In the latest episode of the Tech Field Day News Rundown, Tom Hollingsworth and Chris Grundemann cover significant updates and insightful perspectives on key technology developments, including Qlik’s new solutions, the ongoing competitive dynamics between SpaceX and Amazon, and the practical applications of quantum computing emerging in the industry. The discussion provides a thorough analysis of how these technologies are evolving and what it means for the enterprise IT landscape. For additional content and a deeper understanding of these topics, visit our YouTube channel.
Security Is More Than AI in 2026
There’s more to security than AI models and keeping them safe. Identity and user security are sure to be hot topics during this year’s RSAC Conference. In this episode, Tom Hollingsworth is joined by Jack Poller and Drew Conry-Murray as they discuss what’s hot in the non-AI areas of security. They discuss the importance of identity-based security and how it can be extended to include non-human employees. They also discuss how enterprises are focused on securing browsers with extensions and not forcing a specific application. The guests debate the advantages and disadvantages of all of these aspects as well as how AI will eventually provide additional context around them all.
AI Tooling is Causing Identity Security Issues with 1Password
The rise of AI tooling and agents in the enterprise has created a gap with identity security platforms. Addressing that gap remains challenging when so much is still unclear about how users and agents interact. In this episode of the Tech Field Day podcast, brought to you by 1Password, Tom Hollingsworth is joined by Kate Scarcella, Jack Poller, and Sanjay Ramnath of 1Password.
The panel discusses the shift from client-server models to the new agentic landscape. They talk about the challenges of tracking activity and how static credential management is unable to keep up. They also talk about the need for business to lead the change in IT and enable security to keep up with the current velocity of features. They also discuss how there needs to be a shift in the way that companies develop and apply security policy to users, both physical and digital.
From Brownfield Complexity to Automated Fabric at Global Scale
In this insightful article by Scott Robohn, he addresses the transformation from the complexities of brownfield environments to the implementation of automated fabric on a global scale. He emphasizes the necessity for organizations to adopt streamlined and efficient networking systems, adopting a strategic approach to overcome infrastructure challenges. For further coverage from Networking Field Day 39, explore articles at Techstrong IT.
Your Security Strategy Needs Graphs
Modern security needs more than checklists. Instead of working down a process you need to start thinking like the attackers trying to get into your systems. In this episode of the Tech Field Day Podcast, Jay Cuthrell and Girard Kavelines join Tom Hollingsworth to discuss how Microsoft Sentinel helps bring this new security strategy to your environment.
They discuss the advances that have been made in data lake technology, including the increased retention time offered by Microsoft. They also talk about the way that graphs help train new security analysts to understand the way that attackers think. They discuss how you can adapt your plans in the new year to take advantage of new offerings and the questions you should be asking to make sure you’re not missing out.
2026 Is A Bright Year for HPE and Juniper
2025 was a big year for both HPE and Juniper, but 2026 is the year when the real integration starts. In this episode of the Tech Field Day podcast, Tom Hollingsworth is joined by wireless experts Jonathan Davis and Keith Parsons as they look at the acquisition of Juniper Networks by HPE and what the future holds for the new combined company.
They discuss how the culture of the two companies is coming together as well as the unification of their management platforms. They look at the differences between Juniper Mist and Aruba Central and which platform will be the one users log into going forward. The guests also look at the competition between Cisco and HPE and how the race will develop as customers look to refresh their installations and what they are likely to choose.
Tech Field Day Takeaways for 2025: Making AI Less Manic
2025 was the year of AI Mania. Everyone wants you to know where they stand with AI in their product. Tech Field Day has a different approach. In this special year end episode, Tom Hollingsworth, Stephen Foskett, and Alastair Cooke look back at the discussions and deep dives into AI and how Tech Field Day grounded them all in practical real terms. Our event leads discuss the boring reality of AI tools and how AI has a dual nature that must be understood to get real value. They also debate the changing landscape of security where AI is concerned, including the importance of data sovereignty. They wrap up with a focus on the fundamentals and how Tech Field Day continues to make those important for the community at large.
Graphiant Makes Network Governance King in the AI Era
Tom Hollingsworth recently discussed how Graphiant is revolutionizing network governance by leveraging artificial intelligence to enhance control and visibility across networks. He explained that this evolution is crucial as we navigate through the expanding complexities within IT environments. To watch for more coverage from Networking Field Day 39 at Techstrong IT.
Building Better Operations with Nokia EDA
Tom Hollingsworth recently explored how Nokia’s EDA (Extreme Data Analytics) platform is enhancing operational processes by leveraging advanced analytics to automate and optimize network performance. This system not only improves efficiency but also significantly reduces operational overheads, empowering network operators with more agile and scalable solutions. For further coverage from Networking Field Day 39, watch Techstrong IT.
Commvault Launches AI Powered Cloud Unity Platform – YouTube
Tom Hollingsworth recently explored the launch of Commvault’s latest innovation, the AI-powered Cloud Unity platform, in a new YouTube video. This platform is designed to enhance data management capabilities by integrating artificial intelligence to streamline cloud operations. For more insights from Commvault SHIFT 2025, follow us on social media, and catch new episodes of the Tech Field Day Rundown every Wednesday on YouTube.
Securing the New Identity Perimeter with Commvault
In a recent post by Tom Hollingsworth, the focus was placed on the innovative steps Commvault is taking to secure what is now referred to as the new identity perimeter. This concept underscores the shift in data management and protection strategies, as organizations increasingly recognize the importance of securing identity data amidst evolving cybersecurity threats. You can find more coverage from Commvault SHIFT 2025 on LinkedIn!
Commvault Shift 2025 Live Blog
Join us for our coverage of Commvault Shift with our Live Blog! Tune in now to see what our delegates are saying.
DNS Must Be Secured Presented by Infoblox
DNS security is no longer optional. This service is not only being attacked by nefarious actors but it is also being leveraged in ways to compromise users and exfiltrate data. In this episode of the Tech Field Day podcast, brought to you by Infoblox, Tom Hollingsworth is joined by Jack Poller and Cricket Liu. They talk about the historical openness of DNS and how that has led to it becoming easy to see what users are doing and create ways to manipulate them. They discuss ways to secure the protocol and how companies like Infoblox are extending the capabilities for future security.
Bridging the Trust Gap with 1Password
Tom Hollingsworth recently explored how 1Password can help bridge the trust gap in today’s security environment by providing robust password management solutions that enhance data protection and user trust. His insights point towards the increasing relevance of secure password vaults in maintaining privacy and integrity in digital transactions. For more coverage of Security Field Day 14, visit Security Boulevard.
NetAIOps Has Its Challenges
The industry has embraced AI for every possible problem. Operations will eventually embrace it as well but questions remain about how it will be implemented. In this episode, Tom Hollingsworth sits down with Pete Welcher, Rita Younger, and Jonathan Davis to discuss the issues that remain with implementing AI into an operations workflow. They discuss licensing and procurement, the need for institutional knowledge, and how this will all work in a multivendor world. They wrap up with some guidance about how to approach your next big AIOps project.
Your Enterprise LAN Security Is a Problem—Nile Can Fix It
Tom Hollingsworth examines the significant challenges facing enterprise LAN security, highlighting how vulnerable traditional network infrastructures can be to sophisticated cyber threats. He introduces Nile, a new security solution that promises to address and mitigate these vulnerabilities effectively. For additional insights into Nile’s impact on enterprise security, visit Tom Hollingsworth’s coverage on Security Boulevard.
How HPE’s New Security Playbook Is Actually Stopping Threats
In this article following Security Field Day 14, Tom Hollingsworth examines Hewlett Packard Enterprise’s innovative approach to cybersecurity, detailing how their new security strategies are effectively mitigating threats. He highlights the integration of advanced tools and protocols that are setting new standards in the industry for protecting enterprise data assets. For additional insights into this topic, check out the coverage on Security Boulevard.
Passkeys are the Future
Passwords create friction and therefore users find ways around them. New technology such as secure enclaves and PKI allow us to create better solutions like passkeys. In this episode of the Tech Field Day Podcast. Alan Shimel and Kate Scarcella join Tom Hollingsworth to discuss the problems with traditional passwords and how passkeys overcome them. They also talk about why it has taken so long to adopt passkeys and what barriers remain to full implementation. The wrap up with a look at what might lay ahead on the horizon for the future of user security.

















