Techstrong TV Interviews

Techstrong TV Interviews

Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.

Share
Techstrong TV Interviews
  • Fifth Annual State of Pentesting Report - Caroline Wong, Cobalt

    Cobalt announced its fifth annual State of Pentesting Report. This year’s report highlights the impact of talent shortages and budget cuts on security teams’ performance and plans for 2023. Cobalt is releasing a Pentest Management Platform (PMP) to increase the efficiency and quality of pentestin...

  • Evolving Network Monitoring Strategies - Jeremy Rossbach, Broadcom

    With the proliferation of cloud, SaaS and SD-WAN adoption, 75% of today’s user experiences are now delivered over networks you don’t own. So how do you guarantee network delivery when your users are no longer using your network? With over half of today’s SD-WAN deployments failing and 92% of IT o...

  • Malicious Packages Special Report

    Mitch Ashley and Jeanette Sherman, Mend.io, highlight the risks associated with downloaded and using packages from package managers and discuss the alarming increase in the number of malicious packages. They also underscore the significance of incorporating security practices throughout the softw...

  • Elastic Common Schema - Ken Exner, Elastic

    Elastic Common Schema (ECS), an open source specification, has been accepted by the OpenTelemetry project supporting a common schema for metrics, logs, traces, and events data. Elastic's CPO Ken Exner will share how this contribution and OpenTelemetry can help with your observability and security...

  • Data Controls Cloud Platform - Rehan Jalil, Securiti

    Rehan and the Securiti team are redefining the way enterprises maneuver their data obligations. Securiti is pioneering the unified data controls (UDC) space with its Data Controls Cloud, a platform that eliminates the traditional silos between data security, privacy, compliance and governance. Th...

  • Monitoring Cloud Data - Yotam Ben Ezra, Dig Security

    Yotam Ben Ezra, CPO of Dig Security, discusses the importance of monitoring cloud data in an organization, and the consequences he has seen first hand from not doing so.

  • Enabling Data-Informed Edge Decisions - Theresa Lanowitz, AT&T Cybersecurity

    Theresa speaks on why it’s important for CISOs to recognize that the edge is evolutionary and not revolutionary, the part they play in breaking down silos to ensure business/tech leaders are coming together to make more data-informed decisions surrounding the edge, and what the most prominent edg...

  • 2023 Ransomware Insights Report - Fleming Shi, Barracuda Networks

    On March 28, Barracuda Networks released its 2023 Ransomware Insights Report, which questioned IT professionals from frontline to the most senior roles at companies across the globe. Among other findings, the report found that companies with cyber insurance were more likely to be hit by a ransomw...

  • Cyberattacks on Software-Defined Vehicles - Mike Pedrick, Nuspire

    Mike Pedrick, vice president of cybersecurity consulting for Nuspire, explains how software-defined vehicles are becoming a target for cyberattacks.

  • The State of Application Security 2023 - Renny Shen, Checkmarx

    Renny Shen of Checkmarx joins Mike Rothman to discuss their Global Pulse of AppSec survey. They discuss the push to "Shift Everywhere," how infrastructure needs to be under the purview of security testing, and some organizational challenges to making AppSec work across the enterprise.

  • Cybersecurity Implications of Generative AI Platforms - Jim Reavis, Cloud Security Alliance

    Cloud Security Alliance CEO Jim Reavis dives into the cybersecurity implications of ChatGPT and other generative artificial intelligence (AI) platforms that are under development.

  • alan_facey,_scanoss___open_source_summit_europe_2022 (720p)

  • Event-Driven Applications to Dominate IT Landscape - Shawn McAllister, Solace

    Shawn McAllister, chief technology officer and chief product officer for Solace, explains why event-driven applications will soon dominate the IT landscape as it becomes more apparent batch-oriented applications are no longer fit for digital transformation purpose.

  • Maturity Curve for AI in Security - Chris Meenan, IBM

    Tapping into the evolution of AI and automation in security and identifying the leading use cases being used in SOCs today. Chris Meenan, VP of product for IBM Security joins TechStrong TV to highlight the current maturity curve for AI in security operations, with capabilities evolving from early...

  • IT Challenges of Multicloud and Hybrid Cloud Computing - Chad Dunn, Dell

    Chad Dunn, vice president of APEX management for Dell, dives into what makes IT more challenging to manage in the age of multicloud and hybrid cloud computing.

  • State of IoT Security in 2023 - John Gallagher, Viakoo

    John Gallagher, VP of Viakoo Labs, joins TechStrong TV to discuss the state of IoT security in 2023, including the recently released National Cybersecurity Strategy, which cites driving the deployment of secure IoT devices as a key priority.

  • ChatGPT's OSS Malware Review - Henrik Plate, Endor Labs

    Endor Labs conducted an experiment into how well ChatGPT performs at OSS malware review. Henrik asked the AI to classify 1,800 binaries for artifacts published on PyPI and npm as either malicious or benign. His conclusion is large language model-assisted malware reviews are not yet a viable alter...

  • Balancing FinOps and Resource Optimization - Dan Ciruli, D2iQ

    It is more important for organizations to monitor and control costs in the cloud. Many have implemented FinOps as a way to manage compute resources. However, organizations face a paradox: to save money via FinOps, they have to spend more on the technology and the people running it. To mitigate th...

  • Celebrus and Consumer Data Privacy - Bill Bruno, D4t4 Solutions Plc

    Bill and Alan talk about Celebrus and the importance of clear opt-ins and outs for consumers. They also discussed how companies are now gathering consumer information in the wake of the fall of third-party data, and the significance of no-party data as a new innovation in the data world, particul...

  • 2022 Global Threat Analysis Report - Pascal Geenens, Radware

    Pascal Geenens, Radware’s director of threat intelligence, will talk about the threat of Russian hacktivists — are they a real threat or merely a nuisance — and review the findings of the company’s recently released 2022 Global Threat Analysis Report. Radware’s report shows that the number of cyb...

  • Backstage - Meg Watson, Spotify

    Backstage was built to address a near-universal challenge of complexity. To abstract away the messy parts of a sprawling, fragmented tech ecosystem and give space for developers to focus on what they do best: creating. Backstage is what enables great performances from our developers. In the nearl...

  • Securing Cyberpeace - Stel Valavanis, onShore Security

    Recently, the Biden Administration announced a new cybersecurity strategy. One of the pillars of the new strategy lays out an intent to work with private entities as contractors to disrupt cybercrime. As the line between cybercrime and cyberwar blurs, the Cybersecurity Tech Accord has released a ...

  • PingOne Neo - Frank Cardello, Ping Identity

    Ping recently announced PingOne Neo™, a multi-standards decentralized identity management solution. Many digital services require verified information about people to do business.