Techstrong TV Interviews
Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.
-
U.S. Government Requirements and DevSecOps - Donald Fischer, Tidelift
Tidelift CEO Donald Fischer dives into how the latest impact changes to U.S. government requirements for software will impact DevSecOps teams tasked with securing increasingly complex software supply chains.
-
Mastering Multicloud Workload Mobility - Atif Khan, Alkira
Alkira CTO Atif Khan explains why mastering the art of moving application workloads across multicloud computing environments starts with the network.
-
DevOps in Banking - John Rzeszotarski, Dexcom
Banking is a very traditional industry. Less than 10 years ago, you would never have heard the words DevOps at any major bank. When John Rzeszotarski, former director of DevOps for Keybank, began pushing for DevOps in banking, no one took the idea seriously. It wasn’t until a major outage that th...
-
Women in Engineering - Aviva Peisach, Wix
Aviva Peisach, head of R&D - Server at Identity at Wix, explores the experiences of women in engineering, delving into engineering culture, resilience and management. Aviva Peisach, an accomplished engineering leader, mentor, and advocate, shares insights and practical tips to inspire and inform ...
-
Aiven's New Offerings and Free Tier - Jonah Kowall, Aiven
Alan speaks to Jonah Kowall, VP of product management, Aiven to discuss their new offerings, including free tier.
-
Digibee's Series B Funding - Rodrigo Bernardinelli, Digibee
Digibee, an integration platform as a service (iPaaS) company that helps organizations build flexible, highly scalable integration architecture, today announced it received $60 million in Series B funding. The Growth Equity business within Goldman Sachs Asset Management (Goldman Sachs) is the lea...
-
Shadow Access Impact Report - Venkat Raghavan, Stack Identity
Venkat Raghavan discusses the new Shadow Access Impact Report released by Stack Identity. The report provides real world findings about how the 10 different types of Shadow Access - unauthorized, ungoverned and invisible access - has been exploited to breach cloud environments and exfiltrate data.
-
Series A Funding for Non-Human Identity Security - Alon Jackson, Astrix Security
Astrix Security, the enterprise’s trusted solution for securing non-human identities, has secured $25 million in Series A funding led by CRV with participation from existing investors Bessemer Venture Partners and F2 Venture Capital. This new investment brings Astrix’s total funding to almost $40...
-
ROI of Platform Engineering - Lambros Charissis, Wise
Lambros Charissis, principal product manager, Platform Engineering at Wise, shares insights on applying product management disciplines and connecting key performance indicators (KPIs) like productivity, stability, efficiency, and risk to business outcomes. Lambros recently presented on these topi...
-
Platform Engineering Insights - David Sandilands, Puppet
David Sandilands, principal solutions architect at Puppet, discusses the 2023 State of DevOps report focused on platform engineering in DevOps organizations. David also discusses how the emergence of platform engineering as a discipline and how this has shaped his views on DevOps while at Puppet....
-
Advancing ASPM - Jacob Garrison, Bionic
Alan Shimel talks with Jacob Garrison, security researcher at Bionic, about how Bionic advances its ASPM platform with Bionic Signals and Business Risk Scoring.
-
Independent Software Vendor Partner Program - Jethro Borsje, Mendix
The Mendix Independent Software Vendor (ISVs) Partner Program provides the tools, IP protection, and marketplace to enable ISV partners to build and monetize commercial software atop the Mendix platform. With Mendix, ISVs can quickly iterate, improve their products, and capitalize on new opportun...
-
Generative AI Book Launch - Tom Taulli, Author
ChatGPT has disrupted the world of AI, and enterprises are scrambling to adapt. Tom Taulli, author of "Generative AI: How ChatGPT and Other AI Tools Will Revolutionize Business," discusses the rapid rise of generative AI, the disruption it caused and how companies and individuals should carefully...
-
API Management and Usage Trends - Ankit Sobti and Demian McLean, Postman
The world’s largest of its kind – 40K+ developers and API pros took part – the report serves as an annual look into API management and usage trends. This year's report also includes analysis of timely business storylines including generative AI, developer trends, API security, and the monetizatio...
-
Safeguarding Sensitive Data and Securing Infrastructure - Mike Malone, Smallstep
The Smallstep Trust Platform will help IT leaders and their organization address the ever increasing security challenges they are facing when attempting to keep sensitive data safe. Since its early days as an open source project in the DevOps community, Smallstep’s mission continues to be to secu...
-
Global Survey on Email Security - Brianna Leddy, Darktrace
Darktrace recently published a global survey on email security. Darktrace's R&D team along with outside analyst groups pulled stats and uncovered top issues affecting organizations with email scams, phishing and more.
-
Age of Autonomous Enterprise - Don Schuerman, Pega
Cars, factories, and even grocery stores are making the shift to autonomous. Businesses are too. By applying AI and automation to decisioning, operations and servicing across the organization, businesses can operationalize agility and become self-optimizing. This is the age of the autonomous ente...
-
Quantum Computing Breakthrough - Katie Pizzolato, IBM
IBM has announced a major breakthrough, published on the cover of Nature, demonstrating for the first time that quantum computers can produce accurate results at a scale of 100+ qubits reaching beyond leading classical approaches. One of the ultimate goals of quantum computing is to simulate comp...
-
Forrester SCA Wave - Mike McGuire, Synopsys Software Integrity Group
According to a recent Forrester report, 78% of codebases today are open source as organizations increasingly utilize the free code in their software. However, open source code carries inherent security risks as it is developed by third-party sources. Security leaders rely on software composition ...
-
Ransomware and State-Sponsored Threats - Paul Prudhomme, Rapid7
Paul Prudhomme from Rapid7 talks about threats to Japanese organizations by relevant industry and highlights two key cross-industry phenomena: Ransomware and state-sponsored threats.
-
Enhanced Network Deployment and Management - Bart Giordano, CommScope
CommScope launched three new RUCKUS Networks solutions that offer enterprises and service providers new ways to deploy, manage and operate the next generation of purpose-driven networks. Each provides distinct and valuable advantages when used individually. Together, they offer a robust solution ...
-
AI Vector Search - Venkat Venkataramani, Rockset
Rockset CEO and co-founder Venkat Venkataramani discusses this emerging vector search trend and what it means to the market. Rockset is leveraging new AI capabilities to offer native support for vector embeddings, enabling organizations to build high-performance vector search applications at scal...
-
Passwordless Security - Patrick McCue, LastPass
Patrick McCue, LastPass' global VP of channel partners, reviews the recently launched LastPass Allegiance Partner Program, which makes it easier for solution providers, MSPs and technology partners to help their customers prevent compromised credentials. By investing in new tools like passwordles...
-
Implementing AI Technology - Brian Land, Lucidworks
In this Leadership Insights video interview, Amanda Razani speaks with Brian Land, VP of sales engineering at Lucidworks, about implementing AI technology.