Techstrong TV Interviews

Techstrong TV Interviews

Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.

Share
Techstrong TV Interviews
  • Managing On-Prem Developer Environments with Daytona CEO Ivan Burazin

    Daytona CEO Ivan Burazin details his plan to introduce a platform for managing on-premises developer environments, in wake of picking up $2 million in seed funding.

  • Intensifying Identity Management with Stytch's Reed McGinley-Stempel

    Stytch CEO Reed McGinley-Stempel explains why securing artificial intelligence (AI) models needs to start with more rigorous approaches to identity management.

  • Unmasking Robin Banks with Hank Schless of Lookout

    During this interview, Hank Schless will discuss a new phishing kit targeting customers/users of financial institutions and crypto exchanges. "Robin Banks" operates as a phishing as a service (PhaaS) and leverages MFA bypass as one of its core tactics. Robin Banks provides yet another example of ...

  • Protecting the Web App and API Attack Surface with ThreatX's Jeremy Ventura

    The acceleration of digital transformation and rise in API, containerization, and multi-cloud deployments is creating an even greater dynamic attack surface. Jeremy Ventura, ThreatX field CISO, discusses comprehensive API and application security with protection from the edge to runtime environme...

  • David DeSanto Breaks Down GitLab's Latest AI Innovations

    GitLab announced updates to GitLab Duo, the company’s suite of AI capabilities, including the beta of GitLab Duo Chat available in the GitLab 16.6 November product release, and the general availability of GitLab Duo Code Suggestions in the GitLab 16.7 December product release. 

  • Reducing the Carbon Footprint of K8 Clusters with PerfectScale's Amir Banet

    PerfectScale CEO Amir Banet explains why reducing the carbon footprint of Kubernetes clusters is becoming a higher priority, as organizations become more concerned about climate change.

  • Gearset's David Rant Breaks Down Wasm Adoption Challenges

    David Rant, engineering lead for Gearset, dives into the challenges that need to be overcome before WebAssembly (Wasm) achieves mainstream adoption among application developers.

  • Challenges of Securing LLMs with Perception Point's Tal Zamir

    Perception Point CTO Tal Zamir explains why securing the large language models (LLMs) used to enable generative artificial intelligence (AI) applications is going to be more challenging than most cybersecurity teams realize.

  • Applying Generative AI to IT Operations with BigPanda CEO Assaf Resnick

    BigPanda CEO Assaf Resnick dives into how generative artificial intelligence (AI), along with previous classes of AI technologies, will be applied to IT operations

  • FireMon's Rich Mogull Breaks Down Cloud-Driven Changes in SecOps

    Cloud impacts SecOps in ways both obvious and subtle, and since most organizations still have datacenters and offices, teams need to add new skills and update operations while still supporting everything already on their plate. It’s a daunting challenge, but one that is a lot easier to tackle by ...

  • Data Security in the Cloud Era with Nikhil Girdhar of Securiti.ai

    Nikhil Girdhar, senior director for data security at Securiti.ai, explains why securing data, as volumes continue to increase, is a much different challenge in the age of cloud computing.

  • Safeguarding Expanding Attack Surfaces with BeyondID's Neeraj Methi

    Neeraj Methi, vice president of solutions for BeyondID, explains how artificial intelligence (AI) will be used to enable cybersecurity teams to better protect rapidly expanding attack surfaces.

  • iXsystems' Morgan Littlewood Explores Shifting Paradigms in Storage

    Morgan Littlewood explores the historical conservatism in storage, the influence of open source, and the changing dynamics with the rise of container storage. The conversation delves into the challenges and opportunities presented by Kubernetes, emphasizing the need for flexibility in storage sol...

  • Overcoming IT and Cybersecurity Challenges with Barracuda's Siroui Mushegian

    Siroui Mushegian, Barracuda CIO, discusses the challenges faced by IT professionals amid the emergence of new technologies and budget constraints. Siroui Mushegian emphasizes the importance of strategic prioritization, risk assessments, employee training and effective communication between cybers...

  • Analyzing Software Security Practices with Synopsys' iMan Louis

    BSIMM14 is the latest edition of the annual Building Security in Maturity Model (BSIMM) report analyzing the software security practices across 130 organizations, including some of the most advanced companies in cloud, financial services, FinTech, ISV, insurance, IoT, healthcare, and technology i...

  • Entrust's Jordan Avnaim Simplifies Board Communication

    Entrust CISO Jordan Avnaim shares some insights into how cybersecurity professionals should communicate with board members who are ultimately concerned more with risk to the business than technical jargon.

  • Enhancing Cybersecurity in Linux with Chainguard's Jason Hall

    Jason Hall, principal engineer for Chainguard, celebrating the first anniversary of the launch of a Wolfi distribution of Linux, explains why organizations need an operating system that reduces the overall size of the exploitable attack surface.

  • Myrror Security's Yoad Fekete Addresses OSS Supply Chain Attacks

    The rising rate of open source software (OSS) supply chain attacks poses a significant threat to enterprises’ software development life cycle (SDLC). Yoad Fekete, CEO and co-founder of Myrror Security, discusses these attacks’ impact on businesses and the broader implications for the software ind...

  • Challenges of New SEC Cybersecurity Rules with Nozomi Networks' Edgard Capdevielle

    The SEC cybersecurity rules went into effect on Dec. 15, and those most involved in the disclosure process – CFOs, boards and even many CISOs – don’t know enough about their organizations’ operational technology networks powering the connected machinery that play a critical role in the health and...

  • Seamless Development Security with DryRun Security's James Wickett

    James Wickett, the CEO and co-founder of DryRun Security, discusses the company's recent emergence from stealth and introduces its innovative approach to making security a seamless and efficient part of the development process. 

  • Enhancing Kubernetes Monitoring with Grafana Labs' Tom Wilkie

    Grafana Labs announced updates to Grafana Cloud's Kubernetes Monitoring solution, including an impactful cost monitoring tool to measure infrastructure spending on Kubernetes deployments – breaking down costs to nodes, persistent volumes and load balancers – across multi-cloud environments. 

  • Data Gravity and IT Evolution with Nutanix's Lee Caswell

    Lee Caswell, SVP product and solutions marketing for Nutanix, explains why data gravity is going to require more IT organizations to process and analyze data at the point it is created and consumed.

  • Bridging Mainframe and Cloud Data Environments with VirtualZ's Jeanne Glass

    VirtualZ's out-of-the-box solutions provides cloud apps with real-time, read-write access to mainframe data, along with the ability for mainframe apps to access data stored in other environments. The company just launched its products and raised $4.9 million in seed financing.

  • Processing Data at Scale with Jeff Denworth of VAST Data

    In the wake of picking up an additional $118 million in funding, Jeff Denworth, co-founder of VAST Data, discusses the impact of processing data at scale in the age of cloud computing.