Techstrong TV Interviews
Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.
-
Turnstile API - John Graham-Cumming, Cloudflare
Cloudflare will launch Turnstile, a new API that any site owner can use to replace CAPTCHAs on their site, whether or not they use Cloudflare already. Turnstile is a smarter, invisible CAPTCHA alternative. The solution automatically chooses from a rotating suite of browser challenges that work be...
-
Scale, Production and Expertise - Robert Nishihara, Anyscale
From the board level down, companies know that AI is an urgent competitive necessity. But despite promises to redefine every industry, many companies struggle to get value out of AI. Underlying this struggle are a few core challenges: scale, production, and expertise. Robert unpacks the essential...
-
Open Source Immutable Database - Dennis Zimmer, Codenotary
Codenotary CTO Dennis Zimmer explains why there is a need for an open source immutable database that as an alternative to blockchain platforms will better secure software supply chains.
-
Using Streaming Analytics to Improve Security Detection - Ganesh Pai, CEO of Uptycs
Ganesh Pai, Founder and CEO of Uptycs and Mike discuss innovative ways to capture telemetry from endpoints all the way to cloud platforms and the role of streaming analytics in improving security detection.
-
Scott Trevino - TSTV
Scott Trevino, senior vice president of cybersecurity for TRIMEDX, explains why the connected hospital has become such a tempting threat for cybercriminals.
Want more TSTV interviews? Click here.
-
Gary LaFever TSTV
Anonos discusses it has raised $50 million in new growth financing to deliver data privacy technology with 100% accuracy and utility to data -driven enterprises. The company will use the growth funding to scale customer success and expand partnerships, sales and marketing for its Data Embassy® so...
-
CodeSentry - Vince Arneja, Grammatech
GrammaTech's newest product, CodeSentry, is a supply chain security platform (SaaS and On-prem) which can scan production applications (binaries and beyond) to produce SBOMs, identify associated open source vulnerabilities, license information and a lot more.
-
Kubescape - Craig Box, ARMO
Craig Box, vice president of open source and community for ARMO, explains how an open source Kubescape project is advancing Kubernetes cybersecurity.
-
Cyberattack Patterns Becoming More Sophisticated - Tobias Träbing, XM Cyber
Tobias Träbing, technical director for EMEA for XM Cyber, dives into how cyberattack patterns against applications are becoming more sophisticated.
-
Cloud Computing in Hybrid IT Environments - Harish Grama, Kyndryl
Harish Grama, global cloud practice leader for Kyndryl, explains what makes cloud computing in hybrid IT environments more challenging to manage than ever.
-
ActiveState Artifact Repository - Loreli Cadapan, ActiveState
ActiveState releases ActiveState Artifact Repository to enable organizations to securely build Python dependencies directly from source code. Rather than developers importing prebuilt Python dependencies from a public repository like the Python Package Index (PyPI), or from some internal build pr...
-
Open Source Intrusion Detection and Prevention - Éric Leblond and Peter Manev, Stamus Networks
In advance of SuriCon event, Stamus Networks CTO Éric Leblond and Peter Manev, chief strategy officer, discuss why a more introductory “Network Security using Suricata" book was needed to help make the open source intrusion detection/intrusion prevention (IDS/IPS) platform more accessible
-
ML/AI Adoption in Cybersecurity - May Wang, Palo Alto Networks
Dr. May Wang discusses ML/AI adoption within the field of cybersecurity, how it has impacted her day-to-day, and what role she plays in advancing its utility within the industry as threats constantly evolve. She belongs to the 1% of female leaders in c-suite roles within the cybersecurity field a...
-
Rick McElroy - TSTV
The scary reality is: cybersecurity is no longer just a focus for defenders, but for society at large. Rick McElroy of VMware speaks to the various ways cyberattacks are evolving - for example, two-thirds of defenders witnessed a deepfake attack over the past year - and how to combat them.
Want ...
-
Integrating Disparate SaaS Applications - Marc Boscher, Unito
Unito completed $20 million in funding led by CDPQ with participation from new investors Rainfall Ventures and Investissement Québec. The new funding will allow Unito to solidify its growing market traction. Unito integrates disparate SaaS applications like Asana, GitHub, Google Sheets, Jira, Sal...
-
Multifactor Authentication Fatigue - Daniel Thanos, Arctic Wolf Labs
Daniel Thanos, vice president of Arctic Wolf Labs, explains why multifactor authentication (MFA) fatigue has already set in despite best cybersecurity intentions.
-
Maximizing Customer Lifetime Value - Vinod Vasudevan, Flytxt
At Flytxt, Dr. Vinod Vasudevan is helping some of the biggest brands in the world like Samsung, Nokia, and Oracle amongst others to maximize their customer lifetime value. Today, the company has the most well-trained AI to measure CLV.
-
Adapting Cybersecurity to Economic Challenges - Ravid Circus, Seemplicity
Ravid Circus, chief product officer for Seemplicity, explains why the current challenging economic climate will require cybersecurity teams to change the way they collaborate.
-
Open Source Milvus Vector Database - Frank Liu, Zilliz
Frank Liu, director of operations & ML architect at Zilliz, discusses $60M raised for open source Milvus vector database.
-
Challenges of Application Modernization - Derek Ashmore, Asperitas
Derek Ashmore, application transformation principal for Asperitas, explains what makes application modernization so challenging in the age of cloud computing.
-
Applying AI Across Business and IT Operations - Kanti Prabha, SirionLabs
SirionLabs co-founder Kanti Prabha explains what it takes to successfully apply artificial intelligence (AI) across business and IT operations.
-
Application Networking and Service Mesh - Chris Holmes, Greymatter.io
Greymatter.io CEO Chris Holmes explains why application networking will require a lot more than service mesh to be achieved.
-
Focusing on Enablers to Prevent Security Breaches - Ben Smith, NetWitness
NetWitness Field CTO Ben Smith explains why cybersecurity teams need to focus more on enablers rather than indicators of compromise to prevent security breaches.
-
DevOps and IT Service Management - Ming Gong, Blameless
Ming Gong, newly appointed vice president of product management for Blameless, dives into how the role of the SRE is evolving as IT organizations seek to bridge the divide between DevOps and IT service management (ITSM).