Techstrong TV Interviews
Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.
-
Cybersecurity Strategies to Combat Online Scams with Patrick McNeil
Patrick McNeil, cybersecurity strategist for GuidePoint Security, dives into what's ultimately needed to protect individuals and organizations from online scams involving, for example, the Super Bowl or Valentine's Day.
-
Hugh Thompson on RSAC's Rebranding and Investment
Hugh speaks with Alan about the RSAC $50 million investment to Top 10 ISB Contest Finalists, the new RSAC rebrand, community website launch and his thoughts on DeepSeek.
-
Securing Data in 2025 with Chris Gibson
Chris talks with Alan about securing data in 2025, AI, legacy systems, and global collaboration.
-
Chris Wingfield on the Weaponization of Executive Personal Data
Chris discusses an emerging enterprise security threat - the weaponization of executive personal data by threat actors.
-
Akamai's State of the Internet Report with Roger Barranco
Akamai's latest "State of the Internet" report provides actionable insights from security experts who battle cyberthreats every day to arm defenders and CISOs alike with the real-world strategies needed to safeguard systems in today’s increasingly complex digital landscape. Roger Barranco, vice p...
-
The State of Quantum Computing Adoption with Howard Boville
Howard Boville, president of consulting and engineering services for DXC Technology, dives into the state of quantum computing adoption in the wake of a series of rapid advances made by Microsoft and Google.
-
Data Security in the Age of AI with Pangea's Rob Truesdell
Rob discusses how enterprises must rethink data security in the age of AI. He'll explore why traditional security tools fall short as companies increasingly connect sensitive data with Large Language Models, and how it's especially critical as the software industry is projected to reach 1 million...
-
Automation Fabrics and Business Process Efficiency with Charles Crouchman
Charles Crouchman, chief product officer for Redwood Software, explains why automation fabrics are emerging to bring some order to fragmented business processes.
-
AI Organizational Responsibilities with Ken Huang
CSA recently published "AI Organizational Responsibilities: AI Tools and Applications," the third in a series of reports centered on AI organizational responsibilities.
-
Advancing AI Agents with Postman's Sterling Chin
Sterling Chin, senior developer advocate at Postman, discusses the key challenges holding AI agents back and what the industry needs to do to bridge the gap.
-
Shmuel Kliger on Causely's Integration with OpenTelemetry
Shmuel talks about Causely launching its integration with OpenTelemetry, which has redefined observability by standardizing how telemetry data is collected and processed.
-
Cybersecurity Requirements of Cloud Computing with RAD Security's Brooke Motta
RAD Security CEO Brooke Motta dives into the unique cybersecurity requirements of cloud computing environments in the wake of the company picking up an additional $14 million in funding.
-
Building Complex Software at Scale with RapDev's Tameem Hourani
RapDev founder Tameem Hourani dives into what it really takes for software engineering teams to develop and deploy complex software at scale.
-
The Launch of Cowbell Resiliency Services with Rajeev Gupta
Discussing the recent launch of the company’s Cowbell Resiliency Services (CRS) unit, Rajeev runs through what state-of-the-art offerings like Managed Detection and Response, Penetration Testing, and Cybersecurity Training - implemented alongside traditional cyberinsurance - can do to help organi...
-
Ryan Shrout
-
2025 Global Threat Report with CrowdStrike's Cristian Rodriguez
CrowdStrike Field CTO Cristian Rodriguez dives into a 2025 Global Threat Report that finds there's been a major spike in the number of cybersecurity breaches involving stolen credentials that never required cybercriminals to go through the trouble of first creating malware to steal data.
-
The Future of Workload Isolation with Edera's Emily Long
Edera CEO Emily Long, in the wake of the company picking up an additional $15 million in funding, explains why a new approach to isolating workloads is needed to better secure IT environments in the age of the cloud.
-
Optimizing IT and Employee Experiences with Cisco's Snorre Kjesbu
Alan speaks with Snorre Kjesbu, senior VP and general manager at Cisco. The discussion covers the evolution of Webex from a simple video conferencing tool to a full-stack collaboration platform, emphasizing reliability, usability, and AI-driven enhancements. Kjesbu also highlights Cisco's vision ...
-
Securing Enterprise LLMs with Knostic's Sounil Yu
Knostic, the world's first provider of need-to-know access controls for Generative AI, is celebrating an $11 million investment to secure enterprise large language models (LLMs). The funding will be used to bolster Knostic's offering, supporting enterprises in their AI transformation and adding a...
-
How AI is Revolutionizing Cybersecurity with Arctic Wolf's Nick Schneider
Arctic Wolf CEO Nick Schneider explains how artificial intelligence (AI) will transform how cybersecurity is managed following the company's acquisition of Cylance from Blackberry.
-
How Organizations Consume AWS Cloud Services with Matt Hogan
Matt Hogan, vice president of growth marketing for HG Insights, dives into a report detailing how organizations are consuming the cloud computing services made available by Amazon Web Services (AWS).
-
Ravid Circus on Building an Efficient Remediation Strategy
By centralizing and orchestrating remediation efforts, organizations can eliminate bottlenecks, improve efficiency and strengthen their security posture. Learn more from Ravid Circus, co-founder and chief product officer at Seemplicity.
-
Why Developers Won't Be Replaced by AI with Snyk's Danny Allan
Danny speaks with Alan about how AI empowers developers to focus on high-impact projects, helps companies retain top talent and strengthens secure development practices without compromise.
-
Expanding Cybersecurity Talent with TekStream's Judd Robins
Judd Robins, executive vice president for TekStream, highlights how the company is partnering with higher education and state governments to increase the overall pool of cybersecurity expertise that is being made available.