Techstrong TV Interviews
Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.
-
William Collins - TSTV
William Collins, a cloud architect for Alkira, explains why a universal approach to DevOps is required to resolve misconfiguration issues once and for all.
Want more TSTV interviews? Click here.
-
Patrick Bergstrom - TSTV
Achieving the proper performance/cost optimization is a challenge faced by SREs running Kubernetes.CTO Patrick Bergstrom shares StormForge's announcement about their new release of StormForge Optimize Live. The new features include bi-dimensional pod autoscaling, combining the benefits of horizon...
-
Martin Roesch - TSTV
Martin and Alan talk about the latest version of Netography’s Fusion platform and its capabilities. Netography Fusion enables organizations to significantly reduce cyber threat risks and costly downtime in real-time with improved security and business context, as well as powerful remediation auto...
-
Features as a Service - Shiva Nathan, Onymos
Onymos CEO Shiva Nathan explains why the time for features-as-a-service (FaaS) has arrived.
-
Cohesive App Security - Guy Flechter, Cider Security
How do security and software engineers get on the same page about app security? We at least need to speak the same language, and establish some common group. DevOps workflows provide many entry points throughout the software creation process. Guy Flechter, Co-Founder and CEO of Cider Systems, sha...
-
Rob Emsley - TSTV
Rob Emsley, director of data protection solutions at Dell Technologies. explains why there needs to be a better balance struck between cybersecurity and resilience.
Want more TSTV interviews? Click here.
-
ReleaseIQ Acquisition - Sacha Labourey and Shawn Ahmed, CloudBees
Sacha Labourey, chief strategy officer, and Shawn Ahmed, chief marketing officer for CloudBees, explain how the acquisition of ReleaseIQ will provide more visibility and control across multiple DevOps workflows.
-
Evolution of DevSecOps - Anuj Kapur and Tim Johnson, CloudBees
CloudBees CEO Anuj Kapur and Tim Johnson, director of product marketing, dive into how DevSecOps needs to evolve to reduce friction between developers and cybersecurity teams.
-
Vladi Sandler - TSTV
Cloud-native early stage SaaS companies looking to secure their data and workloads in the cloud have been left with two choices: purchase a cloud solution or software focused only on the enterprise market. To close this gap, Lightspin has launched free access to its Cloud Native Application Prote...
-
Roi Rav-Hon - TSTV
Finout CEO Roi Rav-Hon explains how FinOps will rein in cloud spending that has spun out of control.
Want more TSTV interviews? Click here.
-
Simon Jelley TSTV
The shared responsibility security model doesn't mean outsourced responsibility. It's a common misconception that cloud providers are responsible for the end-to-end security of cloud applications. In reality, cloud providers are only responsible for securing their cloud and keeping it online, whi...
-
Miten Marfatia - TSTV
EvolveWare CEO Miten Marfatia explains why application modernization needs to be viewed as a continuous process.
Want more TSTV interviews? Click here.
-
Greg Murphy - TSTV
Ordr CEO Greg Murphy explains what makes IoT security so challenging.
Want more TSTV interviews? Click here.
-
Doug McKee - TSTV.mp4
Trellix Advanced Research Center recently published its research into CVE-2007-4559, a vulnerability estimated to be present in over 350,000 open-source projects and prevalent in closed-source projects. It exists in the Python tarfile module which is a default module in any project using Python. ...
-
Hacker Uses of Obfuscation - Tony Lauro, Akamai
Tony Lauro, Akamai Director of Security Technology & Strategy, discusses three of the key obfuscation techniques attackers use to break down defenses and exploit systems through undetectable means, including impersonation, trusted site, and human ingenuity techniques.
-
Cybersecurity Training for End Users - Ruston Miles, Bluefin
Ruston Miles, founder and advisor for Bluefin, a provider of a platform for securing payment data, explains why cybersecurity training for end users needs to improve.
-
Casey Rosenthal - TSTV
Verica announced the launch of the ProwlerPro SaaS. With the latest offering, Verica is providing companies running software on AWS with the most comprehensive, free, AWS security solution in the marketplace today.
Want more TSTV interviews? Click here.
-
Matt Mead - TSTV
Matt Mead, SPR Consutling CTO, and Techstrong Group's Mitch Ashley, discuss challenges and experiences of effectively bringing software and security teams together to deliver (secre) digital experiences for customers and end users.
Want more TSTV interviews? Click here.
-
Mario Espinoza - TSTV
Bringing Zero Trust security across the cloud, data center and endpoints is no smal challenge. Mario Espinoza, Illumio CPO, discusses Illumio's zero trust hybrid product strategy and the announcement of their endpoint security solution.
Want more TSTV interviews? Click here.
-
David Earhart and Brian Penn - TSTV
David Earhart, board member of the North Georgia Autism Foundation and Brian Penn, Security Posture Manager at AFLAC talk about their successful experience with an intern from the Bridge Academy, which trains autistic people for a career in cybersecurity.
Want more TSTV interviews? Click here.
-
Daniel Riedel - TSTV
Daniel Riedel, senior vice president for strategic services at Copado, explains why best DevSecOps practices are coming to the Salesforce software-as-a-service (SaaS) platform.
Want more TSTV interviews? Click here.
-
Pete Lund - TSTV
Pete Lund, vice president of product for OT security at OPSWAT, explains how neural networks will improve cybersecurity by detecting anomalies using algorithms.
Want more TSTV interviews? Click here.
-
Dr. Maria Bada - TSTV
Dr. Maria Bada, a behavioral scientist for AwareGo, explains what's required to make cybersecurity training effective.
Want more TSTV interviews? Click here.
-
Application Security - A.J. Grotto, Stanford University
A.J. Grotto from the Cyber Policy Center at Stanford University explains why application security is now a socio-economic issue.