Welcome to Utilizing AI, the podcast about the application of artificial intelligence from The Futurum Group. This podcast features a variety of perspectives to discuss practical applications, use cases, and various sectors of AI. New episodes post every Wednesday hosted by Stephen Foskett of Tech Field Day, Nick Patience and Brad Shimmin of The Futurum Group, and Mike Vizard and Jon Swartz of Techstrong AI.
…
continue reading
The Futurum Group Podcasts
The Agents of Dev Podcast explores how software developers build and will build applications in the era of AI, agents, and agentic technologies. Futurum Research analysts Mitch Ashley and Brad Shimmin bring their dual perspectives as industry analysts and practitioners to unpack what industry moves, vendor strategies, and on-the-ground engineering realities signal about the future of enterprise software. Each episode explores innovations, opportunities, and even oopsies to inform us about ho ...
…
continue reading
Security Boulevard – A Futurum Podcast is The Futurum Group’s weekly cybersecurity show and the companion to SecurityBoulevard.com. It’s hosted by Tom Hollingsworth of Tech Field Day, Mitch Ashley and Fernando Montenegro of The Futurum Group, and Alan Shimel of the Techstrong Group. New episodes post every Tuesday on the Security Boulevard YouTube channel, podcast applications, the Security Boulevard website, Techstrong.TV, and the Techstrong TV app.
…
continue reading
Futurum Tech Webcast Leading tech analysts from The Futurum Group share weekly deep dives on the latest tech news, new products and services, mergers, earnings, regulations, and more. The Futurum Tech Webcast will keep you current on what's happening in the tech space — from startups to industry leaders, emerging tech, and what's ahead for industries across the globe, along with interviews with tech industry leaders and experts. Subscribe now and stay connected to this exciting journey into ...
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
1
Unveiling Google Gemini Three: The Future of AI | Utilizing AI Podcast Ep. 5
37:07
37:07
Play later
Play later
Lists
Like
Liked
37:07Google’s Gemini Three signals a major shift in AI, moving from passive understanding to real, actionable intelligence. Stephen Foskett, Nick Patience, and Brad Shimmin break down the model’s new capabilities, including advanced image generation, coding assistance, and enterprise-focused features. The panel digs into how generative AI is reshaping s…
…
continue reading
1
Cloud Security Challenges & Strategies for Modern Teams | Security Boulevard Ep. 11
35:06
35:06
Play later
Play later
Lists
Like
Liked
35:06Cloud security keeps shifting under everyone’s feet, and organizations are scrambling to keep up. In Ep. 11 of the Security Boulevard Podcast, Tom Hollingsworth, Fernando Montenegro, and Mitch Ashley dig into what modern teams actually face: expanding attack surfaces, tangled interdependencies, regulatory pressure, and the constant need for better …
…
continue reading
1
The Future of Software Development: Agentic AI, Dev Trends & AWS Insights | Agents of Dev Ep. 1
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52Agents of Dev Episode 1 dives into the future of software development with Mitch Ashley and Brad Shimmin. They break down how AI, agentic workflows, and modern analytics are reshaping the dev ecosystem. From AWS re:Invent insights to evolving engineering practices, this episode explores innovation, trust in tech, and what’s coming next for develope…
…
continue reading
1
Service Outages & Cybersecurity Failures — Lessons from Cloudflare | Security Boulevard Ep. 10
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09In Episode 10 of the Security Boulevard Podcast, Tom Hollingsworth, Fernando Montenegro, and Mitch Ashley break down the real impact of major service outages — including recent failures at Cloudflare — and what they reveal about modern cybersecurity challenges. The discussion covers why resilience matters, how economic pressures shape security deci…
…
continue reading
1
How On-Device Intelligence Is Reshaping the Future of AI | Utilizing AI Ep. 4
36:39
36:39
Play later
Play later
Lists
Like
Liked
36:39AI’s future won’t be built in massive data centers alone—it’s shifting quietly into the devices we use every day. This episode of Utilizing AI features Stephen Foskett of Tech Field Day, The Futurum Group’s Olivier Blanchard, and Techstrong AI’s Mike Vizard, offering a sharp look at the move from cloud-only AI to a smarter hybrid model spanning dev…
…
continue reading
1
Trust, Risk, and the New Threat Landscape with Eric Carter of SysDig | Security Boulevard Ep. 9
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14AI is reshaping cybersecurity faster than most organizations can adapt. In Ep. 9 of the Security Boulevard Podcast, Emanuela Zaccone and Eric Carter of Sysdig join Tech Field Day's Tom Hollingsworth and The Futurum Group's Fernando Montenegro to examine how AI is transforming cyber risk, decision-making, and business resilience. They discuss the ra…
…
continue reading
1
AI’s Impact on Society, Business, and Regulation | Utilizing AI Podcast Ep. 3
31:22
31:22
Play later
Play later
Lists
Like
Liked
31:22Stephen Foskett, Nick Patience, and Mike Vizard break down how AI is reshaping society and the business world. The episode covers evolving regulatory models, including the EU’s strict approach, and how cultural attitudes influence adoption. The discussion digs into data privacy pressures, the growing role of generative AI in business workflows, and…
…
continue reading
1
AI in Cybersecurity: When Defense Tools Become Threats | Security Boulevard Ep. 8
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37AI is reshaping cybersecurity on both sides of the fight. In Ep. 8 of the Security Boulevard Podcast, Tom Hollingsworth, Jack Poller, and Ed Weadon examine how AI strengthens defense while also creating new attack vectors. They break down recent failures, long-term gaps in AI security, and the growing responsibility on AI developers to build safer …
…
continue reading
1
How AI Is Changing Daily Life and Enterprise
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14On this episode of the Utilizing AI Podcast, Stephen Foskett, Brad Shimmin, and Olivier Blanchard unpack how artificial intelligence is moving from the lab into everyday life and enterprise systems. They discuss how AI powers smart devices, accelerates edge computing, and improves enterprise performance through faster processing and stronger securi…
…
continue reading
1
CISSP Challenges & Continuing Education in Cybersecurity | Security Boulevard Ep. 7
37:11
37:11
Play later
Play later
Lists
Like
Liked
37:11In Episode 7 of the Security Boulevard Podcast, Tom Hollingsworth of Tech Field Day, Fernando Montenegro of The Futurum Group, and networking and security expert Ed Weadon break down what it really takes to advance a cybersecurity career today. They discuss the demands of CISSP certification, the frustration of tracking continuing-education credits…
…
continue reading
1
Practical AI for Business Growth | Utilizing AI Ep. 1
33:55
33:55
Play later
Play later
Lists
Like
Liked
33:55Stephen Foskett and Nick Patience launch Utilizing AI, a new podcast focused on how companies are using artificial intelligence to improve efficiency, decision-making, and innovation. The conversation covers real business outcomes from AI adoption, upcoming AI Field Day events, and insights from The Futurum Group’s AI practice. Viewers are invited …
…
continue reading
1
Evolving Ransomware Tactics and Cybersecurity Strategies | Security Boulevard Ep. 6
29:26
29:26
Play later
Play later
Lists
Like
Liked
29:26In Ep. 6 of the Security Boulevard Podcast, Tom Hollingsworth, Mitch Ashley, and Alan Shimel discuss how ransomware tactics are shifting. Attackers are using AI-driven phishing to breach organizations while ransom payments decline as defenses improve. Malicious packages continue to exploit software vulnerabilities, and government hacking tools add …
…
continue reading
1
AI's Transformative Role in Cybersecurity | Security Boulevard Podcast Ep. 5
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43Will Agentic AI replace security teams? In this episode of the Security Boulevard Podcast, hosts Mitch Ashley, Tom Hollingsworth, and Fernando Montenegro explore how AI is reshaping cybersecurity — from large language models (LLMs) to autonomous agentic AI systems. Discover how professionals are integrating AI into modern security operations, why c…
…
continue reading
1
Nation State Cyber Attacks and the New Era of Cyber Warfare | Security Boulevard Ep. 4
32:13
32:13
Play later
Play later
Lists
Like
Liked
32:13In Episode. 4 of the Security Boulevard Podcast, Mitch Ashley, Tom Hollingsworth, and Fernando Montenegro dig into the rising threat of nation state cyber attacks and the growing sophistication of global cyber warfare. They discuss: The evolution from small-scale hacks to state-backed intelligence operations Major breaches like F5 and what they rev…
…
continue reading
1
MCP and the Future of Cybersecurity | Security Boulevard Ep. 3
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07In Ep. 3 of the Security Boulevard Podcast, Alan Shimel, Tom Hollingsworth, and Scott Robohn discuss MCP and its growing influence in cybersecurity. The panel unpacks: How MCP redefines traditional security models The importance of secure implementation and API security The rise of autonomous systems and agentic AI The challenge of building trust i…
…
continue reading
1
Cybersecurity and the Internet of Things | Security Boulevard Ep. 2
33:12
33:12
Play later
Play later
Lists
Like
Liked
33:12In Ep. 2 of the Security Boulevard Podcast, Tom Hollingsworth, Fernando Montenegro, and Kate Scarcella discuss how the rise of IoT devices is changing cybersecurity across both consumer and enterprise environments. They cover: Security and privacy risks from connected devices How consumer behavior influences enterprise protection Economic implicati…
…
continue reading
1
AI, Ransomware & User Empowerment | Security Boulevard Ep. 1
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53The Security Boulevard Podcast is back! 🎙️ In Ep. 1, hosts Tom Hollingsworth, Fernando Montenegro, and Mitch Ashley explore today’s most urgent cybersecurity challenges. They discuss: How AI is reshaping security practices The evolving complexity of ransomware Why user empowerment is critical Insights from Security Field Day Upcoming research on so…
…
continue reading
1
Safebooks AI’s Ahikam Kaufman on Why CFOs Need Company-Specific AI Models for Fraud Detection
27:27
27:27
Play later
Play later
Lists
Like
Liked
27:27Unlike CISOs who work with consistent vulnerabilities across cloud environments, CFOs face company-specific financial processes that change constantly, making automation historically complex to solve before the AI era. Ahikam Kaufman, CEO & CFO of Safebooks AI, explains why machine learning is the only viable solution to detect sophisticated embezz…
…
continue reading
1
Marsh's Sjaak Schouteren on the Golden Rule of Risk Assessment
35:28
35:28
Play later
Play later
Lists
Like
Liked
35:28Cyber insurance has transformed from a liability-focused niche product into a comprehensive business continuity tool, but widespread misconceptions continue to prevent organizations from maximizing its strategic value. Sjaak Schouteren, Cyber Growth Leader - Europe at Marsh, offers David how they combine risk quantification with business-focused co…
…
continue reading
1
SIG's Rob van der Veer on Why "Starting Small" with AI Security Might Fail
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01What happens when someone who's been building AI systems for 33 years confronts the security chaos of today's AI boom? Rob van der Veer, Chief AI Officer at Software Improvement Group (SIG), spotlights how organizations are making critical mistakes by starting small with AI security — exactly the opposite of what they should do. From his early work…
…
continue reading
1
Vigilocity's Karim Hijazi on Supply Chain Threat Intelligence
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51Karim Hijazi’s approach to threat hunting challenges conventional wisdom about endpoint security by proving that some of the most critical intelligence exists outside organizational networks. As Founder & CEO of Vigilocity, his 30-year journey from the legendary Mariposa botnet investigation to building external monitoring capabilities demonstrates…
…
continue reading
1
CyberHoot's Craig Taylor on Why Fear-Based Phishing Training Fails
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22Psychology beats punishment when building human firewalls. Craig Taylor, CEO & Co-founder of CyberHoot, brings 30 years of cybersecurity experience and a psychology background to challenge the industry's fear-based training approach. His methodology replaces "gotcha" phishing simulations with positive reinforcement systems that teach users to ident…
…
continue reading
1
The Futurum Group's Fernando Montenegro on the OODA Loop Approach to Security Strategy
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04What happens when you apply economic principles like opportunity cost and comparative advantage to cybersecurity decision-making? Fernando Montenegro, VP & Practice Lead of Cybersecurity at The Futurum Group, demonstrates how viewing security through an economics lens reveals critical blind spots most practitioners miss. His approach transforms how…
…
continue reading
1
T. Rowe Price’s PJ Asghari’s "What, So What, Now What" Framework for Threat Intel
25:34
25:34
Play later
Play later
Lists
Like
Liked
25:34What does it take to transform a traditional event-driven SOC into an intelligence-driven operation that actually moves the needle? At T. Rowe Price, it meant abandoning the "spray and pray" approach to threat detection and building a systematic framework that prioritizes threats based on actual business risk rather than industry hype. PJ Asghari, …
…
continue reading
1
Transcend's Aimee Cardwell on Turning Security into a Growth Driver
27:42
27:42
Play later
Play later
Lists
Like
Liked
27:42Most security leaders position themselves as guardians against risk, but Aimee Cardwell, CISO in Residence at Transcend and Board Member at WEX, built her reputation on a different approach: balancing risk to accelerate business growth. Her unconventional path from Fortune 5 CIO to CISO of a 1,200-person security team at UnitedHealth Group showcase…
…
continue reading
1
Digital Asset Redemption's Steve Baer on Criminal Business Models
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42The economics of ransomware reveal a sophisticated criminal enterprise that most security leaders dramatically underestimate. Steve Baer, Field CISO at Digital Asset Redemption, operates at the intersection of cybercrime and legitimate business, where his team's human intelligence gathering in Dark Web communities provides early warning systems tha…
…
continue reading
1
McAfee's Manisha Agarwal-Shah on Testing Ransomware Plans Before You Need Them
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37Most security leaders are fighting yesterday's ransomware war while today's attackers have moved to data exfiltration and reputation destruction. Manisha Agarwal-Shah, Deputy CISO at McAfee, brings 18 years of cybersecurity experience from consulting through AWS to explore why traditional ransomware defenses miss the mark against modern threat acto…
…
continue reading
1
Team Cymru's Threat Researchers on Operation Endgame Intelligence
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54Team Cymru's threat researchers have spent years developing an almost psychological understanding of cybercriminals, tracking their behavioral patterns alongside technical infrastructure to predict where attacks will emerge before they happen. Josh and Abigail share with David how their multi-year tracking of Russian cybercrime groups enabled criti…
…
continue reading
1
Lemonade's Jonathan Jaffe on Trading Feedback for Security Technology
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46Jonathan Jaffe, CISO at Lemonade, has built what he predicts will be "the perfect AI system" using agent orchestration to automate vulnerability management at machine speed, eliminating the developer burden of false positive security alerts. His unconventional approach to security combines lessons learned from practicing law against major tech comp…
…
continue reading
1
Digital Turbine's Vivek Menon on AI Acceleration vs Attack Expansion
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16The security industry's obsession with cutting-edge threats often overshadows a more pressing reality: the vast majority of organizations are still mastering basic AI implementation. Vivek Menon, CISO & Head of Data at Digital Turbine, brings his insights from the RSA expo floor to share why the agentic AI security rush may be premature, while high…
…
continue reading
1
Digital Asset Redemption's Steve Baer on Why Half of Ransomware Victims Shouldn't Pay
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Most organizations approach ransomware as a technical problem, but Steve Baer, Field CISO at Digital Asset Redemption, has built his career understanding it as fundamentally human. His team's approach highlights why traditional cybersecurity tools fall short against motivated human adversaries and how proactive intelligence gathering can prevent in…
…
continue reading
1
Cybermindz’s Mark Alba on Military PTSD Protocols to Treat Security Burnout
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04The cybersecurity industry has talked extensively about burnout, but Mark Alba, Managing Director of Cybermindz, is taking an unprecedented scientific approach to both measuring and treating it. In this special RSA episode, Mark tells David how his team applies military-grade psychological protocols originally developed for PTSD treatment to addres…
…
continue reading
1
GigaOm’s Howard Holton on Why AI Will Be the OS of Security Work
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43The cybersecurity industry has witnessed numerous technology waves, but AI's integration at RSA 2025 signals something different from past hype cycles. Howard Holton, Chief Technology Officer at GigaOm, observed AI adoption across virtually every vendor booth, yet argues this represents genuine transformation rather than superficial marketing. His …
…
continue reading
1
Online Business Systems' Jeff Man on PCI 4.0's Impact
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31The cybersecurity industry has long operated on fear-based selling and vendor promises that rarely align with practical implementation needs. Jeff Man, Sr. Information Security Evangelist at Online Business Systems, brings a pragmatic perspective after years of navigating compliance requirements and advising organizations from Fortune 100 enterpris…
…
continue reading