Techstrong TV Interviews
Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.
-
Empathy in Product Management: Insights from Solo.io's Keith Babo
Keith Babo highlights Solo.io’s role as a billion-dollar company providing networking solutions like service mesh and API gateways. The discussion includes platform engineering, AI integration challenges, and the significance of security in AI projects. Keith also emphasizes Solo.io commitment to...
-
IBM Kubecost’s Kai Wombacher on Shifting FinOps Left to Control Kubernetes Costs
Kai Wombacher, product manager for IBM Kubecost, explains why responsibility for FinOps needs to be shifted further left toward application developers and software engineers to have a meaningful impact on containing Kubernetes costs.
-
Experis VP Bekir Atahan on Why AI Won’t Eliminate the Need for Entry-Level Employees
Bekir Atahan, vice president of data/AI center of excellence for Experis, explains why thinking that artificial intelligence (AI) is going to eliminate the need for entry-level employees is deeply flawed.
-
Empowering Consumers in Cybersecurity: Insights from Real Defense's Gary Guseinov
Gary Guseinov, CEO of Real Defense, shares insights on the company's mission to improve consumer cybersecurity. Founded in 2017, Real Defense focuses on acquiring cybersecurity firms and licensing technology to address the growing need for effective tools. Their flagship product, System Mechanic,...
-
Navigating Cybersecurity: AI Innovations and Compliance with Deep Instinct's Carl Froggett
Carl Froggett, CIO of Deep Instinct, shares insights on the company's innovative cybersecurity solutions that leverage deep learning to tackle advanced threats. He addresses the challenges posed by malicious actors using AI, discusses findings from the SecOps report, and explores the changing reg...
-
Transforming AI Interactions with eSelf's Dr. Alan Bekker
Dr. Alan Bekker, CEO of eSelf and former Head of Conversational AI at Snapchat. At Snapchat, he led efforts in conversational AI, impacting millions. He then established eSelf, creating AI avatars for real-time video experiences in education. These avatars help guide students and provide informat...
-
1Password CISO Dave Lewis on Cybersecurity Pitfalls in Mergers and Acquisitions
Dave Lewis, global advisory CISO for 1Password, dives into the pitfalls that can arise when organizations ignore cybersecurity issues that will inevitably arise following a merger or acquisition.
-
Warp CEO Zach Lloyd on Boosting Developer Productivity with Generative AI in the CLI
Warp CEO Zach Lloyd following the launch of Warp Code explains how generative artificial intelligence (AI) can be used within the context of a command line interface (CLI) to make application developers and software engineers more productive.
-
Ironwall by Incogni CEO Ron Zayas on Protecting Sensitive Data in the Age of Manipulation
Ironwall by Incogni CEO Ron Zayas explains why individuals and organizations need to better protect, and whenever possible by any means necessary not share, sensitive data in an era where it is now being used not just being stolen by cybercriminals and nation states but also by legitimate organiz...
-
F5 Field CISO Chuck Herrin on Preparing for Post-Quantum Cryptography Challenges
Chuck Herrin, field CISO for F5, explains why organizations need to get ahead of the post quantum cryptography (PQC) now before they are overwhelmed by myriad challenges.
-
ONEiO CEO Juha Berghäll on Evolving Integration Platforms in the Age of AI Agents
Fresh off raising $6 million in additional funding, ONEiO CEO and Co-Founder Juha Berghäll dives into how integration platforms will need to evolve as organizations build and deploy more artificial intelligence (AI) agents
-
Matt Blumberg on Acrolinx Rebranding to Markup AI and the Launch of Content Guardian Agents
Matt Blumberg shares insights about the recent rebranding of Acrolinx to Markup AI. He presents the new platform, Content Guardian agents, which ensures the quality of content generated by AI. This platform allows companies to monitor and protect their content effectively. Future developments wil...
-
OPSWAT’s George Prichici on File-Related Breaches and Insider Threats
George Prichici, vice president of application security products for OPSWAT, dives into a survey that finds in the past two years, 61% of organizations have suffered file-related breaches caused by insiders, at an average cost of $2.7 million per incident.
-
Revolutionizing AI Management and Governance with Eve Security's Nadav Cornberg
Eve Security, co-founded by Nadav Cornberg, addresses the challenges organizations face with AI integration. The company focuses on effective management and governance of AI agents, introducing an 'agent in the loop' concept for better observability and policy enforcement. Currently in beta, Eve ...
-
Valiantys’ Philip Heijkoop on Managing Hidden Costs in Multicloud Strategies
Philip Heijkoop, global practice head of developer experience for Valiantys, dives into the hidden costs that IT organizations will need to manage as they pursue a multicloud computing strategy.
-
Cybersecurity Insights with Illumio 's Gary Barlet
Gary Barlet, Public Sector CTO at Illumio, shares his expertise in cybersecurity, focusing on microsegmentation and breach containment. He discusses the recent Salt Typhoon attacks linked to China, targeting government and telecom sectors. Barlet highlights the persistent challenges in cybersecur...
-
Navigating Quantum Security with QuSecure's Rebecca Krauthamer
Rebecca Krauthamer, CEO of QuSecure, shares her journey and the company's commitment to quantum security. She explains how quantum computing can solve complex issues and emphasizes the need for post-quantum security solutions. The discussion includes the challenges of adopting quantum-safe algori...
-
Preparing for Q Day: The Future of Post-Quantum Cryptography
Rebecca Krauthamer, CEO of QuSecure, highlights the importance of post-quantum cryptography and the rapid advancements in quantum computing. She discusses the urgency of preparing for Q Day, when quantum computers could compromise current encryption. Rebecca explains the unique problem-solving ab...
-
Navigating Cybersecurity with Koi's Idan Dardikman
Idan Dardikman, military background to founding Koi Security. He highlights the importance of user-friendly security products and discusses challenges in endpoint security, particularly browser security. Idan details COI's funding journey, their innovative risk engine, and growth plans, including...
-
Adaptive Security CEO Brian Long on Combating AI-Driven Cybersecurity Threats
Adaptive Security CEO Brian Long dives into what is required to protect organizations from cybersecurity threats that are leveraging artificial intelligence (AI) following a recent investment in the company made by OpenAI.
-
Introducing Hush Security: A New Era in Cybersecurity with Micha Rave
Hush Security emerges as a promising startup in cybersecurity, Co-founded by Micha Rave. With a rich background in technology, Micha discusses the challenges of operating in stealth mode and the company's mission to manage secrets effectively. Hush Security adopts a policy-based access management...
-
Exploring Digital Sovereignty with SUSE's Imran Khan
Imran Khan, Chief Customer Officer at SUSE, shares his journey and insights into SUSE's identity as an open-source, Linux, cloud-native, and AI company. He discusses the new digital sovereignty offering that meets customer needs for data protection and compliance. SUSE operates its own data cente...
-
Huntress Director Jamie Levy on How Adversaries Use AI to Launch Cyberattacks
Jamie Levy, director of adversary tactics for Huntress, shares what the company learned about how adversaries are using artificial intelligence to craft cyberattacks when one of them downloaded the company's software.
-
Enhancing Cybersecurity with AI and Advanced Tools with Rapid7 's Craig Adams
Craig Adams, Chief Product Officer at Rapid7, shares insights on the evolution of vulnerability scanning and the company's focus on understanding attack surfaces and prioritizing risks. He discusses the impact of AI on improving detection and response capabilities. Adams introduces Vector Command...