sent from legitimate university addresses. The attackers claim to have accessed sensitive data, though their statements remain unverified. Shipley emphasizes the importance of vigilant communication and…
  continue reading
 
November 3, 2025: What are healthcare IT leaders really concerned about? Fresh from three 229 Project summits across the country, Bill Russell, Sarah Richardson, and Drex DeFord pull back the curtain on the most pressing conversations happening right now. From simplifying AI governance with a two-track vendor approach to rethinking hiring strategie…
  continue reading
 
In this episode of 'Cybersecurity Today,' the panel, including Laura Payne from White TOK and David Shipley from Boer on Securities, reviews the major cybersecurity events of October. Key topics include DNS failures at AWS and Microsoft, the rise of AI and its associated security concerns, and several severe cloud and on-premises vulnerabilities in…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love covers a series of alarming cybersecurity incidents. Key highlights include Ernst and Young exposing a massive 4TB database to the open internet, a former L3 Harris executive guilty of selling zero-day exploits to a Russian broker, a sophisticated zero-day spyware campaign hitting Chrome, and a …
  continue reading
 
October 30, 2025: After 25 years leading transformational change in healthcare IT, Erik Howell, VP and Head of Technology at Callen-Lorde Community Health Center, made an unconventional decision that most leaders only dream about: he took a sabbatical. Following major EHR implementations, enterprise PMO leadership, and scaling a Silicon Valley AI s…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love explores the potential shift in Russia's stance on cyber criminals, including arrests of major network operators. Discover the latest phishing scams where hackers fabricate death notices to steal passwords, a critical vulnerability exposing thousands of AI servers, and a massive malware campaign…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley covers the latest updates from the Pwn2Own 2025 event in Ireland, where top hackers earned over $1 million for uncovering 73 zero-day vulnerabilities. Despite significant hype, AI's impact on cybersecurity remains limited. We also dive into a critical Microsoft WSUS flaw under active exploi…
  continue reading
 
October 27, 2025: Bill, Drex, and Sarah discuss the realities of implementing AI agents across organizations. The group tackles uncomfortable questions about workforce displacement, the critical thinking skills being lost to automation, and the massive energy demands threatening AI sustainability. From simplifying complex systems to understanding w…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love sits down with Graham Barrie a CISO and white hat hacker, to discuss the critical importance of cybersecurity for small and medium-sized businesses. From the moment Berry fell in love with technology through a Tandy TRS 80 to his current role helping businesses secure their data, this conversati…
  continue reading
 
In today's episode, host Jim Love discusses the discovery of the 'Glass Worm,' a self-spreading malware hidden in Visual Studio Code extensions downloaded over 35,000 times. The worm, hiding its malicious JavaScript in invisible unicode characters, steals developer credentials and drains crypto wallets. He also covers the security flaws in AI-power…
  continue reading
 
In this episode of Cybersecurity Today, your host Jim Love discusses Microsoft's latest findings on how ransomware and extortion account for over half of all cyber attacks globally, highlighting the shift toward financially driven crimes. Learn about the breach at the Kansas City National Security Campus due to a SharePoint vulnerability and how An…
  continue reading
 
October 21, 2025: Martha Lawrence, CEO and Co-Founder of AccendoWave, reveals a stunning gap in healthcare: pain is the number one reason patients seek care, yet no system actually measures it. After observing 300 ER intakes, she discovered the chaos of subjective pain reporting—some rating their pain a "10" while calmly chatting, others ashamed to…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley covers the latest developments in cyber threats and law enforcement victories. Topics include: cybercriminals using TikTok videos to disseminate malware through click-fix attacks, Europol shutting down a massive SIM farm powering 49 million fake online accounts, and Microsoft's emergency pa…
  continue reading
 
Multi-factor authentication isn't the bulletproof security measure it once was. Preston Duren, VP of Threat Services at Fortified Health Security, explores how cybercriminals are outsmarting traditional MFA through sophisticated phishing tactics and MFA bombing. The conversation shifts to the debate over platform consolidation—does fewer mean safer…
  continue reading
 
In this episode, Jim Love interviews David Décary-Hétu, a criminologist at the Universite´de Montréal, discussing the dark web and its impact on criminal activity and cybersecurity. They delve into what the dark web is, how it operates, its primary users, and its role in cybercrime. They also explore the dynamics of online criminal networks, challe…
  continue reading
 
October 16, 2025: Rebekah Panepinto, Enterprise Account Executive at Artisan Studios, has built a powerhouse career in healthcare IT sales by embracing Amazon's leadership principles and proving that grit isn't just a buzzword. From navigating the complexities of healthcare transformation to driving innovation in retail with brands like Shutterfly …
  continue reading
 
This episode of Cybersecurity Today, hosted by Jim Love, covers several critical topics in the realm of cybersecurity. Researchers found that unencrypted data from satellites is accessible with cheap equipment, leading to potential eavesdropping on sensitive information worldwide. A new botnet campaign is aggressively scanning for unsecured RDP ser…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley discusses several major events, including the FBI's takedown of the Breach Forums portal. This site was associated with a significant Salesforce data breach and extortion campaign led by groups like Shiny Hunters and Scattered Lapses Hunters. Oracle users are also warned about a new critica…
  continue reading
 
October 13, 2025: Healthcare IT leaders are exhausted, CIO positions remain unfilled for months, and the pressure keeps mounting. In this candid conversation, Laura O'Toole, CEO and Founder of SureTest, explores why traditional CIO roles are transforming faster than organizations can define them. They discuss the widening gap between leadership exp…
  continue reading
 
In this episode of Cybersecurity Today, Jim hosts Craig Taylor, a seasoned virtual Chief Information Security Officer (vCISO) with over 25 years of experience. They discuss the evolution and significance of the vCISO role, Taylor's career path, and the founding of his company, Cyber Hoot, which provides cybersecurity education and vCISO services. T…
  continue reading
 
Cybersecurity Today: Teenage Ransomware Arrests, GoAnywhere Critical Flaw, and Google AI Vulnerability In this episode of Cybersecurity Today, hosted by Jim Love, two teenagers were arrested in London for a ransomware attack on Kiddo International preschools, involving child data extortion. The show discusses a critical vulnerability in GoAnywhere …
  continue reading
 
October 9, 2025: Join Sarah Richardson live from SOAR 2025 in Boulder, Colorado, as she sits down with remarkable women in healthcare IT and their allies for candid conversations about leadership transformation. Hear personal stories about climbing literal mountaintops in Italy, learning from their children's courage, and standing firm when asked t…
  continue reading
 
North Korean Hackers Target Crypto Wealth, LinkedIn Fights Data Scraping, and AI Tools Leak Corporate Data In this episode of Cybersecurity Today, host Jim Love covers the latest cybersecurity headlines including North Korean hackers targeting wealthy crypto investors, LinkedIn suing a firm for creating fake accounts to scrape user data, a massive …
  continue reading
 
AI Browsers Turn Rogue, Discord Data Breach, and Surge in Palo Alto Scans In this episode of Cybersecurity Today, host David Shipley discusses several significant cybersecurity concerns. Firstly, researchers at Layer X have uncovered a flaw in the Perplexity Comet AI browser that allows malicious prompts to turn the browser into a data thief with j…
  continue reading
 
October 6, 2025: New research reveals an expected 18% reduction in hiring over the next two years, but this isn't about downsizing—it's about strategic reallocation. Bill Willis, CTO of IDMWORKS, joins to discuss these new breaking statistics. With 62% of organizations prioritizing AI skills over traditional development experience, the industry fac…
  continue reading
 
In this episode of 'Cybersecurity Today: Our Month in Review,' host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of their plans for Cybersecurity Month, including reviving the MapleSEC show and the CIO of the Year award…
  continue reading
 
Cybersecurity Today: Red Hat Breach, CLOP Targets Oracle, and CISA Cuts Critical Support In this episode of Cybersecurity Today, host Jim Love covers a recent breach of Red Hat's consulting GitLab server, highlighting concerns over exposed network maps and tokens. The CLOP extortion gang targets Oracle E-Business Suite clients, demanding ransom for…
  continue reading
 
October 2, 2025: What if the only way to truly fix healthcare IT is to burn it all down and start over? Join me for a provocative conversation with transformation powerhouse Cheryl Dilley, who's spent 25 years leading enterprise-wide change across healthcare and high tech. We dive into why healthcare's technical debt has reached a breaking point, w…
  continue reading
 
Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices. The show highlights efforts by national security agencies in the…
  continue reading
 
September 29, 2025: In this episode of Newsday, Drex is joined by Russell Teague of Fortified Health Security for a candid look at the storm brewing in healthcare IT. From the promises and pitfalls of AI to the growing sophistication of cyber threats, they explore how health systems are balancing innovation with risk. The conversation dives into fi…
  continue reading
 
Emerging Cybersecurity Threats: Lockbit 5.0, Salesforce AI Vulnerabilities, and China's Cyber Intelligence Advancements In this episode of 'Cybersecurity Today,' host Jim Love discusses the latest cybersecurity threats, including the emergence of Lockbit 5.0 ransomware which can attack multiple platforms simultaneously, and a critical vulnerability…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play