Podcast Episodes

Back to Search
Can the UK ban ransomware payments?

Can the UK ban ransomware payments?


Episode 312


Ransomware payments could soon be a thing of the past in the UK – at least that’s the hope of new controls and mandatory reporting requirements to prevent ransomware from inflicting damage on UK busi…


Published on 3 months, 3 weeks ago

We need to talk about operational technology

We need to talk about operational technology


Episode 311


Cyber attacks can feel a layer detached from the real world. Yes, businesses frequently see IP stolen, get frozen out of systems, or have data wiped by malicious actors. But if you haven’t got your f…


Published on 4 months ago

SPECIAL EDITION: Future-proofing AI infrastructure

SPECIAL EDITION: Future-proofing AI infrastructure


Episode 310


As organizations race to train more and more advanced AI models, as well as deploy existing models at scale, an enormous amount of time and money is being invested in expanding AI infrastructure.

All …


Published on 4 months ago

Google Cloud Summit London 2025: Practical AI deployment

Google Cloud Summit London 2025: Practical AI deployment


Episode 309


The level to which firms are already using AI varies according to technological maturity, strategic focus, and on an industry by industry basis.

But what’s clear is that from the smallest to the large…


Published on 4 months, 1 week ago

Classic episode: AI’s thirsty secret

Classic episode: AI’s thirsty secret


Episode 308


This episode was first broadcast on 20 September 2024.

When people talk about the environmental impacts of data centers, normally the discussion focuses on energy usage. It’s something we’ve talked ab…


Published on 4 months, 2 weeks ago

SPECIAL EDITION: The evolution from robots to agents

SPECIAL EDITION: The evolution from robots to agents


Episode 307


If you’re looking to adopt AI right now, you’ll likely have heard the term ‘AI agents’. These systems can complete complex tasks autonomously, without user input.

But no doubt some of the audience wil…


Published on 4 months, 2 weeks ago

June rundown: 2,000 missing devices and why threat groups are being renamed

June rundown: 2,000 missing devices and why threat groups are being renamed


Episode 308


June has been another busy month for IT and technology news. Whether it’s new naming conventions for cybercriminal groups, Britain’s big tech potential, and national security concerns over lost gover…


Published on 4 months, 3 weeks ago

Are reasoning models fundamentally flawed?

Are reasoning models fundamentally flawed?


Episode 306


AI reasoning models have emerged in the past year as a beacon of hope for large language models (LLMs), with AI developers such as OpenAI, Google, and Anthropic selling them as the go-to solution for…


Published on 4 months, 4 weeks ago

SPECIAL EDITION: Data integration for open table formats

SPECIAL EDITION: Data integration for open table formats



Any modern enterprise generates reams of data, which can be difficult to correctly store, process, and use without the right approach.

This has become even more important in the face of AI. Before any…


Published on 5 months ago

RSAC Conference 2025: The front line of cyber innovation

RSAC Conference 2025: The front line of cyber innovation



In the fast-changing world of cybersecurity, IT leaders have to keep up with evolving threats and new technologies to stay ahead of attackers.

With nation states lending a hand to threat groups with m…


Published on 5 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate