
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Most discussed topics
Brands & references
Est. Listeners
Based on iTunes & Spotify (publisher stats).
- Per-Episode Audience
Est. listeners per new episode within ~30 days
10,001 - 25,000 - Monthly Reach
Unique listeners across all episodes (30 days)
25,001 - 75,000 - Active Followers
Loyal subscribers who consistently listen
15,001 - 40,000
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
From 1 epsHost
Recent guests
Recent episodes
Amazon’s $100B AI Play, SpaceX’s Coding Bet, and Google’s New TPUs
Apr 27, 2026
27m 29s
NIST Is Falling Behind? CVE Overload, AI, and the Future of Vulnerability Tracking
Apr 24, 2026
Unknown duration
Amazon’s AI Power Play, Copilot Goes Agentic, and Netgear Wins Big
Apr 20, 2026
Unknown duration
Open a PDF, Lose Your System: Adobe Zero-Day Exploit (CVE-2026-34621)
Apr 17, 2026
Unknown duration
Docker Security Nightmare? CVE-2026-34040 Lets Attackers Escape Containers
Apr 10, 2026
Unknown duration
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Topics | Guests | Brands | Places | Keywords | Sponsor | Length | |
|---|---|---|---|---|---|---|---|---|---|
| 4/27/26 | ![]() Amazon’s $100B AI Play, SpaceX’s Coding Bet, and Google’s New TPUs✨ | AIcloud computing+3 | Lou | CursorAmazon+4 | — | AmazonAnthropic+6 | — | 27m 29s | |
| 4/24/26 | ![]() NIST Is Falling Behind? CVE Overload, AI, and the Future of Vulnerability Tracking | NIST is changing how it handles CVEs after a massive surge in vulnerability submissions—and it could reshape how enterprise IT teams manage risk. In this episode of IT SPARC Cast – CVE of the Week, John and Lou break down what this shift means, the risks of incomplete vulnerability data, and how AI-driven attacks are forcing a new security reality.⸻📄 Show Notes🚨 CVE of the Week (Special Edition): NIST Scaling Back CVE EnrichmentThis week, instead of a single CVE, we’re covering a major shift in how vulnerabilities are tracked and analyzed.The National Institute of Standards and Technology (NIST) is scaling back its enrichment of CVEs due to a massive surge in vulnerability submissions—up 263% since 2020.⸻🔍 What’s ChangingNIST will no longer fully analyze every CVE submitted to the National Vulnerability Database (NVD).Instead, they will prioritize:Known exploited vulnerabilitiesCritical/high-impact vulnerabilitiesSoftware used by government systemsLower-priority CVEs will still be listed—but:❌ No CVSS score❌ Limited or no analysis❌ Minimal context on impact or exploitability⸻⚠️ Why This MattersCVE “enrichment” is what makes vulnerability data actionable. Without it, security teams lose:Severity scoring (CVSS)Attack vectors and exploit detailsAffected systems and productsContext for prioritization👉 In short: more noise, less signal⸻🔗 The Hidden Risk: Chained ExploitsThis shift introduces a major blind spot:Lower-severity vulnerabilities (CVSS 6–7) may not be enrichedAttackers can chain multiple low-severity flawsResult: full compromise equivalent to a critical vulnerability👉 Two “7s” can still equal a “10” in real-world attacks⸻🤖 AI Is Driving the ExplosionThe root cause is scale—and AI is accelerating it:Automated tools can discover vulnerabilities at massive scaleAttackers don’t need advanced intelligence—just volumeThousands of bots probing systems = exponential growth in CVEsThis is pushing NIST—and the entire vulnerability ecosystem—to its limits.⸻🧠 What This Means for Enterprise ITYou can no longer rely solely on NIST/NVD as your source of truth.New reality:CVE databases will be incompletePrioritization gaps will increaseAttackers will target overlooked vulnerabilities⸻🛠️ Recommended StrategyImmediate Adjustments:Monitor third-party threat intelligence sourcesInvest in security subscriptions (threat intel platforms)Track research from vendors (e.g., Unit 42, etc.)Operational Changes:Move beyond “patch Tuesday” mentalityImplement continuous vulnerability assessmentUse AI/automation for:Threat detectionPrioritizationPatch validation⸻⚖️ Auto-Patching: Risk vs RewardListener feedback raised a key point:Auto-updates can introduce supply chain riskBut delaying patches increases exposure to exploits👉 The answer is not binary:Enable auto-updates where safeMaintain robust backup and rollback strategiesAssess risk per system—not globally⸻🔄 Key TakeawayWe are entering a transitional phase in cybersecurity:Vulnerability volume is explodingTraditional scoring systems are breaking downAI will eventually help defend—but not yet👉 Until then: speed, visibility, and adaptability are your best defenses⸻💬 Listener FeedbackThanks to listener Miruxa for highlighting the risks of auto-updating in light of recent supply chain attacks.Key takeaway:You’re exposed if you update too fastYou’re exposed if you update too slowSecurity now requires constant assessment, not fixed policies⸻📣 Wrap UpWhat do you think—Is NIST making the right call, or does this create more risk than it solves?📧 Email: feedback@itsparccast.com🐦 X: @itsparccast💬 YouTube: Drop a comment—we read them all⸻🔗 Social LinksIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 4/20/26 | ![]() Amazon’s AI Power Play, Copilot Goes Agentic, and Netgear Wins Big | Amazon is going all-in on AI—and taking aim at everyone in the process.In this episode of IT SPARC Cast – News Bytes, we break down:•Amazon’s massive AI infrastructure push and chip strategy•Microsoft turning Copilot into an autonomous agent•Netgear’s key win in the evolving router security landscapeIf you’re in enterprise IT, cloud, or security, this episode covers the real shifts happening right now—not just the headlines.📝 Episode Description 00:00 – Intro📰 News Bytes00:44 – Amazon CEO Takes Aim at Nvidia, Intel, Starlink & MoreAmazon is making a massive AI bet, with Andy Jassy justifying huge infrastructure investments and signaling a strategy to control more of the stack. From custom AI chips (Trainium) to satellite internet and ARM-based compute, Amazon is positioning itself as the “picks and shovels” provider for the AI gold rush.Rather than relying on vendors, Amazon is building vertically to reduce dependency and maximize margins—mirroring moves from other major players.Key takeaways:•AI revenue is directly tied to available compute•Hyperscalers are racing to own infrastructure end-to-end•Amazon’s strength is selling compute—not just AI modelsThis isn’t speculation—it’s a long-term land grab for AI dominance.https://techcrunch.com/2026/04/09/amazon-ceo-takes-aim-at-nvidia-intel-starlink-more-in-annual-shareholder-letter/⸻07:53 – Microsoft is Developing Copilot Features Inspired by OpenClawMicrosoft is evolving Copilot from a reactive assistant into an agentic system capable of acting on behalf of users. Inspired by OpenClaw-style agents, these new capabilities include task automation, proactive recommendations, and role-specific assistants.The big shift: AI isn’t just answering questions—it’s doing the work.With deep OS integration, Microsoft has a unique advantage in embedding these agents directly into enterprise workflows. However, this also raises the stakes around security and control.Key implications:•Agentic AI adoption is accelerating rapidly across enterprises•Model Context Protocol (MCP) will be critical for integrations•Role-based permissions may help contain riskThis is a foundational shift toward autonomous enterprise systems.https://www.computerworld.com/article/4158553/microsoft-is-developing-copilot-features-inspired-by-openclaw.html⸻14:20 – Netgear Scores First Exemption From Router RestrictionsNetgear has secured the first exemption allowing continued sale of new router products under new security-driven certification rules. While temporary and conditional, this signals how vendors will navigate compliance moving forward.The exemption suggests trust in Netgear’s processes and willingness to meet evolving standards, while also highlighting broader industry pressure around consumer networking security.Key considerations:•Existing devices remain unaffected—for now•More vendors are expected to follow with exemptions•Security scrutiny on consumer routers is increasingThis is an early indicator of how networking vendors will adapt to tighter requirements.https://www.pcmag.com/news/netgear-scores-the-first-exemption-from-the-fccs-foreign-made-router-ban⸻📬 18:34 – Mail BagListener feedback this week reinforces two ongoing themes:•AI’s impact on global labor markets•The growing complexity of data ownership in AI systemsDiscussion highlights how AI may disrupt traditional outsourcing models and why tracking data provenance inside AI systems is becoming critical.⸻🔚 23:52 – Wrap UpAs AI adoption accelerates, enterprise IT teams must balance innovation with governance—especially around automation, security, and data ownership. Listener engagement continues to shape the show, so reach out and be part of the conversation.⸻Social LinksIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@JohnBarger on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 4/17/26 | ![]() Open a PDF, Lose Your System: Adobe Zero-Day Exploit (CVE-2026-34621) | A dangerous Adobe Acrobat zero-day vulnerability (CVE-2026-34621) is actively being exploited—allowing attackers to compromise systems simply by getting users to open a malicious PDF. In this episode of IT SPARC Cast – CVE of the Week, John and Lou break down how it works, why it’s so dangerous, and what enterprise IT teams must do immediately.⸻📄 Show Notes🚨 CVE of the Week: Adobe Acrobat Zero-Day (CVE-2026-34621)This week’s vulnerability is about as bad—and as common—as it gets. A zero-day flaw in Adobe Acrobat Reader is actively being exploited in the wild, requiring nothing more than opening a malicious PDF to trigger a full system compromise.🔍 What Happened•CVE ID: CVE-2026-34621•Type: Zero-day (actively exploited before patch release)•Severity: CVSS 8.6 (High, but misleading in practice)•Attack Vector: Malicious PDF file•Impact: Remote Code Execution (RCE), data theftAdobe issued an emergency out-of-band patch, signaling the urgency and severity of the threat.⸻⚠️ Why This Is So DangerousThis exploit is particularly concerning because:•No user interaction required beyond opening a file•Works through phishing and email attachments•Targets one of the most widely used enterprise tools (PDF readers with ~60–75% market share)Once triggered, the vulnerability exploits a memory corruption flaw (e.g., use-after-free or buffer overflow), allowing attackers to execute arbitrary code on the system.⸻🔗 The Real Threat: Exploit ChainingOn its own, this vulnerability is severe—but in modern environments, it’s even worse:•Attackers use phishing to deliver the malicious PDF•Gain access to a user endpoint•Pivot into:•Cloud infrastructure•Container environments•Internal systems👉 This is how a “medium-high” CVSS score becomes a critical enterprise breach⸻🤖 AI and the Acceleration of AttacksThe pace of exploitation is changing:•Exploits are now being weaponized within minutes of disclosure•Attackers can deploy automated agents at scale•AI-driven reconnaissance reduces time-to-exploit dramaticallyThis creates a world where patch latency = exposure window.⸻🛠️ Mitigation & RecommendationsImmediate Actions:•✅ Patch Adobe Acrobat immediately (no delay)•🚫 Do NOT wait for standard patch cycles•📧 Treat all PDF attachments as potential attack vectorsEnterprise IT Best Practices:•Enforce auto-updates and forced patching policies•Consider network access restrictions for unpatched devices•Implement:•Zero Trust architectures•Endpoint monitoring and anomaly detection⸻🧠 Strategic Takeaways•User behavior is still the weakest link•Patch cycles must shift from scheduled → real-time response•Vendors must improve update mechanisms:•Fewer forced reboots•Better “do not interrupt” intelligenceWe are entering a phase where patching speed is a primary security control, not a maintenance task.⸻💬 Listener FeedbackThanks to listener IAPX for pointing out a technical clarification from last week:•The Docker vulnerability discussed was rooted in Moby, not Docker directly•Docker remains the primary exposure vector due to its widespread useGreat catch—and exactly the kind of feedback we appreciate.⸻📣 Wrap UpHave thoughts on this vulnerability? Are we underestimating the impact of PDF-based attacks?📧 Email: feedback@itsparccast.com🐦 X: @itsparccast💬 YouTube: Drop a comment—we read them all⸻🔗 Social LinksIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@JohnBarger on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 4/10/26 | ![]() Docker Security Nightmare? CVE-2026-34040 Lets Attackers Escape Containers | A critical Docker vulnerability (CVE-2026-34040) is putting container security at risk by allowing attackers to bypass authorization controls and potentially access host systems. In this episode of IT SPARC Cast – CVE of the Week, John and Lou break down the exploit, why it matters, and what enterprise IT teams must do immediately to mitigate risk.⸻📄 Show Notes🚨 CVE of the Week: Docker API Authorization Bypass (CVE-2026-34040)This week’s CVE highlights a serious vulnerability in Docker Engine that undermines one of the core assumptions of container security: isolation.🔍 What Happened•CVE ID: CVE-2026-34040•CVSS Score: 8.8 (High)•Affected Systems: Docker Engine / Moby versions prior to 29.3.1•Root Cause: Improper handling of authorization plugin checks in Docker’s API layerThe vulnerability allows specially crafted API requests to bypass authorization controls by dropping the request body before inspection—while still executing the request.⸻⚠️ Why This MattersThis flaw enables attackers to:•Bypass container security policies•Create privileged containers•Access the host file system•Extract sensitive credentials (SSH keys, cloud keys, etc.)This effectively breaks container isolation, turning Docker from a security boundary into an attack vector.⸻🔗 The Bigger Risk: Chained AttacksWhile Docker APIs are typically not exposed publicly, this vulnerability becomes significantly more dangerous in real-world environments:•Attackers gain initial access via:•Phishing or spear phishing•Compromised endpoints•Malware or trojans•Then pivot internally to exploit Docker APIs👉 In these scenarios, the practical severity approaches 9.8–10.0, not 8.8.⸻🤖 AI-Driven Threat AmplificationModern attack frameworks—especially those leveraging AI—can:•Automatically scan for exposed APIs•Execute chained exploits without human intervention•Scale attacks across thousands of targets simultaneouslyThis dramatically reduces the skill barrier for attackers.⸻🛠️ Mitigation & RecommendationsImmediate Actions:•✅ Upgrade Docker to version 29.3.1 or later•🔒 Restrict and lock down Docker API access•🚫 Ensure APIs are not externally exposedStrategic Recommendations:•Enable auto-updates where operationally safe•Conduct a full network audit (hosts, containers, firmware, network gear)•Patch beyond servers:•BIOS / firmware•Network infrastructure (switches, routers)•Break down silos between:•Enterprise IT security•Data center / cloud security⸻🔄 Key TakeawayContainerization is not a silver bullet for security. Misconfigurations and API exposure can turn Docker into a high-impact attack surface—especially when combined with modern, automated attack chains.⸻💬 Listener FeedbackThanks to listener PutlerLXO for correcting last week’s Axios stat:•Actual weekly downloads: 100 million, not 45 millionWe appreciate the feedback—keep it coming!⸻📣 Wrap UpHave thoughts on this vulnerability? Think it’s overblown—or even worse than we described?📧 Email: feedback@itsparccast.com🐦 X: @itsparccast💬 YouTube & LinkedIn: Drop a comment—we read them all⸻🔗 Social LinksIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 4/6/26 | ![]() Are CEOs Using AI as an Excuse? | Patch Chaos & Why Sora Was Shut Down | In this episode of IT SPARC Cast – News Bytes, John Barger and Lou Schmidt break down the latest enterprise IT headlines with sharp insight and zero fluff.Are tech CEOs using AI as cover for layoffs? Are emergency patches from major vendors signaling deeper systemic risk? And what’s really behind OpenAI’s decision to shut down Sora?Plus, listener feedback sparks a deep dive into home router security and the best options for every level—from plug-and-play to prosumer setups.If you’re in enterprise IT, security, or just trying to stay ahead of the curve, this is your weekly signal through the noise.⸻📌 Show Notes00:00 – Intro•Overview of the week’s biggest enterprise IT stories•AI layoffs, patch failures, and shifting priorities in AI platforms⸻📰 News Bytes00:49 – Tech CEOs Suddenly Love Blaming AI for Mass Job Cuts•Increasing trend: layoffs attributed to “AI efficiency gains”•Reality check: cost-cutting, restructuring, and execution failures•Market dynamics:•“AI-driven efficiency” messaging can stabilize or boost stock prices•Traditional layoffs often trigger negative investor reactions•Key takeaway:•AI is becoming a narrative shield for leadership decisions•Career insight:•Job security = being a problem solver, not just a role filler•Enterprise angle:•Evaluate vendor stability when layoffs are framed as “AI transformation”https://www.bbc.com/news/articles/cde5y2x51y8o⸻07:06 – Emergency Microsoft & Oracle Patches Point to Wider Cyber Issues•Rise in out-of-band (emergency) patching•Key incidents:•Critical remote code execution vulnerability (CVSS 9.8)•Broken update causing login failures•Core issue:•Patch reliability vs. urgency tradeoff is collapsing•Enterprise implications:•Traditional patch windows are becoming obsolete•Delayed patching = increased exposure risk•New reality:•Mandatory, rapid patch deployment is now required•Strategic shift:•Move toward live patching architectures (already common in Linux/cloud)•Root causes:•Faster release cycles•Increased reliance on automation•Reduced staffing depthhttps://www.computerweekly.com/news/366640648/Emergency-Microsoft-Oracle-patches-point-to-wider-cyber-issues⸻13:28 – Why OpenAI Really Shut Down Sora•Contrary to speculation: not a collapse signal•Actual drivers:•Compute constraints•Resource prioritization•Revenue alignment•Market dynamics:•AI arms race: speed, capability, and scale•Product reality:•Video generation = extremely compute-intensive•Limited sustained user demand vs. cost•Strategic takeaway:•Focus shifting toward:•Coding tools•Agentic platforms•High-ROI capabilities•Key insight:•AI growth is currently compute-bound, not idea-boundhttps://techcrunch.com/2026/03/29/why-openai-really-shut-down-sora/⸻📬 16:54 – Mail Bag & Home Router RecommendationsListener Feedback Topics:•Router security concerns•Safer alternatives to high-risk vendorsRecommended Router Tiers:🟢 Entry-Level (Simple / Plug-and-Play)•Netgear•Strong open-source firmware support (OpenWRT, Tomato)•U.S.-based company with supply chain flexibility•High accountability and responsiveness🟡 Mid-Tier (Mesh / Larger Homes)•Eero (Amazon-owned)•Strong performance and ease of use•Consistent updates and long-term viability🔵 Prosumer / Advanced•Ubiquiti (UniFi)•Best-in-class price/performance•Full ecosystem: networking + security + cameras•No recurring cloud fees•Strong automation and patch responsiveness⸻🔚 26:54 – Wrap Up•Call for listener feedback•Engage via email, X, YouTube, or LinkedIn•Reminder to like, subscribe, and enable notifications⸻🌐 Social LinksIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 4/3/26 | ![]() Axios Supply Chain Attack: 45M Weekly Downloads Turned Into a RAT | In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break down a massive supply chain attack targeting Axios, one of the most widely used JavaScript libraries in the world.Attackers compromised a maintainer account and injected malicious code into widely distributed versions, turning routine installs into a cross-platform Remote Access Trojan (RAT) deployment.This isn’t just another vulnerability — it’s a breach of trust in the open-source ecosystem that powers modern web applications.⸻📝 Show Notes A major supply chain attack has compromised Axios, a core JavaScript library used in millions of applications across web, mobile, and backend systems.In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt explain how attackers injected malware into trusted Axios packages — impacting potentially tens of millions of environments worldwide.⸻🔎 What HappenedAxios is a widely used open-source library for making HTTP requests in:•Node.js applications•React, Angular, and Vue frontends•Mobile apps (React Native)•SaaS platforms and internal toolsWith over 45 million weekly downloads, its footprint is enormous.Attackers compromised an Axios maintainer’s NPM account and pushed malicious versions:•Axios 1.14.1•Axios 0.30.4These versions introduced a hidden dependency:•plain-crypto-js@4.2.1This dependency executed a post-install script that deployed a cross-platform Remote Access Trojan (RAT) targeting:•Windows•macOS•LinuxThe malware then:•Contacted a command-and-control (C2) server•Downloaded OS-specific payloads•Executed silently•Deleted itself and restored clean package files to evade detection⸻⚠ Why This Is So DangerousThis attack is particularly severe because:•It does not require direct user action beyond installing dependencies•It affects transitive dependencies (you may be using Axios without knowing it)•It operates during build/install processes (CI/CD pipelines included)•It leaves minimal forensic evidenceThis is a classic supply chain compromise — not a CVE, but arguably more dangerous.⸻🏢 Enterprise IT ImpactIf your organization:•Uses Node.js or modern JavaScript frameworks•Runs CI/CD pipelines•Builds or deploys SaaS platforms•Uses third-party APIs or SDKsYou are likely exposed.Even if you don’t directly install Axios, it may exist deep in your dependency tree.⸻🧠 Key TakeawayThis was not a flaw in code.This was a failure of trust in the supply chain.If your security model assumes dependencies are safe by default — this attack proves otherwise.⸻🔗 Source Articleshttps://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.htmlhttps://www.elastic.co/security-labs/axios-supply-chain-compromise-detections⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 3/30/26 | ![]() Musk Builds a Chip Empire, Zuckerberg’s AI CEO, and Arm Enters the AI Chip War | In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt break down three major moves reshaping the future of AI infrastructure, chip design, and enterprise automation.Elon Musk announces TeraFab, a massive new effort to bring chip fabrication back in-house for greater control over AI hardware and supply chains. Mark Zuckerberg pushes deeper into agentic AI with plans for a personal “AI CEO” to manage workflows and decision-making. And Arm signals a major strategic shift with a new AI-focused chip designed for agent-based systems—putting it in direct competition with its own ecosystem.From supply chain control and custom silicon to AI-driven leadership tools and next-generation chip architectures, this episode explores how the foundation of enterprise IT is rapidly evolving. ⸻⏱️ Show Notes00:00 – Intro📰 News Bytes00:45 – Elon Musk Announces TeraFab for AI Chips and MemoryElon Musk has announced plans for TeraFab, a massive chip fabrication initiative aimed at regaining full control over chip design and production.The strategy includes:• A prototype fabrication facility for rapid iteration• A large-scale production fab for mass manufacturing• Vertical integration to reduce dependency on external foundries• Faster time-to-market for AI-driven hardwareAs chip demand surges due to AI workloads, companies are reconsidering outsourced manufacturing models. TeraFab represents a return to end-to-end control of silicon development, which could significantly impact supply chains, pricing, and innovation speed.https://x.com/i/broadcasts/1yKAPMzlvgWxb https://en.wikipedia.org/wiki/Terafab 09:46 – Mark Zuckerberg Builds AI CEO to Help Run MetaMark Zuckerberg is developing a personal AI system capable of handling executive-level tasks—effectively functioning as a digital chief of staff or “AI CEO.”The system is designed to:• Retrieve and synthesize information across internal systems• Automate decision-support workflows• Reduce reliance on layers of management• Act as a “second brain” for operational awarenessThis reflects a broader shift toward agentic AI, where intelligent systems proactively execute tasks rather than simply responding to prompts. The discussion also raises key enterprise questions around security, portability, and ownership of personal AI agents.https://www.the-independent.com/tech/mark-zuckerberg-ai-ceo-bot-b2943792.html17:54 – Arm Unveils New AI Chip for Agentic SystemsArm has announced a new AI-focused chip architecture aimed at powering agentic AI and future AGI-style workloads.Key implications include:• A shift from IP licensing to direct chip competition• Increased competition with existing ecosystem partners• Potential acceleration of specialized AI hardware development• Growing relevance of alternative architectures like RISC-VThis move signals a major strategic pivot for Arm, potentially reshaping the competitive landscape for AI infrastructure and creating new dynamics between chip designers, manufacturers, and enterprise buyers.https://www.reuters.com/business/media-telecom/arm-unveils-new-ai-chip-expects-it-add-billions-annual-revenue-2026-03-24/ 🔁 Wrap Up25:24 – Mail BagListener feedback highlights continued interest in emerging compute models, including biological computing, and reinforces the importance of staying ahead of major infrastructure trends.27:01 – Wrap UpJohn and Lou close with thoughts on the convergence of AI, custom silicon, and agent-based workflows, emphasizing that enterprise IT leaders must prepare for a future where infrastructure, software, and decision-making are increasingly intertwined.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 3/27/26 | ![]() Router Supply Chain Risks: The Hidden Security Threat in Your Home Network | In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break from a single CVE to tackle a broader and increasingly critical issue: router supply chain security.From botnets built on consumer routers to concerns about firmware, silicon-level vulnerabilities, and manufacturing visibility, the conversation explores why your home or small office router may be one of the weakest links in modern cybersecurity.The hosts explain what’s changing in the router market, which vendors are most at risk, and what both consumers and enterprise IT professionals should be doing now to secure the network edge.⸻📝 Show NotesConsumer routers are no longer just simple networking devices — they are now prime targets in large-scale cyberattacks and botnet operations.In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break down the growing risks tied to router supply chains, firmware security, and edge network vulnerabilities.Rather than focusing on a single CVE, this discussion highlights a broader shift in how attackers are targeting home routers, small office devices, and prosumer networking gear as entry points into larger networks.⸻🔎 What’s Changing in Router SecurityRecent attack trends show:•Consumer and small-office routers are being used as launch points for larger cyberattacks•Botnets are increasingly built on unpatched or poorly secured edge devices•Attackers are leveraging routers to mask origin and evade detectionThis makes routers one of the most critical — and often overlooked — components of modern security architecture.⸻⚠ The Supply Chain ProblemOne of the biggest concerns discussed in this episode is supply chain visibility.Key risks include:•Limited insight into where hardware components are manufactured•Potential for firmware-level or silicon-level vulnerabilities•Difficulty auditing third-party manufacturing processes•Inability to fully validate device integrityEven when running trusted software (such as open-source firmware), underlying hardware risks may still exist.⸻🏢 Enterprise & Home Network ImpactThis is not just a consumer issue.Organizations must consider:•Remote employees connecting via insecure home routers•Small offices using low-cost networking equipment•IoT devices relying on consumer-grade infrastructure•Edge devices acting as entry points for lateral movementIf the edge is compromised, the rest of the network is exposed.⸻🛠 What IT Teams and Consumers Should Do•Avoid default configurations and credentials•Keep firmware updated consistently•Segment home and corporate network traffic where possible•Evaluate router vendors for security posture and supply chain transparency•Monitor for unusual traffic patterns or device behavior•Plan for longer-term shifts in router procurement and standardsThis is a long-term evolution, not a short-term panic event.⸻📊 Market Impact & Vendor LandscapeThe episode also discusses potential market shifts:•Lower-cost vendors may face increased scrutiny•Vendors with stronger supply chain transparency may benefit•Manufacturing may shift to more trusted and auditable environments•Future devices may require mandatory security features like auto-updating firmware⸻💬 Listener FeedbackListener feedback from X highlights the growing importance of Zero Trust and identity validation, especially in response to recent discussions about insider threats.The takeaway:Security is no longer just about devices — it’s about people, process, and trust models working together.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 3/25/26 | ![]() Computers Built From Living Neurons?! Inside Final Spark’s Bio-AI Future | 📄 Episode DescriptionIn this episode of IT SPARC Cast – Interview, John Barger sits down with Dr. Ewelina Kurtys of Final Spark to explore one of the most futuristic ideas in computing: building computers from living neurons.Final Spark is a Swiss startup working to create biological computing systems using neurons derived from human stem cells. The goal is to develop a new form of compute that is dramatically more energy-efficient than traditional silicon—potentially by orders of magnitude.In this conversation, John and Dr. Kurtys explore how neurons are sourced, how they are interfaced with traditional systems, and what it will take to build neuron-based data centers. They also discuss the challenges of programming biological systems, the timeline for commercialization, and what enterprise IT professionals should be doing today to prepare for this emerging paradigm.This is a deep dive into the intersection of biology, AI, and infrastructure—and what could become the next major evolution of computing. ⸻⏱️ Show Notes00:00 – IntroAn introduction to Final Spark and the concept of building computing systems using living neurons as an alternative to traditional silicon-based infrastructure.⸻❓ Questions00:32 - Who Is Final Spark?01:00 - How Do You Source Your Neurons?01:43 - Neuron Quality Control02:43 - Neurons In AI Data Centers03:14 - Benefit Of Using Neurons04:19 - When Will Neuron Based Compute Be Commercially Available05:43 - Operating System Or Programming Language For Neurons06:49 - What Does A Neuron Based Data Center Look Like?07:55 - Containment And Security08:28 - Data Persistence And Memory Erasure09:10 - What Should IT Professionals Do Today To Prepare?12:04 - How Does A Start-Up Get Involved Today?12:44 - How Do You Program Neurons “Bits”? Are They Binary?14:54 - How Do You Connect Neurons To Silicon Based Compute?16:00 - Final Thoughts from Dr. Kurtys⸻https://www.finalspark.comhttps://finalspark.com/articles/⸻🔁 Wrap Up17:19 – Wrap UpJohn reflects on the interview and the long-term implications of neuron-based computing. While still early-stage, the technology represents a potential shift in how compute is delivered—driven by energy efficiency, biological processing models, and new programming paradigms.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 3/23/26 | ![]() Pokémon Trained Robots?! Stargate Canceled, Nvidia Goes to Space & SaaS Is Dying | In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt break down four major stories reshaping enterprise IT, AI infrastructure, and the future of software.Millions of Pokémon Go players unknowingly helped train real-world delivery robots using billions of images. Meanwhile, OpenAI’s ambitious Stargate data center expansion hits a major setback, highlighting the challenges of scaling AI infrastructure.Nvidia pushes the frontier even further with plans for orbital AI data centers powered by its new Vera Rubin Space-1 chip system, while a growing movement suggests the “SaaS apocalypse” may be underway, driven by AI and open-source alternatives reshaping how software is built and consumed.From crowdsourced AI training to space-based compute and the future of enterprise software, this episode explores where the next wave of IT disruption is coming from. Show Notes00:00 – Intro📰 News Bytes00:45 – Pokémon Go Players Unknowingly Trained Delivery Robots With 30 Billion ImagesNiantic has leveraged years of Pokémon Go gameplay data—over 30 billion images captured by users—to build a highly accurate Visual Positioning System (VPS) capable of centimeter-level location accuracy.The discussion highlights both the brilliance of this crowdsourced data model and broader concerns around data ownership, enterprise data exposure, and unintended data usage.https://www.popsci.com/technology/pokemon-go-delivery-robots-crowdsourcing/?utm_source=chatgpt.com ⸻07:18 – OpenAI’s Massive Stargate Data Center Expansion CanceledPlans to expand a major AI data center tied to the Stargate initiative have been canceled, underscoring the complexity of building large-scale AI infrastructure.Despite the cancellation, demand for AI compute remains extremely high, with other organizations potentially stepping in to utilize available capacity—reinforcing that AI infrastructure demand still far exceeds supply.https://www.tomshardware.com/tech-industry/artificial-intelligence/openais-massive-stargate-data-center-canceled-as-firm-cant-reach-terms-with-oracle-operator-struggles-with-reliability-issues-meta-said-to-be-interested-in-snatching-excess-capacity ⸻11:06 – Nvidia Announces Vera Rubin Space-1 Chip System for Orbital AI Data CentersNvidia is pushing AI infrastructure beyond Earth with its Vera Rubin Space-1 system, designed for use in orbital data centers.While challenges remain—especially around cooling and radiation—this represents a major step toward space-based AI infrastructure as demand for compute continues to surge.https://www.cnbc.com/2026/03/16/nvidia-chips-orbital-data-centers-space-ai.html ⸻17:50 – The SaaS Apocalypse Is Open Source’s Greatest OpportunityA growing trend suggests that traditional SaaS models may be under pressure as AI dramatically lowers the cost of building custom software.The hosts highlight real-world examples of AI enabling individuals to build production-ready applications in hours, signaling a potential return to highly customized, in-house systems—powered by AI instead of large dev teams.https://hackernoon.com/the-saas-apocalypse-is-opensources-greatest-opportunity ⸻🔁 Wrap Up25:28 – Mail BagListener Tim flags an issue with a previous episode upload, helping quickly resolve a distribution problem. A reminder of how valuable engaged listeners are to maintaining quality and consistency.⸻26:52 – Wrap UpJohn and Lou close with thoughts on how rapidly the IT landscape is evolving—from AI-driven infrastructure and orbital compute to the reinvention of software delivery models—and encourage listeners to stay adaptable as these shifts accelerate.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 3/20/26 | ![]() North Korea’s Fake IT Workers: The Insider Threat Hiding in Plain Sight | In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break down a rapidly growing cybersecurity threat: North Korean operatives posing as remote IT workers inside enterprise environments.These actors are not just external attackers — they are getting hired, accessing corporate systems, and creating persistent insider threats that are extremely difficult to detect.The episode explores how the scheme works, why traditional security controls fail, and what enterprise IT teams must do to defend against this evolving attack vector.⸻📝 Show NotesA new cybersecurity threat is emerging that flips the traditional attack model on its head.Instead of breaking into your network, attackers are getting hired into your company.In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt analyze the growing threat of North Korean IT worker schemes, where operatives pose as legitimate remote employees to gain direct access to enterprise systems.⸻🔎 How the Scheme WorksThreat actors:•Apply for remote IT jobs using stolen or synthetic identities•Pass interviews and onboarding processes•Gain legitimate access to corporate systems•Use that access to exfiltrate data, generate revenue, or stage future attacksThese individuals often work through:•VPN masking•Proxy networks•Identity laundering through third partiesOnce inside, they operate as trusted insiders, making detection significantly more difficult than traditional external threats.⸻⚠ Why This Is So DangerousThis is not a vulnerability in software — it’s a failure in process, identity, and trust models.Key risks include:•Direct access to internal systems and data•Ability to bypass perimeter security controls•Long-term persistence without detection•Potential for data exfiltration, espionage, or ransomware stagingUnlike typical breaches, these actors are:•Authenticated•Approved•Operating under legitimate credentials⸻🏢 Enterprise IT ImpactThis threat directly impacts:•Remote-first organizations•Companies hiring globally•Teams using contractors or third-party staffing firms•Organizations without strict identity verification processesIf your company hires remote developers, engineers, or IT staff — this is your problem.⸻🔐 Key Security TakeawaysTo mitigate this risk, organizations should:•Strengthen identity verification during hiring•Require multi-factor authentication across all systems•Monitor for unusual behavior from “trusted” accounts•Implement least-privilege access controls•Audit remote employee access regularly•Coordinate with HR on security-aware hiring practicesThis is a cross-functional problem — IT, Security, and HR must work together.⸻🔗 Source Articlehttps://www.nbcnews.com/investigations/north-korea-it-worker-scheme-nisos-fbi-rcna245025⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 3/16/26 | ![]() Redux - Node.js Security Crisis, Meta’s AI Agent Network, Nvidia’s Open Agent Platform & Oracle’s Data Center Bet | Oooops. We uploaded the wrong audio. It's been fix now.In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt explore four major stories shaping enterprise IT, open-source software, AI infrastructure, and the future of data centers.A new report reveals that two-thirds of Node.js installations are running outdated versions, creating major security and operational risks across modern software stacks. Meanwhile, Meta hires the creators of Moltbook, a platform designed as a social network for AI agents to communicate and collaborate.Nvidia enters the agentic AI race with plans for an open-source enterprise AI agent platform, while Oracle’s massive investments in AI data centers spark debate about whether the industry is heading toward an infrastructure bubble.From open-source sustainability to AI infrastructure strategy, this episode breaks down what these developments mean for enterprise IT leaders, developers, and technology investors. Show Notes00:00 – Intro📰 News Bytes00:43 – Two Thirds of Node.js Installations Are OutdatedA new report from the OpenJS Foundation reveals that roughly two-thirds of Node.js deployments are running outdated or end-of-life versions, creating serious security and stability concerns across modern applications.To address this, the Node.js LTS Upgrade and Modernization Program is connecting enterprises with trusted service providers audit, plan, and modernize their deployments.The initiative also helps fund open-source development by directing a portion of service revenue back to the OpenJS Foundation.https://openjsf.org/blog/nodejs-lts-upgrade-program04:59 – Meta Hires the Duo Behind MoltbookMeta has hired the creators of Moltbook, a platform designed as a collaboration network where AI agents can verify identity, exchange information, and coordinate tasks.Meta’s move suggests a strategy to become the central hub for AI agent interaction, positioning the company to support a future where large numbers of autonomous software agents perform tasks for individuals and businesses.https://www.axios.com/2026/03/10/meta-facebook-moltbook-agent-social-network10:20 – Nvidia to Launch an Open-Source AI Agent PlatformNvidia is preparing to release NemoClaw, an open-source AI agent platform designed to help enterprises deploy autonomous agents capable of automating workflows, managing data, and performing complex multi-step tasks.Key aspects of the platform include:• Enterprise-focused agent orchestration• Open-source accessibility• Compatibility beyond Nvidia hardware• Integration with major enterprise software vendorsThe move signals Nvidia’s growing interest in the agentic AI ecosystem, which could dramatically increase demand for GPU-accelerated compute infrastructure.https://www.wired.com/story/nvidia-planning-ai-agent-platform-launch-open-source/⸻14:27 – Oracle Is Building Yesterday’s Data Centers With Tomorrow’s DebtOracle is investing heavily in new AI data centers, financing much of the expansion through debt as it competes with other hyperscale cloud providers.Some analysts have raised concerns that rapid advances in AI hardware could outpace the construction timelines of new facilities, potentially creating financial risk.However, the hosts point out that building data centers requires long lead times for power infrastructure, networking, and facilities, while the compute hardware itself is typically installed later in the deployment process.The discussion highlights the importance of evaluating technology investment stories critically and considering both infrastructure realities and market narratives.https://www.cnbc.com/2026/03/09/oracle-is-building-yesterdays-data-centers-with-tomorrows-debt.html⸻20:14 – Wrap up⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 3/16/26 | ![]() Node.js Security Crisis, Meta’s AI Agent Network, Nvidia’s Open Agent Platform & Oracle’s Data Center Bet | In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt explore four major stories shaping enterprise IT, open-source software, AI infrastructure, and the future of data centers.A new report reveals that two-thirds of Node.js installations are running outdated versions, creating major security and operational risks across modern software stacks. Meanwhile, Meta hires the creators of Moltbook, a platform designed as a social network for AI agents to communicate and collaborate.Nvidia enters the agentic AI race with plans for an open-source enterprise AI agent platform, while Oracle’s massive investments in AI data centers spark debate about whether the industry is heading toward an infrastructure bubble.From open-source sustainability to AI infrastructure strategy, this episode breaks down what these developments mean for enterprise IT leaders, developers, and technology investors. 00:00 – Intro📰 News Bytes00:43 – Two Thirds of Node.js Installations Are OutdatedA new report from the OpenJS Foundation reveals that roughly two-thirds of Node.js deployments are running outdated or end-of-life versions, creating serious security and stability concerns across modern applications.To address this, the Node.js LTS Upgrade and Modernization Program is connecting enterprises with trusted service providers that can:• Audit existing deployments• Plan phased upgrades• Modernize dependencies• Maintain production stabilityhttps://openjsf.org/blog/nodejs-lts-upgrade-program04:59 – Meta Hires the Duo Behind MoltbookMeta has hired the creators of Moltbook, a platform designed as a collaboration network where AI agents can verify identity, exchange information, and coordinate tasks.Meta’s move suggests a strategy to become the central hub for AI agent interaction, positioning the company to support a future where large numbers of autonomous software agents perform tasks for individuals and businesses.https://www.axios.com/2026/03/10/meta-facebook-moltbook-agent-social-network10:20 – Nvidia to Launch an Open-Source AI Agent PlatformNvidia is preparing to release NemoClaw, an open-source AI agent platform designed to help enterprises deploy autonomous agents capable of automating workflows, managing data, and performing complex multi-step tasks.The move signals Nvidia’s growing interest in the agentic AI ecosystem, which could dramatically increase demand for GPU-accelerated compute infrastructure.https://www.wired.com/story/nvidia-planning-ai-agent-platform-launch-open-source/14:27 – Oracle Is Building Yesterday’s Data Centers With Tomorrow’s DebtOracle is investing heavily in new AI data centers, financing much of the expansion through debt as it competes with other hyperscale cloud providers.Some analysts have raised concerns that rapid advances in AI hardware could outpace the construction timelines of new facilities, potentially creating financial risk.The discussion highlights the importance of evaluating technology investment stories critically and considering both infrastructure realities and market narratives.https://www.cnbc.com/2026/03/09/oracle-is-building-yesterdays-data-centers-with-tomorrows-debt.html🔁 Wrap Up20:14 – Mail BagListener Mel asks whether laser-based networking technologies, like the TaaraConnect system discussed in a previous episode, could help improve internet access in mountainous rural areas.While line-of-sight laser connectivity could offer high speeds, weather conditions like fog and cloud cover could require backup connections such as radio or wired infrastructure.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 3/13/26 | ![]() 14,000 ASUS Routers Infected: KadNap Botnet Creates Nearly Untouchable Malware Network | A new malware campaign has compromised more than 14,000 ASUS routers, creating a resilient botnet that security researchers say is unusually difficult to dismantle.In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt examine the KadNap router malware, which targets unpatched ASUS routers and installs a persistent backdoor designed to survive typical remediation efforts.The malware was identified by researchers at Lumen’s Black Lotus Labs, who discovered that infected routers are being used as part of a botnet capable of proxying internet traffic and enabling other malicious activities.Unlike many botnets that rely on centralized command servers, KadNap uses peer-to-peer control mechanisms similar to BitTorrent, making it significantly harder for security teams to disrupt.⸻🔎 What the KadNap Router Malware DoesThe malware exploits vulnerabilities in ASUS routers that have not been patched or configured securely.Once installed, KadNap:•Creates a persistent backdoor on the router•Survives reboots and firmware updates•Enables remote control of the router•Connects the device to a distributed botnet network•Routes malicious traffic through compromised residential internet connectionsResearchers also discovered the infected routers are being used by a fee-based proxy service called Doppelganger, allowing customers to route their internet traffic through unsuspecting victims’ home networks.⸻⚠ Why This Is DangerousBecause the traffic originates from compromised home routers, victims could unknowingly appear responsible for malicious activity such as:•Network attacks•Surveillance operations•Illegal browsing activity•Staging points for additional cyber intrusionsThis makes detection and attribution far more difficult.⸻🏢 Enterprise IT RiskThis vulnerability is not limited to home users.ASUS also produces small-business routers, meaning organizations or small offices using these devices could be exposed.IT professionals should also remember that compromised routers can provide attackers with a network foothold for lateral movement, especially if IoT or remote-user networks are poorly segmented.⸻🛠 How to Detect and Remove KadNapSecurity experts recommend checking routers for signs of compromise:Look for:•SSH enabled unexpectedly•Remote administration enabled•Unknown certificates or scheduled tasks•Suspicious entries in device logsBecause the malware attaches to configuration files, simply rebooting or restoring a configuration backup will not remove it.The proper remediation process:1.Perform a full factory reset2.Update the router firmware immediately3.Manually reconfigure the router (do not restore backups)Experts also recommend changing default internal network ranges, such as moving away from the common 192.168.1.x subnet.⸻🔗 Source Articlehttps://arstechnica.com/security/2026/03/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 3/9/26 | ![]() Google Quantum-Proofs HTTPS, 6G Hits 1 Tbps, and Internet Over LASERS?! | IT SPARC Cast | In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt break down three major developments shaping the future of networking and internet infrastructure.Google begins testing a new quantum-resistant HTTPS certificate approach designed to defend the web against future quantum computing attacks. Meanwhile, Qualcomm’s CEO declares that the coming 6G mobile revolution will be essential for AI-driven applications, promising speeds up to 1 Tbps and sub-millisecond latency. Finally, TaaraConnect introduces a 25-Gbps laser-based networking system capable of delivering fiber-like speeds between buildings without laying cable.From quantum-safe encryption to AI-driven wireless networks and laser communication links, this episode explores how the next generation of connectivity will reshape enterprise IT infrastructure, data centers, and global networks. ⸻Show Notes00:00 – Intro⸻📰 News Bytes00:51 – Google Quantum-Proofs HTTPS with Compact CertificatesGoogle and Cloudflare are testing a new method to make HTTPS certificates resistant to future quantum attacks.Instead of traditional signature chains, the system uses Merkle Tree Certificates (MTCs) to dramatically shrink quantum-safe cryptographic data from roughly 15 KB down to about 700 bytes, making it practical for real-world internet use.The experiment begins with about 1,000 TLS certificates, with standards work underway through the IETF. If successful, this approach could become a foundational component of post-quantum internet security.The big unknown: how much processing overhead these new cryptographic methods will require on older client devices.https://arstechnica.com/security/2026/02/google-is-using-clever-math-to-quantum-proof-https-certificates/ ⸻05:42 – Qualcomm CEO Says the 6G Revolution Is ComingAt Mobile World Congress, Qualcomm CEO Cristiano Amon argued that the AI era will demand 6G networks, dramatically increasing bandwidth and lowering latency.Projected 6G capabilities include:• Speeds of 100 Gbps to 1 Tbps• Sub-millisecond latency• Massive connectivity for billions of devices• AI-driven network managementThe shift toward AI-heavy cloud processing means network traffic will become even more north-south oriented, sending massive datasets between edge devices and cloud infrastructure.Early 6G trials are expected around 2028, with broader deployments beginning around 2029.https://fortune.com/2026/03/03/qualcomm-ceo-resistance-is-futile-6g-mobile-revolution-approaches/⸻13:31 – TaaraConnect Uses Lasers to Deliver 25-Gbps InternetTaaraConnect is developing a laser-based point-to-point networking system capable of delivering up to 25 Gbps over distances of about 6 miles (10 km).Instead of radio waves, the system transmits data using focused beams of light, creating fiber-like connectivity without physical cables.Key features include:• Adaptive beam alignment• Automatic power adjustments during interference• Redundant beam paths to mitigate disruptions• Low-latency high-bandwidth links between buildingsWhile heavy fog remains the primary limitation, the technology could provide a powerful alternative to expensive metro fiber deployments, particularly in dense urban environments.https://newatlas.com/telecommunications/google-taara-25gbps-internet-cities-light/⸻🔁 Wrap Up19:31 – Mail BagListener Xavier shares thoughts on the rising cost of compute power and suggests that bio-AI systems using living neurons could eventually deliver superior performance-per-watt compared to traditional silicon chips.The discussion highlights a growing industry focus on compute efficiency and power consumption as data center infrastructure scales to support AI workloads.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 3/6/26 | ![]() Android CVE-2026-21385: The IoT Devices IT Forgot to Patch | In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt dive into a newly exploited Android vulnerability that many IT teams may be overlooking.The issue centers around CVE-2026-21385, a high-severity vulnerability affecting Qualcomm graphics components used in Android devices. While the vulnerability requires physical access, it is actively being exploited in the wild, making it a serious concern for enterprise IT environments.But the real story isn’t smartphones.The bigger risk lies in Android devices hiding in plain sight across enterprise infrastructure — including point-of-sale terminals, warehouse scanners, embedded industrial systems, and other IoT devices that often run outdated Android versions and rarely receive timely security updates.⸻🔎 CVE-2026-21385 Overview•CVE: CVE-2026-21385•Severity: High (CVSS 7.8)•Component: Qualcomm GPU graphics driver used in Android•Exploit Status: Actively exploited in the wild•Access Required: Physical access•Patch: Included in March 2026 Android Security BulletinSeveral additional vulnerabilities were also patched in the same release, including critical Android framework remote code execution flaws, increasing the urgency for organizations to deploy updates wherever possible.⸻⚠ Why Enterprise IT Should CareMost organizations focus on employee phones when thinking about Android security.However, the real exposure often comes from embedded Android devices that organizations forget about:Common examples include:•Point-of-sale payment terminals•Warehouse inventory scanners (Zebra, Honeywell, etc.)•Retail handheld devices•Industrial control panels•Vehicle infotainment systems running Android•Embedded tablets in appliances or machineryMany of these devices:•Run older Android versions•Receive delayed or nonexistent updates•Expose USB or physical ports that could enable exploitation•Are connected to internal networksIf compromised, these systems could become the first step in a lateral network attack.⸻🔐 Key Security TakeawaysOrganizations should treat this vulnerability as a wake-up call for Android-based IoT security.Recommended actions:•Inventory all Android-based devices in your environment•Identify IoT or embedded Android systems•Verify whether vendors provide security updates•Push vendors for timelines if patches are not available•Segregate IoT devices onto isolated networks•Lock down physical access and exposed USB portsIgnoring embedded Android devices can create a hidden attack path directly into corporate networks.⸻💬 Listener FeedbackFollowing last week’s episode discussing the Conduent ransomware breach, listeners shared their experiences receiving breach notification letters.One listener reported receiving a notification despite not participating in government assistance programs, while another reported being impacted through health insurance providers like Blue Cross Blue Shield.The scope of the Conduent breach appears to be continuing to expand, reinforcing the importance of monitoring vendor supply-chain exposure.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 3/2/26 | ![]() Anthropic Drops Safety Pledge, Open Source Security Crisis & OpenAI’s Compute Crunch | In this episode of IT SPARC Cast – News Bytes, John Barger and Lou Schmidt break down three major stories shaping the future of AI, enterprise infrastructure, and software security.Anthropic revises its flagship AI safety pledge amid competitive pressure, open source registries warn they lack funding for basic security protections, and OpenAI scrambles for compute power as large-scale infrastructure plans stall.From AI governance and supply chain risk to infrastructure bottlenecks and power constraints, this episode explores what enterprise IT leaders need to be watching right now.⸻⏱️ Show Notes00:00 – IntroAnthropic revises its safety framework, open source ecosystems struggle to fund security, and OpenAI races to secure compute capacity as infrastructure constraints tighten across the AI industry.⸻📰 News Bytes⸻00:44 – Anthropic Drops Flagship Safety PledgeAnthropic has revised its 2023 Responsible Scaling Policy, removing its categorical commitment to halt training if safety guarantees could not be ensured in advance. The company says the shift reflects rapid AI advancement, competitive pressures, and the need for transparency over unilateral restrictions.John and Lou unpack what this means for enterprise deployments: Is this a rollback of safety? Or a move toward operational flexibility and published risk roadmaps? The bigger issue may be how AI vendors balance guardrails, customer control, and competitive pressure.https://time.com/7380854/exclusive-anthropic-drops-flagship-safety-pledge/ ⸻08:16 – Open Source Registries Can’t Afford Basic SecurityMajor open source ecosystems such as PyPI, npm, RubyGems, and others are reportedly facing funding shortfalls that threaten their ability to implement fundamental security protections.With supply chain attacks on the rise and AI accelerating code generation, underfunded registries present a growing enterprise risk. The hosts discuss why “free” does not mean costless — and why corporate IT teams must contribute financially or through engineering resources to sustain the security of the tools they depend on.https://www.theregister.com/2026/02/16/open_source_registries_fund_security/ ⸻12:36 – Inside OpenAI’s Scramble to Secure Compute After Stargate StalledOpenAI’s large-scale infrastructure plans have reportedly slowed, forcing the company to seek alternative compute sources to sustain AI growth.The episode explores the real bottlenecks: wafer starts, power generation, turbines, construction capacity, data center labor, and capital coordination. With AI revenue tightly correlated to compute availability, infrastructure constraints may be the biggest story in AI for 2026 and beyond.https://www.theinformation.com/articles/inside-openais-scramble-get-computing-power-stargate-stalled ⸻🔁 Wrap Up19:15 – Mail BagListener Xavier highlights how surface-level headlines often hide deeper enterprise implications — a reminder that IT leaders must look beneath the story to understand downstream risk and opportunity.20:36 – Wrap UpFrom AI safety governance and competitive pressure to supply chain funding gaps and compute shortages, Episode 27 reinforces one theme: infrastructure, transparency, and long-term planning now define enterprise AI strategy.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 2/27/26 | ![]() Conduent Ransomware Breach Hits 25 Million – HR & Benefits Data Exposed | In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break down a massive ransomware-driven data breach impacting Conduent, a major business process services provider that handles public sector programs, healthcare benefits processing, and corporate HR services.What began as reports of a 10.5 million record breach has now escalated to an estimated 25 million impacted individuals, with the ransomware group SafePay claiming responsibility and alleging over 8 terabytes of data exfiltrated.⸻🔎 What Happened?Conduent, which provides backend processing for government assistance programs and health benefits, confirmed that sensitive personal and corporate information may have been exposed.Reported exposed data includes:•Names•Dates of birth•Addresses•Social Security numbers•Employment records•Financial information•Medical and health insurance details•Internal business documentsSafePay ransomware actors reportedly gained access through compromised credentials and then moved laterally through Conduent’s systems.This is a textbook example of a chained cyberattack, where one small compromise enables full-scale enterprise exposure.⸻🌎 Scope of the ImpactThe breach affects multiple U.S. states and programs, including:•Texas (~15.4 million impacted)•Oregon (~10.5 million impacted)•Delaware•Massachusetts•New Hampshire•Georgia•South Carolina•New Jersey•Maine•New MexicoPrograms potentially affected:•Medicaid•SNAP / EBT food assistance•Unemployment benefits•Health insurance processing (including Blue Cross Blue Shield and Humana)•Corporate employee benefit programsAdditionally, approximately 17,000 Volvo Group North America employees may have been impacted.⸻⚠ Why This Matters for Enterprise ITThis is not “just” a public-sector breach.Many private companies rely on Conduent for backend benefits processing. If your organization uses:•Blue Cross Blue Shield•Humana•Third-party HR / benefits processorsYou must immediately:•Contact your HR and benefits teams•Request incident briefings from vendors•Determine if employee data was exposed•Prepare remediation and communication plans⸻🔐 Security Lessons•Credential compromise remains a primary entry point•Lateral movement amplifies initial footholds•Ransomware groups continue combining encryption with large-scale data exfiltration•Transparency and timely disclosure are criticalConduent acknowledged the breach, engaged forensic investigators, and notified impacted parties — a necessary and responsible response.⸻💬 Listener FeedbackThe episode also includes feedback from Kevin regarding last week’s Apple iOS 26 patch discussion. While some users hesitate to upgrade due to UI and stability concerns, security patches addressing critical vulnerabilities must take priority.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 2/23/26 | ![]() Anthropic vs. The Pentagon, HDD Sellout 2026, and Copilot’s Confidential Email Bug | In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt unpack three stories that expose the real friction points in enterprise IT: AI ethics in defense contracts, looming hardware shortages, and data governance risks in Microsoft Copilot.Anthropic and the Pentagon clash over Claude’s military use, Western Digital reports zero remaining HDD capacity for 2026, and Microsoft confirms a Copilot bug that summarized confidential emails. From supply chain strategy to SaaS risk management, this episode highlights why enterprise IT leaders must think beyond features and focus on contracts, capacity, and control.⸻⏱️ Show Notes00:00 – IntroHard drive shortages, AI contract battles, and Copilot privacy concerns headline a week that reinforces one theme: control over infrastructure and software matters more than ever.⸻📰 News Bytes00:46 – Anthropic and the Pentagon Are Reportedly Arguing Over Claude UsageAnthropic pushes back against unrestricted military use of Claude AI, raising ethical, contractual, and operational questions. The Pentagon may reconsider its $200M relationship, exposing a major risk for organizations deploying AI: what happens when vendor policies change after integration?https://techcrunch.com/2026/02/15/anthropic-and-the-pentagon-are-reportedly-arguing-over-claude-usage/ ⸻07:19 – Western Digital Has No More HDD Capacity Left for 2026Western Digital reports its entire 2026 hard drive production is already spoken for. Similar signals from Seagate suggest storage pricing pressure is imminent. The hosts explain why this isn’t just about spinning disks—it’s about AI data center demand driving up costs across RAM, SSDs, GPUs, and enterprise hardware.https://wccftech.com/western-digital-has-no-more-hdd-capacity-left-out/ ⸻12:06 – Microsoft Says Bug Causes Copilot to Summarize Confidential EmailsMicrosoft confirms a Copilot bug that processed confidential emails stored in drafts and sent folders, despite policy settings meant to block them. Although no data reportedly left the organization, the incident underscores governance, SaaS dependency, and AI access-control risks enterprises must plan for.https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/ ⸻🔁 Wrap Up16:42 – Mail BagListener Dennis drops a Back to the Future “jigawatt” reference, and Xavier reinforces the importance of AI security hygiene and fine-grained permission management.17:52 – Wrap UpFinal thoughts on vendor lock-in, AI policy control, supply chain modeling, and why IT leaders need stronger collaboration with finance and legal teams.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/John Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 2/20/26 | ![]() Apple iOS/iPadOS/MacOS CVE-2026-20700 Zero-Day: Sandbox Escape & RCE Explained | In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt examine a critical Apple security vulnerability patched in iOS, iPadOS, macOS, watchOS, tvOS, and visionOS 26.3.The focus: CVE-2026-20700, a memory corruption flaw in Apple’s dynamic link layer that could allow attackers to break out of the sandbox and achieve remote code execution (RCE).Although exploitation requires physical access, the definition of “physical” in today’s hybrid enterprise world is broader than it sounds. Remote management tools, compromised accounts, lost devices, or improperly secured BYOD endpoints can all create real-world exposure.With Apple’s unified “26” operating system line now spanning every platform, this patch affects:•iOS 26.3•iPadOS 26.3•macOS 26.3•watchOS 26.3•tvOS 26.3•visionOS 26.3Security researchers are classifying this vulnerability as critical/high severity, and enterprises are urged to patch immediately.⸻🔎 CVE-2026-20700 Details•Type: Memory corruption•Impact: Sandbox escape → Remote Code Execution•Exploit Path: Physical or logical device access•Risk Level: High/Critical (no official CVSS published)•Fix: Upgrade to Apple OS version 26.3⸻⚠ Why This Matters for Enterprise IT1️⃣ BYOD Risk SurfaceBring-Your-Own-Device policies mean iPhones, iPads, and Macs often connect to corporate networks without full administrative control. A vulnerable device on your network increases lateral movement risk.2️⃣ Physical Access Isn’t Just “Someone in the Room”Remote tools, compromised Apple IDs, or stolen devices expand the meaning of physical access.3️⃣ Upgrade Hesitation Is RealApple’s 26 release introduced major UI changes (including the controversial glass interface). Stability concerns have led some users to delay upgrades — increasing exposure time.Security must outweigh aesthetic or usability concerns.⸻🛠 Enterprise Recommendations•Immediately communicate required upgrade to 26.3•Enforce OS minimum versions where possible•Review BYOD policies and mobile device controls•Audit Apple device access on corporate networks•Educate users about lost/stolen device risk⸻💬 Listener FeedbackThe episode also includes commentary from Chris, a general counsel and chief risk officer, who responded to last week’s Notepad RCE discussion. He raises an important point about expanding application functionality increasing attack surface — a lesson that applies here as well.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 2/16/26 | ![]() UniFi 10.1, AI Data Centers Go Nuclear, and SpaceX Eyes Orbital Compute | In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt break down a week where enterprise IT collided with energy policy, nuclear power, and outer space. UniFi Network 10.1 pushes further into enterprise territory with improved scalability and Wi-Fi visibility. Meanwhile, the White House explores voluntary agreements to manage rising energy costs from AI data centers.Then things escalate: hyperscalers begin signing real contracts for next-generation nuclear power, and Elon Musk gets serious about orbital data centers—suggesting that the future of compute may extend beyond the planet. If you’re tracking AI infrastructure, network evolution, and the power constraints shaping the industry, this episode connects the dots.⸻⏱️ Show Notes00:00 – IntroJohn and Lou preview a week dominated by UniFi upgrades, federal energy discussions, nuclear power tipping points, and serious momentum toward data centers in space.⸻📰 News Bytes00:44 – UniFi Network 10.1Ubiquiti releases UniFi Network 10.1 with major stability and scalability improvements, Wi-Fi Doctor diagnostics, UI refinements, enhanced policy visibility, and optimizations for Wi-Fi 7 and multi-gig deployments. The hosts discuss why UniFi continues its march toward true enterprise credibility while remaining accessible for SMB and prosumer environments.https://blog.ui.com/article/introducing-unifi-network-10-1 ⸻05:13 – White House Eyes Data Center Agreements Amid Energy Price SpikesAs AI data center expansion drives regional energy price pressure, the White House explores voluntary agreements with major tech companies to shift infrastructure costs away from consumers. The conversation explores the economics of AI growth, the inevitability of nuclear power, and whether energy becomes the defining constraint of the AI race.https://www.politico.com/news/2026/02/09/trump-administration-eyes-data-center-agreements-amid-energy-price-spikes-00772024 ⸻09:02 – Next-Gen Nuclear’s Tipping Point: Meta and Hyperscalers Sign DealsMeta and other hyperscalers begin signing legally binding agreements with next-generation nuclear companies like TerraPower and Oklo. John and Lou explain why signed contracts—not press releases—mark the true tipping point for small modular reactors powering AI infrastructure.https://www.aol.com/articles/next-gen-nuclear-tipping-point-214209248.html ⸻11:34 – Elon Musk Gets Serious About Orbital Data CentersFollowing strategic moves linking xAI and SpaceX, Musk pivots attention toward orbital and lunar infrastructure. The hosts unpack the logic behind space-based data centers, cooling challenges, Starlink integration, and why the economics may be less crazy than they first appear.https://techcrunch.com/2026/02/05/elon-musk-is-getting-serious-about-orbital-data-centers/ ⸻🔁 Wrap Up18:59 – Mail BagListener Jonah questions whether massive AI infrastructure financing signals a bubble. John and Lou explain why AI demand is currently compute-constrained—not hype-driven—and why any financial correction would look very different from the dot-com era.21:52 – Wrap UpFinal thoughts on nuclear inevitability, orbital infrastructure, and the reality that energy—not chips—may define the next decade of enterprise IT.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/John Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 2/13/26 | ![]() Windows Notepad RCE?! CVE-2026-2841 Exposes Windows 11 Users | In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break down a shocking vulnerability: CVE-2026-2841, a Remote Code Execution (RCE) flaw in the modern Windows 11 Notepad application distributed via the Microsoft Store.Yes — even Notepad isn’t safe anymore.This vulnerability stems from a command injection flaw in the modern Windows 11 Store version of Notepad (11.x prior to patch). The issue allows malicious .md (Markdown) files containing crafted links or interactive content to execute arbitrary code when opened and clicked by a user.With a CVSS score of 8.8, this vulnerability becomes especially dangerous when chained with other exploits.⸻🔎 What You Need to KnowCVE-2026-2841 – Windows Notepad RCE•Affects: Windows 11 modern Notepad (Microsoft Store version 11.x prior to Patch Tuesday update)•Does NOT affect: Legacy Notepad on Windows 10, Windows 7, or classic versions•Attack Vector: Malicious .md file delivered via phishing•Trigger: User opens file and clicks embedded link•Impact: Remote Code Execution with user-level permissions•Severity: CVSS 8.8 (High)⸻⚠ Why This Matters•Perfect phishing vehicle: malicious Markdown attachment•Executes arbitrary code under the user’s permissions•Ideal for lateral movement in enterprise environments•Dangerous when combined with other exploits•Many organizations delay Patch Tuesday updates — this one should NOT wait⸻🛠 Mitigation & Recommendations•Immediately update Notepad via Microsoft Store•Audit Windows 11 endpoints for modern Notepad version•Train users to avoid opening unknown .md attachments•Consider simpler text editors for baseline editing tasks•Evaluate enterprise endpoint protection against command injection vectors⸻💻 Alternative Editors (With Security Awareness)John and Lou discuss safer editing alternatives including:•Notepad++•Visual Studio Code / Codeium•Sublime Text•Atom•Vim / NeoVim / Emacs•JetBrains IDEsReminder: More features = more attack surface.⸻💬 Wrap UpJohn and Lou also respond to listener feedback from Andrew regarding their recent OpenClaw security discussion. They clarify their stance:•They are not anti-AI.•They are pro-security.•Bleeding-edge tech requires controlled rollout and sandboxing.•Enterprises must protect privileged data access.Security-first thinking is not fear — it’s responsible IT leadership.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 2/9/26 | ![]() Quantum Breakthroughs, AI Cloud Billions, and Apple’s Margin Squeeze | In this episode of IT SPARC Cast – News Bytes, John Barger and Lou Schmidt explore three stories reshaping enterprise IT strategy. From a quantum cooling breakthrough that could accelerate real-world quantum computing, to Oracle’s plan to raise $50 billion for AI cloud infrastructure, the episode highlights how fast the AI arms race is escalating.They also break down why the AI boom is starting to squeeze Apple’s famously strong profit margins—and what that means for device pricing, silicon supply, and enterprise IT budgets. If you care about where compute, power, and economics collide, this episode connects the dots.📌 Show Notes00:00 – IntroJohn and Lou kick off the episode with a look at why quantum cooling breakthroughs, massive AI cloud investments, and chip supply pressure on Apple all point to accelerating change across enterprise IT.⸻📰 News Bytes00:55 – Chalmers University Makes Quantum CoolResearchers at Chalmers University of Technology unveil a breakthrough quantum refrigeration method that uses controlled noise to improve cooling near absolute zero. The discussion explores why advances like this could rapidly reduce the cost and complexity of quantum computing and push it closer to real enterprise use cases.https://www.sciencedaily.com/releases/2026/01/260129080418.htm ⸻06:10 – Oracle Raising Up to $50B for AI CloudOracle plans to raise up to $50 billion to expand AI-focused cloud data centers as part of Project Stargate. John and Lou unpack why Oracle’s existing enterprise relationships give it a unique advantage—and why power and compute, not demand, may become the real limiting factors for AI growth.https://www.techrepublic.com/article/news-oracle-50b-ai-cloud/ ⸻10:28 – The AI Boom Is Coming for Apple’s Profit MarginsThe surge in AI-driven chip demand is putting pressure on Apple’s historically strong margins. As TSMC capacity is increasingly consumed by Nvidia, OpenAI, and hyperscalers, the hosts break down why Apple may face higher silicon costs—and what that means for device pricing, IT refresh cycles, and enterprise procurement.https://www.msn.com/en-us/money/technology/the-ai-boom-is-coming-for-apple-s-profit-margins/ar-AA1VpgpA ⸻🔁 Wrap Up17:11 – Mail BagListener feedback sparks a nuanced discussion on hybrid work, mandatory office policies, and why management capability—not location—is often the real issue.21:24 – Wrap UpFinal thoughts on quantum acceleration, AI infrastructure economics, and why IT leaders need to prepare for rising hardware costs and longer planning horizons.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/John Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
| 2/6/26 | ![]() Why OpenClaw on Work PCs Puts Enterprise Data at Risk | Agentic AI systems like OpenClaw represent the future of automation, productivity, and intelligent workflows — but today, they also represent a serious and underappreciated enterprise security risk.In this episode of IT SPARC Cast – CVE of the Week, John and Lou break down why running OpenClaw (and related platforms like MoltBook) on corporate hardware or with access to enterprise data is dangerous right now, even if the long-term vision is compelling.The discussion centers on three types of OpenClaw users:1.Sandbox Experimenters – Users running OpenClaw in isolated labs or test environments with no access to corporate data.2.Dedicated VM / Hardware Users – Users running OpenClaw separately, but still granting it access to cloud services, email, or internal APIs.3.Daily Driver Users – Users installing OpenClaw directly on work PCs and giving it full access to files, email, chat, and automation tools.John and Lou argue that only the first group is safe today.Groups #2 and #3 dramatically expand the attack surface, introducing risks such as credential exfiltration, indirect prompt injection, data leakage, and supply-chain style compromises via third-party “skills.”The episode uses a “bio hotcell” analogy: OpenClaw can be used safely only when isolated, constrained, monitored, and treated as potentially hazardous. Without those controls, it becomes a silent data-exfiltration engine operating entirely inside allowed enterprise workflows.The takeaway for IT leaders is clear:HR and IT must act together now to define policies that prohibit OpenClaw and MoltBook from running on corporate devices or accessing corporate data until proper governance, tooling, and security controls exist.⸻🔚 Wrap Up & LinksFollow and connect with us:IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information. | — | ||||||
Showing 25 of 155
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
1 placement across 1 market.
Chart Positions
1 placement across 1 market.

























