Techstrong TV Interviews

Techstrong TV Interviews

Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.

Share
Techstrong TV Interviews
  • Continuous Secrets Management - Itzik Alvas, Entro Security

    Itzik Alvas, CEO and co-founder of Entro Security, discusses secrets management challenges across many technology and communications platforms, including code repositories, cloud services, storage, vaults, collaboration tools like Slack and more. Rather than a point-in-time discovery approach, It...

  • Platform Engineering and Kubernetes Adoption - Venkat Ramakrishnan, Portworx

    Venkat Ramakrishnan, vice president of products and engineering for Portworx by Pure Storage, explains the symbiotic relationship that exists between the rise of platform engineering and adoption of Kubernetes in the enterprise.

  • 2023 Pentesting Vision Report - Cody Chamberlain, NetSPI

    Cody Chamberlain, NetSPI head of product, shares highlights from NetSPI's recently released 2023 Offensive Security Vision Report based on over 300,000 anonymized findings from more than 240,000 hours of penetration testing. The report identifies the 30 most prevalent vulnerabilities across vario...

  • Fostering Developer Creativity and Preventing Burnout - Trisha Gee, Gradle Enterprise

    Gradle’s Trisha Gee argues that AI will become a new tool that will eventually handle the “busy work,” enabling developers to focus on the creative and highly innovative aspects of their role. Trisha discusses how leaders can avoid developer burnout when this inevitable shift happens.

  • Enterpise Password Manager - Dan Amiga, Island

    Dan Amiga, Island co-founder and CTO, discusses the release of Island's self-protection features and a new password manager natively built into Island's enterprise browser. The new password manager helps eliminate password abuse, ensures organizational custody of corporate passwords, and embraces...

  • 2023 Trends in Identity Security Report - Jeff Reich, Identity Defined Security Alliance

    Protecting digital identities has never been more crucial in the fight against ever-evolving and increasingly sophisticated cyberattacks. As cloud adoption, remote work, mobile device usage, and third-party relationships drive up the number of identities, more businesses are suffering identity-re...

  • Open Sourcing AWS Cedar - Or Weis, Permit.io

    Or Weis, cybersecurity expert and co-founder of Permit.io, talks about the importance of AWS' decision to open source AWS Cedar and why it's a game changer for DevSec and IAM.

  • Combatting the Cybersecurity Crisis - David Ngo, Commvault

    There are 2,200 cyberattacks per day (one every 39 seconds on average), and many companies only find out they've fallen victim after their data is compromised. While most data protection vendors only protect the perimeter, only Commvault protects both active and backup environments and detects th...

  • Wazi Deploy - Rosalind Radcliffe, IBM

    Rosalind Radcliffe, IBM Fellow and CTO DevSecOps, has been working in the CIO office to transform our DevSecOps culture and process across the enterprise. As part of that mission her team has become customer number one in implementing new tools and processes to increase agility and respond to the...

  • Protecting Sensitive Data - Ravi Srivatsav, Inside Out Defense

    With the increase in layoffs, quiet quitting and potential for increase in nation-state espionage to steal IP, as China gears up to go after Taiwan, the threat of insider risk is fueling cyber attacks as companies need to turn inward when assessing cyber risk.With the ability to leverage and incr...

  • Cybersecurity Concerns of AI Platforms - Sam Crowther, Kasada

    In this interview, Amanda Razani speaks with Sam Crowther, CEO and founder of Kasada, about cybersecurity concerns regarding ChatGPT and other AI platforms.

  • CNAPP with End-to-End Detection and Response - Pawan Shankar, Sysdig

    As organizations build out their cloud environments, they face sprawl, with hundreds of unchecked and potentially vulnerable applications, services, and identities. Most cloud security tools are slow to identify suspicious behavior, and once alerted organizations can spend hours, if not days, com...

  • GrafanaCON - Ryan McKinley, Grafana Labs

    Grafana Labs, the company behind the world’s most ubiquitous open and composable operational dashboards, is announcing the release of Grafana 10 and kicking off celebrations for the open source project’s 10-year anniversary. The celebrations will include the annual GrafanaCON community conference...

  • Secure by Design - Josh Thorngren, ForAllSecure

    Josh Thorngren, head of developer advocacy at ForAllSecure, has found that this push of "Secure by Design" by CISA and various industries requiring SBOMs, including the federal government, are forcing functions to cause yet another shift in the DevSecOps ecosystem. Josh explores the current state...

  • Most Productive Days of the Week for Developers - Rob Zuber, CircleCI

    CircleCI CTO Rob Zuber explains why application developers are more productive on certain days of the week than others depending on the time of year and what impact that has on DevOps workflows.

  • 90-Day Certificates - Tim Callan, Sectigo

    "Most businesses are NOT prepared for mandatory 90-day certificates. Nor are they prepared for the anticipated 4x increase in the amount of work they will face,” according to Tim Callan, chief experience officer at Sectigo, a global leader in automated Certificate Lifecycle Management (CLM) and d...

  • Securing Software Supply Chains with DevSecOps - Ramanathan Srikumar, Mphasis,

    Ramanathan Srikumar, chief solutions officer for Mphasis, dives into the challenges enterprise IT organizations are facing as they embrace DevSecOps best practices to secure software supply chains.

  • Embracing Composable Software Architectures - Netlify, Matt Biilmann

    Netlify CEO Matt Biilmann explains how it's becoming simpler to transition away from monolithic applications more gradually as more application development teams embrace composable software architectures enabled by JAMstack.

  • Rust Adoption Bolsters Cloud-Native Application Security - William Morgan, Buoyant

    Buoyant CEO William Morgan dives into how increased adoption of the Rust programming language is enabling cloud-native applications to be built more securely.

  • API Security Reference Architecture for Zero-Trust - Richard Bird and Chase Cunningham, Traceable AI

    Traceable AI, the industry's leading API security company, today announced the release of the industry's first API Security Reference Architecture for Zero Trust. This groundbreaking reference architecture serves as a guide for security leaders, as the industry addresses the urgency of integratin...

  • AI-Powered Connectivity on Racing Yacht - Bart Giordano, CommScope

    New for this year, Luna Rossa Prada Pirelli will be able to take advantage of the AI-driven RUCKUS Cloud platform, as well as employing RUCKUS Wi-Fi equipment to connect its 75-foot long AC75 racing yacht. Relying on the RUCKUS Wi-Fi network to carry data from onboard sensors and devices to a loc...

  • Patch Management Enhancements - Robert Gibbons, NinjaOne

    NinjaOne, a modern, cloud-native IT management platform for managed service providers (MSPs) and IT departments, announces enhancements to NinjaOne Patch Management, delivering the latest automated patching solutions to maintain business operations and keep organizations secure.

  • Limitations of ChatGPT for Business Incident Response - Alex Waintraub, CYGNVS

    Generative AI and ChatGPT are hot topics right now – and many organizations are hungry to find ways to use it to maximize efficiency in their business. However, leaders need to ask themselves, to what extent should this be used? Many may think that if generative AI can help a threat actor, then i...

  • Artificial Intelligence and IT Operations - Phil Tee, Moogsoft

    Moogsoft CEO Phil Tee sets some realistic expectations for the impact artificial intelligence (AI) will have on IT operations teams as advances continue to be rapidly made.