Techstrong TV Interviews

Techstrong TV Interviews

Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.

Share
Techstrong TV Interviews
  • Arjun Narayan - TSTV

    Arjun and Alan discuss the batch data to real-time revolution, and how companies of all sizes, not just hyperscalers, are positioned to take advantage of it. The still-accelerating migration of data and compute from on-prem to the cloud has opened companies’ eyes to a new world of performance and...

  • Styra Run - Torin Sandall, Styra

    Styra recently launched Styra Run. This new OPA-based authorization engine will give software developers back time that would be spent on the time-consuming tasks of building, maintaining, and operating their own authorization capabilities. Via a simple drop-in API, application development teams ...

  • Pyrsia and Ortelius - Tracy Ragan and Steve Taylor, DeployHub

    Tracy Ragan, CEO & Co-founder of DeployHub and Steve Taylor, CTO & Co-Founder of DeployHub speak with Alan about their involvement with Pyrsia, an open-source software community initiative that utilizes blockchain technology to secure software packages from vulnerabilities and malicious code and ...

  • Open Source Security Foundation - David A. Wheeler, Linux Foundation

    Open source software (OSS) is everywhere, but unfortunately that means it's under attack. The good news is that there are many efforts to improve the security of OSS, including its supply chain. David A. Wheeler will discuss some of the ways that the industry is working to improve security, focus...

  • Cyberattacks on Healthcare Organizations - Michael Tal, Votiro

    Michael Tal, technical director for Votiro, explains why cyberattacks against healthcare organizations are increasing in volume and sophistication.

  • State of Web Application Security - Sonali Shah, Invicti

    Sonali Shah, Chief Product Officer for Invicti, dives into a report on the state of web application security in the federal government.

  • Mark Logan - TSTV

    Newly-appointed One Identity CEO Mark Logan outlines his vision for the provider of an identity management platform that is being spun out of Quest.

    Want more TSTV interviews? Click here.

  • Machine Learning-Powered CDR - Daniella Pontes & Anna Belak, Sysdig

    Sysdig recently announced machine learning-powered cloud detection and response (CDR) to combat cryptojacking. The company’s threat engine and detection algorithms block cryptojacking in the cloud with 99% precision. The longer cryptojacking goes undetected, the greater the financial impact. Whil...

  • Kate MacLean - TSTV

    Mike talks to Kate MacLean, Sr. Director of Product Marketing at Lacework about its new threat detection and alert investigation capabilities. They discussed not just the new features but also the evolution of CSPM and also the benefits of having their tool built on Snowflake, a data analytics pl...

  • Moving Beyond SOAR - Bob Slapnick & Lawrence Pingree, BrazenCloud

    Alan speaks to Bob Slapnick, Co-Founder and COO at BrazenCloud, and Lawrence Pingree, CTO at BrazenCloud, about making the case that we need more than SOAR (Security Orchestration, Automation and Response) and move beyond just the sock automation that we're doing today.

  • Peter Brass and PD Prasad - TSTV

    Leadership of LightBeam.ai explains how open source data trustee security model advances data privacy automation using AI.

    Want more TSTV interviews? Click here.

  • Measuring the Value of Cybersecurity - Grant Gibson, CIBR

    CIBR CISO Grant Gibson explains why organizations need to change the way the value of cybersecurity is measured.`

  • State of DevOps Maturity - Ryan Worobel, LogicMonitor

    Newly appointed LogicMonitor CIO Ryan Worobel provides some perspective on the state of DevOps maturity within IT organizations.

  • Snowflake - Anand Babu Periasamy, MinIO

    MinIO scored a partnership with Snowflake to bring the cloud data warehouse analytics nearly everywhere a user's data resides. MinIO's recent decision to add external table support for Snowflake analytics lets customers who use the company's object storage run these analytics wherever their data ...

  • Renuka Nadkarni - TSTV

    Renuka Nadkarni, chief product officer for Aryaka, explains how remote access security is evolving in the managed secure access service edge (SASE) era.

    Want more TSTV interviews? Click here.

  • Netskope's Cyber Threat Report - Ray Canzanese, Netskope

    Alan speaks with Ray Canzanese, Director of Netskope's Threat Labs. Netskope released its latest Cyber Threat Report, which analyzes the latest cloud threats affecting enterprises based on anonymized usage data (between January 1 through May 31, 2022) relating to a subset of Netskope customers.

  • Mohammad Kazem - TSTV

    A new infostealing malware, DUCKTAIL, targets marketing and HR professionals through LinkedIn spear phishing campaigns to hijack Facebook business accounts. The report identifies the potential threat actor and also reports that this is the first instance that researchers are aware that utilizes a...

  • Jonah Kowall - TSTV

    Jonah Kowall, CTO at Logz.io, talks with Alan on a number of trends related to the observability and security industries. Jonah dives into the current cloud-native SIEM model, how it is broken, and how a modern approach to SIEM leads to more agile SecOps. He also discusses the role that the true ...

  • 2022 Unit 42's Brute Ratel C4 Research - Jen Miller-Osborn, Palo Alto Networks

    Jen Miller-Osborn, Deputy Director of Threat Intelligence, Unit 42 at Palo Alto Networks joins Alan Shimmel to discuss a recent Unit 42 blog post from July about Brute Ratel C4, a penetration testing and adversary emulation framework. This tool is similar to Cobalt Strike, a common pentesting fra...

  • Zero-Day Vulnerabilities, Steve Wilson - Contrast Security

    Steve Wilson, chief product officer for Contrast Security, explains what it really takes to cope with zero-day vulnerabilities.

  • Application Security Debt - Jeff Martin, Mend

    Jeff Martin, vice president of product for Mend, explains why the amount of application security debt piling up is going to end badly.

  • Catherine McGarvey and Chris Clark - TSTV

    Catherine McGarvey and Chris Clark from the Cloud Foundry Foundation (CFF) explain how an open source platform-as-a-service (PaaS) environment running atop Kubernetes will provide a much-needed boost to cloud/native application developer productivity while also streamlining DevOps workflows.

    Wan...

  • Autonomous Data - Karanjot Jaswal, Cinchy

    Alan speaks with Cinchy co-founder and CTO Karanjot Jaswal. We learn how Cinchy helps organizations gain simplified, streamlined and authorized access to data by allowing data to become autonomous, rather than tied to the applications used to create, store or analyze it, as has been done for over...

  • Rowland Graus - TSTV

    Rowland Graus, head of product for Agoric, explains how decentralized blockchain applications will be built using standard JavaScript tools.

    Want more TSTV interviews? Click here.