Folgen

  • HS131: Cybersecurity Strategy: Defending Against AI
    May 5 2026
    Enterprise strategists need to worry about securing their environments against AI-powered attacks. John and Johna discuss what cybersecurity and IT leaders need to consider in developing a cybersecurity strategy that addresses AI-augmented threats as well as how to use AI defensively … and why AI attacks can be like a duckbilled platypus. AdSpot Sponsor: Meter... Read more »
    Mehr anzeigen Weniger anzeigen
    35 Min.
  • HS130: Wait, AI Doesn’t Secure Itself? Developing an AI Security Strategy
    Apr 21 2026
    Your enterprise better have a cybersecurity strategy for AI. But where to start? Everywhere! Securing AI means securing all the AI layers and throughout the lifecycle: data, model, and applications, in training and in inference. Johna and John discuss what your strategy must address and how to get support for it because, of course, it’s... Read more »
    Mehr anzeigen Weniger anzeigen
    38 Min.
  • HS128: Planning for an AI Bubble Burst
    Apr 10 2026
    How should you shape your IT strategy around the possibility–or is it probability–that the AI economy is a true bubble and will burst soon? John Burke and Johna Johnson revisit the signs indicating that an AI bubble is in full swing and pointing to the potential for collapse in the near term. Doomsaying having been... Read more »
    Mehr anzeigen Weniger anzeigen
    34 Min.
  • HS129: Achieving Operational Excellence
    Apr 7 2026
    The best strategy in the world won’t succeed if a team falters operationally. But what is operational excellence, and what does it take to acquire it? Cal Poly faculty member (and former Intel strategist) John Miranda shares his thinking with our Heavy Strategy listeners. He discusses concepts like the theory of constraints, root-cause analysis, and... Read more »
    Mehr anzeigen Weniger anzeigen
    40 Min.
  • HS127: You’re Not Thinking About Your Network the Way You Should (Sponsored)
    Mar 17 2026
    Mav Turner, Chief Product Officer at Kentik, joins John Burke and Drew Conry-Murray for an in-depth conversation on the importance of deep visibility into enterprise networks. As networks grow more complex and stretch from on-prem and WAN to multi-cloud and edge locations, this sponsored discussion explores how good visibility supports everything from daily operations to... Read more »
    Mehr anzeigen Weniger anzeigen
    38 Min.
  • HS126: AI Everything, AI Everywhere, AI All At Once
    Mar 10 2026
    At CES in January, NVIDIA, AMD, Siemens and others spun elaborate tales of a world suffused with AI: AI in the cloud, AI at the desktop, AI in the factory, AI underneath enterprise software and as the UI for enterprise software and agentically accomplishing anything and everything in a world of embodied, physical AI. Johna... Read more »
    Mehr anzeigen Weniger anzeigen
    40 Min.
  • HS125: How to Choose an IT Hiring Service
    Feb 24 2026
    Every employer knows to conduct background checks. However, conducting background checks on IT professionals requires an extra layer of verification, given the privileged access they typically have to IT systems and tools. Moreover, in this AI era, background checks need to be deeper and more effective than before–in the past we didn’t need to verify... Read more »
    Mehr anzeigen Weniger anzeigen
    33 Min.
  • HS124: Administration DDoS on AI Regulation
    Feb 10 2026
    The recent U.S. Executive Order 14365, Ensuring a National Policy Framework for Artificial Intelligence, is the administration’s latest attempt to prevent the enforcement of most of the AI laws passed in individual US states. Because it is only an executive order (EO), it cannot directly nullify, supersede, forestall, or put a pause on state-level laws.... Read more »
    Mehr anzeigen Weniger anzeigen
    44 Min.