Techstrong TV Interviews
Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.
-
LogRhythm's Sally Vincent on Malicious Botnet Activity
Sally Vincent, senior threat research engineer for LogRhythm, warns artificial intelligence (AI) is likely to drive a surge in malicious botnet activity that will overwhelm existing cybersecurity defenses.
-
Credit Karma's Jeremy Unruh on Boosting Developer Productivity with Argo
Jeremy Unruh, head of developer efficiency for Credit Karma, explains how his company is employing open source Argo continuous delivery (CD) platform developed by parent company Intuit to boost developer productivity.
-
John Hammond on AI's Role in Enhancing Cybersecurity with the U.S. Military
John Hammond, principal security researcher for Huntress, dives into what it means for providers of artificial intelligence (AI) platforms to commit to working with the U.S. military should improve cybersecurity.
-
AI's Impact on Data Management with Nasuni's Russ Kennedy
Russ Kennedy, chief product officer for Nasuni, explains how the rise of artificial intelligence (AI) is driving a reckoning with data management and storage issues that is long overdue.
-
DigiCert’s 2024 State of Digital Trust with Mike Nelson
Mike Nelson speaks about DigiCert’s 2024 State of Digital Trust Survey, which reveals the widening gap between leading organizations and those that are struggling across four key areas of digital trust.
-
Data-Centric Approach to Cybersecurity with Virtru's Mike Morper
Mike Morper, senior vice president for product and product marketing for Virtru, explains why a data-centric approach to cybersecurity has become an absolute necessity, as cyberattacks continue to increase in sophistication.
-
DevOps and Passwordless Cybersecurity with 1Password's Anna Pobletts
Anna Pobletts, head of passwordless for 1Password, explains how developers and the DevOps teams that support them play a crucial role in the effort to improve cybersecurity by eliminating passwords.
-
Data Protection for Cybersecurity with Rubrik's Arvind Nithrakashyap
Rubrik CTO Arvind "Nitro" Nithrakashyap explains how data protection has evolved as an IT discipline for ensuring cybersecurity and resilience on the 10th anniversary of the founding of the company.
-
Identity Security and Identity Management in 2024 with Jeff Reich
With Identity Management Day just around the corner on April 9, Jeff Reich provides insights on identity security best practices, identity and access sprawl, how Generative AI is helping and hurting identity management, and more.
-
Tax and Audit Essentials for Tech Companies with Aprio's Mitchell Kopelman
Mitchell Kopelman talks about technology, taxes and more with a focus on tax, audit and other services that growing tech companies needs to know.
-
Securing AI Models Against Cyberthreats with NCC Group's David Brauchler
David Brauchler, principal security consultant for NCC Group, explains what will really be required to secure artificial intelligence (AI) models as cybercriminals look to inject malware, poison data or steal them outright.
-
Exploring the Unintended Consequences of Automation in Software with The VOID's Courtney Nash
The VOID announced its 2024 VOID Report titled, "Exploring the Unintended Consequences of Automation in Software." Courtney Nash discusses the report, which highlights the multifaceted roles of automation in incidents, often revealing its potential to exacerbate rather than alleviate problems.
-
Integrating DataOps and DevOps with Perforce's Jim Cassens
Perforce CEO Jim Cassens explains how the acquisition of Delphix paves the way for integrating DataOps and DevOps in the age of artificial intelligence (AI).
-
Securing Source to Production with TestifySec's Cole Kennedy
TestifySec Co-Founder and CEO Cole Kennedy discusses the gaps in software supply chain security and his experiences implementing software that led to the creation of TestifySec. Cole discusses the necessity of having an "observer" to attest to steps and security measures taken throughout the soft...
-
ID-Verification Solution for Help Desks with HubSpot's Eric Richard
Eric Richard, CISO and senior vice president of engineering operations at HubSpot, explains why his organization is using a new approach to thwarting phishing attacks against help desks developed by Nametag.
-
Sweet Security's Eyal Fisher on Cloud Security Innovation
Eyal talks about Sweet Security closing Series A funding to capitalize on the interest in its holistic, runtime-based approach to cloud security.
-
Securing GenAI in the Enterprise with Opaque Systems' Aaron Fulkerson
Aaron Fulkerson, CEO speaks about Opaque Systems just releasing “Securing GenAI in the Enterprise” whitepaper. The paper collectively outlines the problems faced by an industry that generates more data then ever and has a need to make that data actionable.
-
WaveMaker's Prasanth Reddy on AI and Application Development
Prasanth Reddy, senior director for product management for Wavemaker, explains how artificial intelligence (AI) will augment rather than replace application development teams.
-
Asset Management for Cybersecurity with Firemon's Justin Stouder
Justin Stouder discusses asset management in the cybersecurity space. He highlights Firemon's role, tracing back to Bell Labs' internet traversal software and Lumeta acquisition. They emphasize the importance of active discovery without agents or credentials, enabling comprehensive asset visibility.
-
Recruiting Cybersecurity Professionals Audra Streetman Splunk
Audra Streetman, security strategist for Splunk, explains why organizations need to expand the size of the talent poll from which they are recruiting cybersecurity professionals.
-
Bart Giordano - TSTV
Bart Giordano, President of Networking, Intelligent Cellular & Security at CommScope delves into how CommScope and Boldyn Networks teamed up to deploy Wi-Fi 7 from RUCKUS in selected areas of Camping World Stadium in Orlando, Florida.
-
Why Operating Systems Still Matter Shawn Rosemarin Pure Storage
Shawn Rosemarin, vice president of research development for customer engineering at Pure Storage, dives into why operating systems still matter as processor architectures continue to advance.
-
Sachin Aggarwal - TSTV
appCD CEO Sachin Aggarwal explains why a new approach to infrastructure-as-code (IaC) that starts with the application is required in the wake of picking up $6 million in seed funding.
-
Pynt vs OWASP with Tzvika Shneider
Pynt's recent study uncovered the top 10 API vulnerabilities through real user traffic. Join Tzvika Shneider to delve into these real API threats and explore the implementation of a shift-left approach to effectively mitigate them.