logo
episode-header-image
Nov 21
26m 58s

3494: The Fastest Way to Recover Endpoin...

NEIL C. HUGHES
About this episode

Why do entire organisations invest millions building resilient data centres yet leave their endpoints exposed to outages that can last days? That question kept coming back to me during my conversation with James Millington of IGEL at the Now and Next event, because it highlights a gap that most IT leaders still underestimate.

James walked me through the reality he sees every day. Companies have high availability strategies for their servers, cloud platforms, and networks, yet the devices workers rely on remain the weakest point. When ransomware or system failure hits, the response often involves scrambling for spare laptops, calling suppliers, and hoping inventory exists. As James pointed out in our chat, many firms quietly rely on a handful of unused machines sitting in a cupboard. That approach might have worked a decade ago, but today's threat landscape exposes every delay.

Our discussion centred on IGEL's dual boot approach, a fresh way to recover access within minutes by placing IGEL OS alongside Windows on the same device. Instead of waiting hours or even weeks to rebuild machines, organisations can simply switch to a secure environment that restores access to cloud apps, collaboration tools, and virtual desktops. James shared stories of analysts admitting no comparable solution exists, and of customers having light bulb moments as they calculated the true cost of endpoint recovery. The theme running underneath it all was simple. You cannot coordinate your crisis response unless your people have a working device in their hands. Everything else depends on that.

This episode also reflects a wider shift in how organisations think about resilience. Leaders are beginning to question old assumptions about failover, preparation, and what it takes to keep people productive when attacks or outages strike. The conversations I heard throughout Now and Next showed that businesses are realising the endpoint is no longer a peripheral concern. It is the gateway to every service that keeps a company running. When that gateway fails, everything slows.

James also shared lighter moments from his journey. His career began as a DJ, something he has circled back to at IGEL events, and it was fascinating hearing how skills from that era still show up in his approach to communication and timing. It reminded me how varied experiences shape the leaders driving today's conversations around security, SaaS evolution, Zero Trust, and the growing overlap between IT and operational technology.

So here is my question for you. As cyber risks rise and downtime becomes harder to tolerate, how ready do you feel for the disruption that begins at the endpoint? I would love to hear your thoughts.

Tech Talks Daily is Sponsored by NordLayer:

Get the exclusive Black Friday offer: 28% off NordLayer yearly plans with the coupon code: techdaily-28. Valid until December 10th, 2025. Try it risk-free with a 14-day money-back guarantee.

Up next
May 2025
3267: Moving Beyond Attention: Branding in the Age of AI and XR
What happens when marketing, psychology, and emerging tech converge around a single purpose, redefining the relationship between brands and consumers? In today’s episode, I’m joined by Jaime Schwarz, a creative force behind Brand Therapy, The TeamFlow Institute, and MRKD.art, who ... Show More
47m 13s
Today
3496: Why the LoopUp Startup Story Is a Masterclass in Leading Through Uncertainty
<p data-start="0" data-end="330">What happens when your entire market disappears overnight? That was the reality facing LoopUp when the pandemic transformed the way the world communicates.</p> <p data-start="0" data-end="330">In this episode of Tech Talks Daily, I sit down with S ... Show More
25m 14s
Yesterday
3495: How Adebimpe Ibosiola is Bringing Clarity to Digital Transformation in Regulated Industries
<p data-start="292" data-end="926">What happens inside a transformation program when every decision must withstand scrutiny, every dependency carries weight, and every undocumented rule inside a legacy system can change the outcome of an entire initiative? That was the starting p ... Show More
23m 44s
Recommended Episodes
Jul 2025
Exploring the Dark Side of AI: Risks, Consciousness, and Responsibility
The Cybersecurity Today episode revisits a discussion on the risks and implications of AI hosted by Jim Love, with guests Marcel Gagné and John Pinard. They discuss the 'dark side of AI,' covering topics like AI misbehavior, the misuse of AI as a tool, and the importance of data ... Show More
1h 5m
Sep 6
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today
The Future of Cybersecurity: AI, Exploits, and the CVE Database In this special crossover episode of Cybersecurity Today and Hashtag Trending, the hosts explore the use of artificial intelligence (AI) in cybersecurity. The conversation begins with an overview of the ongoing 'arms ... Show More
31m 51s
Feb 2025
AI and Cyber
In this episode of Life of a CISO, Dr. Eric Cole dives into one of the most pressing topics in cybersecurity today—Artificial Intelligence (AI) and its impact on the role of a Chief Information Security Officer (CISO). He emphasizes that the key to being an effective CISO is thin ... Show More
31m 57s
Nov 2024
Bridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet Farlow
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversar ... Show More
27m 17s
Jun 2025
AI Vulnerabilities and the Gentle Singularity: A Deep Dive with Project Synapse
In this thought-provoking episode of Project Synapse, host Jim and his friends Marcel Gagne and John Pinard delve into the complexities of artificial intelligence, especially in the context of cybersecurity. The discussion kicks off by revisiting a blog post by Sam Altman about r ... Show More
1 h