Interviews RSS Feed

Category: Online Technologies, e-Business, Cybersecurity

TJ Fox
TJ Fox joins Jim Blasingame to report on how small businesses can use mobile networks in coordination with cloud computing to accomplish more digital capability that answers customer expectations, especially with 5G expansion.
TJ Fox
TJ Fox joins Jim Blasingame to discuss the acceleration of digital transformation of small businesses during 2020, which is continuing in 2021 with increasing focus on mobile.
TJ Fox
TJ Fox joins Jim Blasingame to discuss the acceleration of digital transformation of small businesses during 2020, which is continuing in 2021 with increasing focus on mobile.
Jim Schreier
Jim Schreier joins Jim Blasingame to reveal that whatever agility will be required of your business in 2021 can be learned by asking customers what they expect from you going forward.
Jim Schreier
Jim Schreier joins Jim Blasingame to discuss the power of agility in the new year because of the adjustments that will have to be made to transition from 2020 and toward the new expectations of customers.
Scott Aurnou
Scott Aurnou joins Jim Blasingame to report on the recent Solar Winds hack of government networks, how bad is this one, and what have we learned from it.
Scott Aurnou
Scott Aurnou joins Jim Blasingame to report on the most recent World War III attack by a foreign government on the U.S. as they used a simple software update from Solar Winds to penetrate thousands of government networks – and the attack is still ongoing.
Scott Aurnou
Scott Aurnou joins Jim Blasingame to report on what opened the door for a recent hack of a Florida city water system, that without the keen eye of an employee, could have poisoned the users of this system.
Caleb Barlow
Caleb Barlow joins Jim Blasingame to reveal some of the steps to take to avoid becoming a ransomware victim, including having redundant files and systems, so you’re in a position to not pay the ransom.
Caleb Barlow
Caleb Barlow joins Jim Blasingame to report on the Solar Winds hack of thousands of government networks, how it happened and how to avoid becoming part of a future “supply chain” attack.

Browse by category