Illuminator

Spotlight Analyst Relations

Join hosts Josh Carlton and Joe Miller as they explore cutting-edge industry research and insights, decoding the latest technology trends and innovations shaping our digital future.

Episodes

  1. 02/03/2025

    The Industrial IoT Transformation

    Sure, AI is everywhere... But how much of the hype translates into real value for industrial operations? In this episode of ILLUMINATOR, Josh sat down with Malavika Tohani and Joe Lamming of Verdantix to explore the evolving role of AI, digital twins, and IoT in manufacturing and industrial settings. They discuss how AI has been embedded in industrial workflows for years, powering predictive maintenance, anomaly detection, and process optimization. The conversation also examines digital twins—whether they’re truly bridging the gap between IT and OT or still in the early stages of adoption. Last but not least, Mal and Joe dig into the challenges companies face when implementing AI, from data trust issues to the complexity of integration. This episode offers a grounded, research-backed look at AI in industrial transformation, cutting through the noise to explore what’s working today and what’s still on the horizon. For industrial leaders, technology strategists, and AI enthusiasts, listen in to connect the dots between innovation and real-world application. References Heavy Asset Industries Increase Spend On Third-Party Consultants For GenAI ProjectsAI And Data Management: Revolutionizing Industrial Transformation In 2025Seeq’s $50M Series D Suggests Continued Investor Confidence In GenAI For Industrial AnalyticsFive GenAI-Enabled Low-Code Industrial Analytics Use Cases Firms Can Get Started With TodayAssai Acquires Viewport.ai As Race For AI-Driven Engineering Document Management Intensifies Verdantix Research (available through Vantage platform, free for practitioners): Green Quadrant: Industrial Data Management Solutions 2025Market Insight: 10 Predictions For Applied AI Technologies In 2025Market Insight: Practical High-Value Industrial Use Cases For Generative AI In 2024Strategic Focus: Low-Code Industrial Analytics Enabled By Generative AI

    34 min
  2. 09/02/2024

    The Data Breach Problem

    In today's episode of ILLUMINATOR, Josh sits down with Chase Cunningham (VP of Security Market Research at G2) to delve into the escalating crisis of data breaches. Josh, Joe, and Chase explore why data breaches are becoming more frequent, the evolving tactics of cyber attackers, and the limitations of current cybersecurity measures. Chase shares his insights on the importance of adopting a Zero Trust strategy, the pitfalls of relying on compliance over security, and practical steps CISOs can take to protect their organizations. Plus, Josh and Joe review some basic need-to-know information and details of the highest profile breaches of the year, including 23andMe, MOVEit, the CrowdStrike incident, the 2023 Microsoft attacks, the AT&T breaches, and more. Don’t miss this crucial conversation on safeguarding your digital life from one of the original masterminds behind Zero Trust. About today's special guest: Dr. Chase Cunningham, better known online as “Dr. Zero Trust,” is a retired Navy Chief Cryptologist with over 20 years of experience in Cyber Forensic and Analytic Operations. Chase has worked in some of the most operationally demanding work centers in the world, including the NSA, CIA, FBI, and other government agencies. He is currently the Vice President of Security Market Research at G2, and hosts his own show, the DrZeroTrust podcast. Notes & References “The Continued Threat To Personal Data: Key Factors Behind the 2023 Increase” by Dr. Stuart Madnick of MIT (study commissioned by Apple)Chase's article: "Why data breaches have been normalized and 6 things CISOs can do to prevent them"Chase’s newest book on leadership, How NOT to leadChase on LinkedIn Glossary of Terms Red/Blue/Purple Team: Red teams are offensive security professionals that test an organization’s security by mimicking the tools and techniques used by real-world attackers. The red team attempts to bypass the blue team’s defenses while avoiding detection. Blue teams are internal IT security teams that defend an organization from attackers, including red teamers, and are constantly working to improve their organization’s cybersecurity. Purple teams combine these tools and techniques to simulate both offensive and defensive methods.Zero Day: A zero-day vulnerability is a security flaw in software, hardware, or firmware that is unknown to the vendor and can be exploited before a patch is available. The term "zero-day" refers to the time the vendor has to prepare a patch after the vulnerability is discovered.Self-Sovereign Identity (SSI): an identity management model that enables organizations to create fraud-proof Verifiable Credentials and instantly verify the authenticity of those credential. It gives individuals full ownership and control of their digital identities without relying on a central authority.

    42 min

Ratings & Reviews

5
out of 5
7 Ratings

About

Join hosts Josh Carlton and Joe Miller as they explore cutting-edge industry research and insights, decoding the latest technology trends and innovations shaping our digital future.