logo
episode-header-image
Jan 22
30m 30s

AI's Infrastructure Emergency: Will Nucl...

SHI
About this episode
SHI explores the collision between AI ambition and energy reality with two guides who see the problem from opposite ends of the timeline. 
Up next
Jan 12
How to Build a Smart City (In Just 4 Months)
State and local governments are under pressure to deliver modern services, but budgets, staffing shortages, and long procurement cycles make innovation feel impossible. In this episode of Innovation Heroes, host Ed McNamara talks with three leaders proving that AI-powered Smart C ... Show More
37m 54s
Dec 18
Unlocking Millions in ROI with Microsoft Copilot and Copilot Chat
Enterprises are spending thousands — sometimes millions — on AI productivity tools. But for many, the big question remains: Are we getting what we paid for? In this episode of Innovation Heroes, SHI's Chief of Staff to the CIO, Brooke Pierantoni, shares how SHI turned Microsoft C ... Show More
32m 48s
Dec 4
From Bad Chatbots to Digital Ambassadors That Actually Work
Most chatbots fall short—slow responses, confusing menus, and frustrated users who abandon the experience. But what if you could replace that with a lifelike, multilingual Digital AI Ambassador — and prove it works in just six weeks? In this episode, host Ed McNamara sits down wi ... Show More
38m 21s
Recommended Episodes
Apr 2025
Pentagon hits fast-forward on software certs.
The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect ove ... Show More
26m 44s
Aug 2025
AlgoSec on AI, Automation, and the Next Era of Network Management
<p>The enterprise network is under pressure like never before. Hybrid environments, cloud migrations, edge deployments, and the sudden surge in AI workloads have made it increasingly difficult to keep application connectivity secure and reliable. The old model of device-by-device ... Show More
22m 30s
Jan 2025
Biden’s final cyber order tackles digital weaknesses.
The Biden administration is finalizing an executive order to bolster U.S. cybersecurity. Ivanti releases emergency updates to address a critical zero-day vulnerability. A critical vulnerability is discovered in Kerio Control firewall software. Palo Alto Networks patches multiple ... Show More
24m 37s
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Nov 2024
3092: Infosec - The Future of Cybersecurity Training and Upskilling
<p>How can the cybersecurity industry bridge the gap in its staggering 4 million open roles? This episode dives into the critical need for workforce development and how unconventional paths into cybersecurity are reshaping the field.</p> <p>Joining us is Keatron Evans, VP of Port ... Show More
20m 9s
Oct 14
The connected world of energy | Special episode from Wood Mackenzie
<p>Host Ed Crooks talks to Jason Liu, Chief Executive of Wood Mackenzie and co-author (with Chief Analyst Simon Flowers) of a new book, Connected, about the fast-changing world of energy. They are also joined by Sunaina Ocalan, formerly Senior Director for Corporate Strategy &amp ... Show More
44m 5s
Apr 2025
Lights out, lines down.
A massive power outage strikes the Iberian Peninsula. Iran says it repelled a “widespread and complex” cyberattack targeting national infrastructure. Researchers find hundreds of SAP NetWeaver systems vulnerable to a critical zero-day. A British retailer tells warehouse workers t ... Show More
24m 38s
May 2025
Hardcoded credentials and hard lessons.
Researchers uncover serious vulnerabilities in the Signal fork reportedly used by top government officials. CISA adds a second Commvault flaw to its Known Exploited Vulnerabilities catalog. xAI exposed a private API key on GitHub for nearly two months. FortiGuard uncovers a cyber ... Show More
23m 46s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
27m 2s
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s