{"id":16531,"date":"2025-04-28T11:45:03","date_gmt":"2025-04-28T18:45:03","guid":{"rendered":"https:\/\/structured.com\/?page_id=16531"},"modified":"2026-04-28T12:37:08","modified_gmt":"2026-04-28T19:37:08","slug":"structured-insights","status":"publish","type":"page","link":"https:\/\/structured.com\/resources\/structured-insights\/","title":{"rendered":"Podcasts"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><\/p>\n\n\n<section  class=\"featured-copy\" style=\"background-color: #ffffff;background-size: cover;\">\n    <div class=\"one-column\">\n\t\t\n\n<h1 class=\"wp-block-heading has-text-align-center\" id=\"h-revealing-the-future-of-it-with-structured-insights\">Revealing the Future of IT with Structured Insights<\/h1>\n\n\n\n<p class=\"has-text-align-center\">Welcome to <em>Structured Insights<\/em>, the go-to podcast from Structured Communication Systems for IT professionals navigating digital transformation. Each episode dives into expert-led discussions on IT infrastructure, cybersecurity, AI, and emerging technologies. Stay informed with actionable insights and forward-thinking strategies that help your business lead in a rapidly evolving tech landscape.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Stream the latest episodes below or on your favorite podcast platform!<\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.youtube.com\/playlist?list=PLlAco6Dwujfi8GNcBdxT7UqiZxPIWDN_4\" style=\"border-radius:12px\" target=\"_blank\" rel=\"noreferrer noopener\">Watch On YouTube<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/open.spotify.com\/show\/0vS5YVRiPgQ6KZTa0ewWLI?si=6de2e8dd09ea4b59\" style=\"border-radius:12px\" target=\"_blank\" rel=\"noreferrer noopener\">Listen On Spotify<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/podcasts.apple.com\/us\/podcast\/structured-insights\/id1805980167\" style=\"border-radius:12px\" target=\"_blank\" rel=\"noreferrer noopener\">Listen On Apple Podcasts<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/music.amazon.com\/podcasts\/d7b72de1-cd5d-457d-aa8c-cf20e414765c\/structured-insights\" style=\"border-radius:12px\" target=\"_blank\" rel=\"noreferrer noopener\">Listen On Amazon Music<\/a><\/div>\n<\/div>\n\n\n    <\/div>\n<\/section>\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"h-podcast-episodes\"><strong>Podcast Episodes<\/strong><\/h2>\n\n\n\n<hr class=\"wp-block-separator aligncenter has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/dymxh8k5oh.js\" async type=\"module\"><\/script><style>wistia-player[media-id='dymxh8k5oh']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/dymxh8k5oh\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"dymxh8k5oh\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-15\">Episode #15<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-no-customer-left-behind-inside-hpe-juniper-s-integration-and-what-it-means-for-your-network\">No Customer Left Behind: Inside HPE Juniper\u2019s Integration and What It Means for Your Network<\/h4>\n\n\n\n<p>The future of enterprise networking is no longer just about connectivity, it is about intelligence. With HPE and Juniper Networks coming together, organizations are asking how networking can better support AI initiatives, stronger security, and simpler operations across distributed environments.<\/p>\n\n\n\n<p>In this episode of Structured Insights, Structured speaks with HPE leadership about the strategic impact of the HPE and Juniper integration, what it means for customers, the rise of AI-native networking, and the changing role of the network in enterprise transformation.<\/p>\n\n\n\n<p>Featuring HPE&#8217;s Regional Sales Director Darren Mudd and Regional Sales Director Tracy McFall, this conversation explores how enterprise leaders are thinking about the next generation of networking strategy and what that could mean for the future of modern infrastructure.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/j5Z4dx2Q44c\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/62cc9tz53m.js\" async type=\"module\"><\/script><style>wistia-player[media-id='62cc9tz53m']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/62cc9tz53m\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"62cc9tz53m\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-14\">Episode #14<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-ai-security-what-s-real-what-s-risky-what-s-next\">AI Security: What&#8217;s Real, What&#8217;s Risky, What&#8217;s Next.<\/h4>\n\n\n\n<p>AI security is no longer a future concern; it\u2019s a challenge organizations are facing right now. In this episode of Structured Insights, CRO Bill Tracy of Structured is joined by Aaron McAllister, principal solutions architect at Cloudflare, to explore how AI is reshaping IT security. The conversation breaks down where AI disrupts traditional security models, why visibility and intent matter more than ever, and how governance, access controls, and oversight must evolve as AI moves from data consumption to decision\u2011making. Packed with practical guidance, real\u2011world examples, and a bonus lightning round, this episode helps IT and security leaders better understand AI risks, and what to do about them in today\u2019s AI\u2011driven environments.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/fIoPzhTFW1E\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/jfztv1ktjh.js\" async type=\"module\"><\/script><style>wistia-player[media-id='jfztv1ktjh']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/jfztv1ktjh\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"jfztv1ktjh\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-13\">Episode #13<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-defining-cyber-preparedness-in-2026\">Defining Cyber Preparedness in 2026<\/h4>\n\n\n\n<p>Cybersecurity in 2026 is being reshaped by AI-powered cyber threats, including advanced phishing, deepfakes, and automated attacks. This episode explores how the threat landscape is accelerating, why compliance alone is no longer enough, and the key cybersecurity trends shaping modern security strategy. Learn how organizations can build proactive cyber preparedness programs to strengthen detection, response, and recovery while reducing real-world risk.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/ktc6LdRMtPE\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/b4jlmxc8bu.js\" async type=\"module\"><\/script><style>wistia-player[media-id='b4jlmxc8bu']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/b4jlmxc8bu\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"b4jlmxc8bu\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-12\">Episode #12<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-mdr-the-new-era-of-cybersecurity\">MDR: The New Era of Cybersecurity<\/h4>\n\n\n\n<p>In this episode of Structured Insights, we take you inside the world of Managed Detection and Response (MDR). We break down what MDR really means, clear up common misconceptions, and explain why comprehensive data visibility is critical. You\u2019ll get practical tips for evaluating vendors, insights into economic considerations, and a closer look at the balance between human expertise and automation. Plus, we explore how AI is shaping the future of MDR\u2014underscoring that this service isn\u2019t here to replace your SOC, but to make it stronger and more resilient.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/HAGpL-hW494\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/dwhdc4s44k.js\" async type=\"module\"><\/script><style>wistia-player[media-id='dwhdc4s44k']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/dwhdc4s44k\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"dwhdc4s44k\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-11\">Episode #11<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-microsoft-licensing-insights\">Microsoft Licensing Insights<\/h4>\n\n\n\n<p>In this episode of Structured Insights, we break down the complexities of the Microsoft cloud ecosystem and what IT leaders really need to know. From misunderstood Microsoft licensing models and compliance pitfalls to the evolving role of Microsoft Copilot in enterprise environments, this conversation is packed with practical insights.<\/p>\n\n\n\n<p>Whether you\u2019re navigating cloud migration, managing enterprise IT compliance, or preparing for the future of #AI in Microsoft 365, this episode delivers the clarity you\u2019ve been looking for.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/t_Trwph1t1w\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/54og4olptq.js\" async type=\"module\"><\/script><style>wistia-player[media-id='54og4olptq']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/54og4olptq\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"54og4olptq\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-10\">Episode #10<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-technology-ai-and-automation\">Technology, AI, and Automation<\/h4>\n\n\n\n<p>What does network automation really mean in 2025? <\/p>\n\n\n\n<p>From eliminating routine tasks to leveraging AI for real-time troubleshooting, platforms like Juniper Mist are fundamentally transforming how IT teams deliver seamless, resilient user experiences. Discover how automation is redefining performance, predictability, and business expectations \u2014 and why AI has become the backbone of today\u2019s high-performing networks for IT leaders, network managers, and business strategists alike.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/8Hb5BlbxW4s\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/3cc5h51kis.js\" async type=\"module\"><\/script><style>wistia-player[media-id='3cc5h51kis']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/3cc5h51kis\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"3cc5h51kis\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-9\">Episode #9<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-your-blueprint-for-cyber-resilience\">Your Blueprint For Cyber Resilience<\/h4>\n\n\n\n<p>Cyber resilience isn\u2019t just about having backups\u2014it&#8217;s about having a strategy that protects your business, your customers, and your reputation. In this episode of Structured Insights, we explore why SaaS apps still need backup plans, how AI is helping detect vulnerabilities before they\u2019re exploited, and why modern solutions like Rubrik are helping to reduce risk and improve recovery posture. With rising insurance costs and increasing threats, now is the time to reassess your business continuity and disaster recovery plans.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/PwyOZ8JuMkA\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/kgkuawacxg.js\" async type=\"module\"><\/script><style>wistia-player[media-id='kgkuawacxg']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/kgkuawacxg\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"kgkuawacxg\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-8\">Episode #8<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-ai-readiness\">AI Readiness<\/h4>\n\n\n\n<p>Does having Copilot really make you AI ready? Spoiler: probably not.<\/p>\n\n\n\n<p>In this episode, we explore how businesses can use AI to scale smarter\u2014starting with security, identifying bottlenecks, and integrating AI into everyday workflows. And of course, it wouldn\u2019t be a Structured podcast without a few laughs along the way as we tackle common myths, share real-world examples, and offer advice for leaders navigating the future of work.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/aiwOTDtW1AY\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/q7ngt87n85.js\" async type=\"module\"><\/script><style>wistia-player[media-id='q7ngt87n85']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/q7ngt87n85\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"q7ngt87n85\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-7\">Episode #7<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-hyperautomation-in-cybersecurity\">Hyperautomation In Cybersecurity<\/h4>\n\n\n\n<p>What does hyper automation mean for your business? <\/p>\n\n\n\n<p>In this episode, we explore how SOC tools are evolving, what technologies are driving change, and how to align automation with your organization\u2019s goals. Whether you\u2019re building a SOC or outsourcing, this episode helps you think strategically about your next move.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/q6m5aD5gRaE\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/9ifvo7or9r.js\" async type=\"module\"><\/script><style>wistia-player[media-id='9ifvo7or9r']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/9ifvo7or9r\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"9ifvo7or9r\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-6\">Episode #6<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-the-ransomware-readiness-playbook\">The Ransomware Readiness Playbook<\/h4>\n\n\n\n<p>Ransomware attacks are inevitable\u2014so how prepared is your business? <\/p>\n\n\n\n<p>This episode explores what real readiness looks like, from building a solid incident response plan to educating users and running tabletop exercises. We cover common myths, key prevention tools, and how companies like Structured help organizations stay resilient and recover smarter.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/qevO_IUSKo8\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/nulwto7ru9.js\" async type=\"module\"><\/script><style>wistia-player[media-id='nulwto7ru9']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/nulwto7ru9\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"nulwto7ru9\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-5\">Episode #5<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-ai-security-on-the-hype-scale\">AI Security on the Hype Scale<\/h4>\n\n\n\n<p>AI is everywhere \u2014 but how secure is it, really? <\/p>\n\n\n\n<p>In this episode of Structured Insights, Reel Axis COO Nick Dinsmoor sits down with Structured&#8217;s CRO Bill Tracy and Director of Cloud Security Collin Miller to unpack what\u2019s real, what\u2019s overhyped, and what your organization should be seriously concerned about when it comes to AI security. From data poisoning and shadow AI to governance gaps and unintended data exposure, this conversation gets into the challenges no one\u2019s talking about \u2014 but everyone needs to hear. <\/p>\n\n\n\n<p>Watch now to find out how to stay ahead of the AI curve without falling into the security traps.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/JXOcxcQx4eU\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/xjbpx5313m.js\" async type=\"module\"><\/script><style>wistia-player[media-id='xjbpx5313m']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/xjbpx5313m\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"xjbpx5313m\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-4\">Episode #4<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-getting-sase-with-cybersecurity\">Getting SASE With Cybersecurity<\/h4>\n\n\n\n<p>Reel Axis COO Nick Dinsmoor joins Structured CRO Bill Tracy on the latest episode of \u201cStructured Insights\u201d to explain how secure access service edge \u2014 or SASE \u2014 streamlines security and connectivity in finance, healthcare and retail. They highlight the zero-trust controls and unified policies that keep widely dispersed financial teams compliant, the cloud-scale protection that safeguards hospitals, clinics and research labs as they grow, and the agile, PCI-friendly connections that help retailers open new stores quickly. The pair also show how managed providers such as Structured can simplify daily operations and deliver a seamless, secure user experience.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/QpScxn4vd54\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/01iaxi9mp8.js\" async type=\"module\"><\/script><style>wistia-player[media-id='01iaxi9mp8']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/01iaxi9mp8\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"01iaxi9mp8\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-3\">Episode #3<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-right-sizing-it-infrastructure\">Right-Sizing IT Infrastructure<\/h4>\n\n\n\n<p>Striking the right balance between performance, cost, and flexibility is no small feat. In this episode of Structured Insights, we explore how organizations can right-size their infrastructure to meet evolving business demands\u2014without overbuilding or falling short. From hybrid cloud strategies to the rise of AI and hyper-converged infrastructure, we break down what it takes to build agile, future-ready systems that scale with your business.<\/p>\n\n\n\n<p>As these demands grow more complex, the right partner can make all the difference. Learn how managed providers like Structured simplify complex environments, improve user experience, and deliver seamless security and connectivity across all verticals.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/1CI0_8cY6Ig\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/xf1n90qrki.js\" async type=\"module\"><\/script><style>wistia-player[media-id='xf1n90qrki']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/xf1n90qrki\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"xf1n90qrki\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-2\">Episode #2<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-zero-trust-access-for-the-enterprise\">Zero Trust Access For The Enterprise<\/h4>\n\n\n\n<p>Zero Trust isn\u2019t just a buzzword \u2014 it\u2019s the future of security. Reel Axis COO Nick Dinsmoor teams up with Structured\u2019s CRO Bill Tracy and Senior Network Engineer Cheryl Hanna unpack what Zero Trust really is (and what it\u2019s not). They tackle real-world challenges, dive into securing access, and explain why layered defenses are critical to staying ahead in today\u2019s fast-moving threat landscape. Ready to rethink security?<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/bUOR9h9__7k\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/o35lhda3qx.js\" async type=\"module\"><\/script><style>wistia-player[media-id='o35lhda3qx']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/o35lhda3qx\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"o35lhda3qx\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-episode-1\">Episode #1<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-what-gives-cisos-a-fright\">What Gives CISOs A Fright<\/h4>\n\n\n\n<p>In our debut episode of Structured Insights, host Nick Dinsmoor sits down with Bill Tracy, CRO at Structured, to debunk cybersecurity myths and explore the essentials of cyber resilience. They dive into the power of Aruba ClearPass, the critical role of Zero Trust security, and the evolving threats posed by AI-driven cyberattacks. With hybrid workforces demanding new security tools and smaller organizations struggling to meet regulatory requirements, the conversation highlights the importance of education, verification, and a methodical security strategy. Tune in to learn how businesses can proactively build cyber resilience in today\u2019s digital landscape.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-feed  wp-block-social-link\"><a href=\"https:\/\/media.rss.com\/structured-insights\/feed.xml\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M2,8.667V12c5.515,0,10,4.485,10,10h3.333C15.333,14.637,9.363,8.667,2,8.667z M2,2v3.333 c9.19,0,16.667,7.477,16.667,16.667H22C22,10.955,13.045,2,2,2z M4.5,17C3.118,17,2,18.12,2,19.5S3.118,22,4.5,22S7,20.88,7,19.5 S5.882,17,4.5,17z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">RSS Feed<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/youtu.be\/_Q8ox_PyF6I\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-normal-font-size\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Podcast Episodes Episode #15 No Customer Left Behind: Inside HPE Juniper\u2019s Integration and What It Means for Your Network The future of enterprise networking is no longer just about connectivity,&#8230;<\/p>\n","protected":false},"author":73,"featured_media":16568,"parent":27,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-16531","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Podcasts - Structured<\/title>\n<meta name=\"description\" content=\"Explore IT trends, cybersecurity, and innovation with expert insights from Structured Insights\u2014your guide to the digital future.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/structured.com\/resources\/structured-insights\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Podcasts\" \/>\n<meta property=\"og:description\" content=\"Explore IT trends, cybersecurity, and innovation with expert insights from Structured Insights\u2014your guide to the digital future.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/structured.com\/resources\/structured-insights\/\" \/>\n<meta property=\"og:site_name\" content=\"Structured\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T19:37:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/structured.com\/wp-content\/uploads\/2025\/03\/Structured-Insights-Featured-Image-1920x650-v3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"8000\" \/>\n\t<meta property=\"og:image:height\" content=\"2709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@structuredinc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/structured.com\\\/resources\\\/structured-insights\\\/\",\"url\":\"https:\\\/\\\/structured.com\\\/resources\\\/structured-insights\\\/\",\"name\":\"Podcasts - Structured\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/structured.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/structured.com\\\/resources\\\/structured-insights\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/structured.com\\\/resources\\\/structured-insights\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/structured.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Structured-Insights-Featured-Image-1920x650-v3.png\",\"datePublished\":\"2025-04-28T18:45:03+00:00\",\"dateModified\":\"2026-04-28T19:37:08+00:00\",\"description\":\"Explore IT trends, cybersecurity, and innovation with expert insights from Structured Insights\u2014your guide to the digital future.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/structured.com\\\/resources\\\/structured-insights\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/structured.com\\\/resources\\\/structured-insights\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/structured.com\\\/resources\\\/structured-insights\\\/#primaryimage\",\"url\":\"https:\\\/\\\/structured.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Structured-Insights-Featured-Image-1920x650-v3.png\",\"contentUrl\":\"https:\\\/\\\/structured.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Structured-Insights-Featured-Image-1920x650-v3.png\",\"width\":8000,\"height\":2709,\"caption\":\"Structured Insights Logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/structured.com\\\/resources\\\/structured-insights\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/structured.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\\\/\\\/structured.com\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Podcasts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/structured.com\\\/#website\",\"url\":\"https:\\\/\\\/structured.com\\\/\",\"name\":\"Structured\",\"description\":\"Security, Cloud, Digital Infrastructure and Managed Services for performant IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/structured.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/structured.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/structured.com\\\/#organization\",\"name\":\"Structured\",\"url\":\"https:\\\/\\\/structured.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/structured.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/structured.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Structured_Logo.png\",\"contentUrl\":\"https:\\\/\\\/structured.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Structured_Logo.png\",\"width\":688,\"height\":317,\"caption\":\"Structured\"},\"image\":{\"@id\":\"https:\\\/\\\/structured.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/structuredinc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/structured-communication-systems\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCUe6H123HjJrTmpGvJN_zpg\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Podcasts - Structured","description":"Explore IT trends, cybersecurity, and innovation with expert insights from Structured Insights\u2014your guide to the digital future.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/structured.com\/resources\/structured-insights\/","og_locale":"en_US","og_type":"article","og_title":"Podcasts","og_description":"Explore IT trends, cybersecurity, and innovation with expert insights from Structured Insights\u2014your guide to the digital future.","og_url":"https:\/\/structured.com\/resources\/structured-insights\/","og_site_name":"Structured","article_modified_time":"2026-04-28T19:37:08+00:00","og_image":[{"width":8000,"height":2709,"url":"https:\/\/structured.com\/wp-content\/uploads\/2025\/03\/Structured-Insights-Featured-Image-1920x650-v3.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@structuredinc","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/structured.com\/resources\/structured-insights\/","url":"https:\/\/structured.com\/resources\/structured-insights\/","name":"Podcasts - Structured","isPartOf":{"@id":"https:\/\/structured.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/structured.com\/resources\/structured-insights\/#primaryimage"},"image":{"@id":"https:\/\/structured.com\/resources\/structured-insights\/#primaryimage"},"thumbnailUrl":"https:\/\/structured.com\/wp-content\/uploads\/2025\/03\/Structured-Insights-Featured-Image-1920x650-v3.png","datePublished":"2025-04-28T18:45:03+00:00","dateModified":"2026-04-28T19:37:08+00:00","description":"Explore IT trends, cybersecurity, and innovation with expert insights from Structured Insights\u2014your guide to the digital future.","breadcrumb":{"@id":"https:\/\/structured.com\/resources\/structured-insights\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/structured.com\/resources\/structured-insights\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/structured.com\/resources\/structured-insights\/#primaryimage","url":"https:\/\/structured.com\/wp-content\/uploads\/2025\/03\/Structured-Insights-Featured-Image-1920x650-v3.png","contentUrl":"https:\/\/structured.com\/wp-content\/uploads\/2025\/03\/Structured-Insights-Featured-Image-1920x650-v3.png","width":8000,"height":2709,"caption":"Structured Insights Logo"},{"@type":"BreadcrumbList","@id":"https:\/\/structured.com\/resources\/structured-insights\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/structured.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/structured.com\/resources\/"},{"@type":"ListItem","position":3,"name":"Podcasts"}]},{"@type":"WebSite","@id":"https:\/\/structured.com\/#website","url":"https:\/\/structured.com\/","name":"Structured","description":"Security, Cloud, Digital Infrastructure and Managed Services for performant IT","publisher":{"@id":"https:\/\/structured.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/structured.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/structured.com\/#organization","name":"Structured","url":"https:\/\/structured.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/structured.com\/#\/schema\/logo\/image\/","url":"https:\/\/structured.com\/wp-content\/uploads\/2020\/09\/Structured_Logo.png","contentUrl":"https:\/\/structured.com\/wp-content\/uploads\/2020\/09\/Structured_Logo.png","width":688,"height":317,"caption":"Structured"},"image":{"@id":"https:\/\/structured.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/structuredinc","https:\/\/www.linkedin.com\/company\/structured-communication-systems\/","https:\/\/www.youtube.com\/channel\/UCUe6H123HjJrTmpGvJN_zpg"]}]}},"_links":{"self":[{"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/pages\/16531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/users\/73"}],"replies":[{"embeddable":true,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/comments?post=16531"}],"version-history":[{"count":119,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/pages\/16531\/revisions"}],"predecessor-version":[{"id":19399,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/pages\/16531\/revisions\/19399"}],"up":[{"embeddable":true,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/pages\/27"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/media\/16568"}],"wp:attachment":[{"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/media?parent=16531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}