Techstrong TV Interviews

Techstrong TV Interviews

Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.

Share
Techstrong TV Interviews
  • William Collins - TSTV

    William Collins, a cloud architect for Alkira, explains why a universal approach to DevOps is required to resolve misconfiguration issues once and for all.

    Want more TSTV interviews? Click here.

  • Patrick Bergstrom - TSTV

    Achieving the proper performance/cost optimization is a challenge faced by SREs running Kubernetes.CTO Patrick Bergstrom shares StormForge's announcement about their new release of StormForge Optimize Live. The new features include bi-dimensional pod autoscaling, combining the benefits of horizon...

  • Martin Roesch - TSTV

    Martin and Alan talk about the latest version of Netography’s Fusion platform and its capabilities. Netography Fusion enables organizations to significantly reduce cyber threat risks and costly downtime in real-time with improved security and business context, as well as powerful remediation auto...

  • Features as a Service - Shiva Nathan, Onymos

    Onymos CEO Shiva Nathan explains why the time for features-as-a-service (FaaS) has arrived.

  • Cohesive App Security - Guy Flechter, Cider Security

    How do security and software engineers get on the same page about app security? We at least need to speak the same language, and establish some common group. DevOps workflows provide many entry points throughout the software creation process. Guy Flechter, Co-Founder and CEO of Cider Systems, sha...

  • Rob Emsley - TSTV

    Rob Emsley, director of data protection solutions at Dell Technologies. explains why there needs to be a better balance struck between cybersecurity and resilience.

    Want more TSTV interviews? Click here.

  • ReleaseIQ Acquisition - Sacha Labourey and Shawn Ahmed, CloudBees

    Sacha Labourey, chief strategy officer, and Shawn Ahmed, chief marketing officer for CloudBees, explain how the acquisition of ReleaseIQ will provide more visibility and control across multiple DevOps workflows.

  • Evolution of DevSecOps - Anuj Kapur and Tim Johnson, CloudBees

    CloudBees CEO Anuj Kapur and Tim Johnson, director of product marketing, dive into how DevSecOps needs to evolve to reduce friction between developers and cybersecurity teams.

  • Vladi Sandler - TSTV

    Cloud-native early stage SaaS companies looking to secure their data and workloads in the cloud have been left with two choices: purchase a cloud solution or software focused only on the enterprise market. To close this gap, Lightspin has launched free access to its Cloud Native Application Prote...

  • Roi Rav-Hon - TSTV

    Finout CEO Roi Rav-Hon explains how FinOps will rein in cloud spending that has spun out of control.

    Want more TSTV interviews? Click here.

  • Simon Jelley TSTV

    The shared responsibility security model doesn't mean outsourced responsibility. It's a common misconception that cloud providers are responsible for the end-to-end security of cloud applications. In reality, cloud providers are only responsible for securing their cloud and keeping it online, whi...

  • Miten Marfatia - TSTV

    EvolveWare CEO Miten Marfatia explains why application modernization needs to be viewed as a continuous process.

    Want more TSTV interviews? Click here.

  • Greg Murphy - TSTV

    Ordr CEO Greg Murphy explains what makes IoT security so challenging.

    Want more TSTV interviews? Click here.

  • Doug McKee - TSTV.mp4

    Trellix Advanced Research Center recently published its research into CVE-2007-4559, a vulnerability estimated to be present in over 350,000 open-source projects and prevalent in closed-source projects. It exists in the Python tarfile module which is a default module in any project using Python. ...

  • Hacker Uses of Obfuscation - Tony Lauro, Akamai

    Tony Lauro, Akamai Director of Security Technology & Strategy, discusses three of the key obfuscation techniques attackers use to break down defenses and exploit systems through undetectable means, including impersonation, trusted site, and human ingenuity techniques.

  • Cybersecurity Training for End Users - Ruston Miles, Bluefin

    Ruston Miles, founder and advisor for Bluefin, a provider of a platform for securing payment data, explains why cybersecurity training for end users needs to improve.

  • Casey Rosenthal - TSTV

    Verica announced the launch of the ProwlerPro SaaS. With the latest offering, Verica is providing companies running software on AWS with the most comprehensive, free, AWS security solution in the marketplace today.

    Want more TSTV interviews? Click here.

  • Matt Mead - TSTV

    Matt Mead, SPR Consutling CTO, and Techstrong Group's Mitch Ashley, discuss challenges and experiences of effectively bringing software and security teams together to deliver (secre) digital experiences for customers and end users.

    Want more TSTV interviews? Click here.

  • Mario Espinoza - TSTV

    Bringing Zero Trust security across the cloud, data center and endpoints is no smal challenge. Mario Espinoza, Illumio CPO, discusses Illumio's zero trust hybrid product strategy and the announcement of their endpoint security solution.

    Want more TSTV interviews? Click here.

  • David Earhart and Brian Penn - TSTV

    David Earhart, board member of the North Georgia Autism Foundation and Brian Penn, Security Posture Manager at AFLAC talk about their successful experience with an intern from the Bridge Academy, which trains autistic people for a career in cybersecurity.

    Want more TSTV interviews? Click here.

  • Daniel Riedel - TSTV

    Daniel Riedel, senior vice president for strategic services at Copado, explains why best DevSecOps practices are coming to the Salesforce software-as-a-service (SaaS) platform.

    Want more TSTV interviews? Click here.

  • Pete Lund - TSTV

    Pete Lund, vice president of product for OT security at OPSWAT, explains how neural networks will improve cybersecurity by detecting anomalies using algorithms.

    Want more TSTV interviews? Click here.

  • Dr. Maria Bada - TSTV

    Dr. Maria Bada, a behavioral scientist for AwareGo, explains what's required to make cybersecurity training effective.

    Want more TSTV interviews? Click here.

  • Application Security - A.J. Grotto, Stanford University

    A.J. Grotto from the Cyber Policy Center at Stanford University explains why application security is now a socio-economic issue.