2581: Bridging the Gap With CompTIA : Cybersecurity Skills and Training

2581: Bridging the Gap With CompTIA : Cyberse...

Up next

3267: Moving Beyond Attention: Branding in the Age of AI and XR

What happens when marketing, psychology, and emerging tech converge around a single purpose, redefining the relationship between brands and consumers? In today’s episode, I’m joined by Jaime Schwarz, a creative force behind Brand Therapy, The TeamFlow Institute, and MRKD.art, who ...  Show more

3534: Agentic AI at Scale: What 120 Million Monthly Conversations Really Mean

What does it really mean when AI moves from answering questions to making decisions that affect real people, real money, and real outcomes? In this episode of Tech Talks Daily, I'm joined by Joe Kim, CEO of Druid AI, for a grounded conversation about why agentic AI is becoming th ...  Show more

Recommended Episodes

Analyzing the Impact of A.I. and Technology on Society and Cybersecurity
IT Visionaries

Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. 

Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's ...

  Show more

PagerDuty’s CTO on the Crux of IT Operations
Tech Disruptors

One of the critical components of the software value chain is resiliency, or how quickly a system can recover with the fewest people affected or noticing, says PagerDuty Chief Technology Officer Tim Armandpour. He joins Sunil Rajgopal, Bloomberg Intelligence’s senior software ana ...  Show more

World War III
Life of a CISO with Dr. Eric Cole

In this episode of "Life of a CISO" with Dr. Eric Cole, he discusses the crucial role of mindset over technical skills in cybersecurity success. Dr. Cole emphasizes believing in one's worthiness for advancement and financial success. He also highlights the reality of cyber warfar ...  Show more

The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
IT Visionaries

The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ...

  Show more