Techstrong TV Interviews
Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.
-
State of Software Supply Chain - Brian Fox, Sonatype
Brian Fox, Sonatype CTO, discusses the eighth annual State of the Software Supply Chain report. This year's report focuses on the ongoing growth of the software supply chain, as well as persistent security concerns, insights on choosing the best dependencies for your projects, developer behavior ...
-
Innovation to Ease Compliance Burdens - Scott Craig, Hyland Software
Mike talks to Scott Craig from Hyland Software about how to minimize the overhead of compliance reporting by leveraging machine learning and other recent innovations. They also discuss some differences in the compliance process between industries.
-
Automatically Patching to Remediate Vulnerabilities - Jeffrey Martin, Mend
Jeffrey Martin, vice president of product for Mend, explains why so much more code should just be automatically patched to remediate vulnerabilities.
-
Regulatory Trends for Critical Infrastructure - Dan Lorhmann, Presidio
Dan Lohrmann, field CISO for Presidio, takes a victory lap for his correctly predicted view of increasing regulation for incident reporting. He then chats with Mike about other markets where we can expect tighter regulation and what organizations should do to prepare.
-
Extended Detection and Response - Jamie Arlen, Aiven
Alan and Jamie talk about the latest developments with Aiven as well as XDRA.
-
Building Small Company Security Programs - Frank Kim, YL Ventures
Frank Kim and Mike discuss when and how smaller companies should build a security program and hire dedicated security people. They also talk about how to decide the appropriate level of security tooling for a company.
-
Remote Desktop Protocol Weaknesses - Raj Dodhiawala, Remediant
Remediant CEO Raj Dodhiawala explains why inherent remote desktop protocol (RDP) weaknesses require a different cybersecurity approach to prevent malware from moving laterally across an extended enterprise.
-
Open Source Software Security and DevSecOps - Dustin Ingram, Google,
Dustin Ingram, a software engineer on the Open Source Security Team at Google, details how open source software is becoming more secure thanks to better DevSecOps practices in the wake of the executive order issued by the Biden administration.
-
Continuous Software Security Platform - Brian Roche, Veracode
Veracode announced the enhancement of its Continuous Software Security Platform with substantial improvements to its integrated developer experience. New features include extended integrations to support software composition analysis (SCA), a software bill of materials (SBOM) Application Programm...
-
Achieving and Maintaining Compliance - Igor Volovich, Qmulos
Igor Volovich, vice president of compliance strategy for Qmulos, explains why existing approaches toward achieving and maintaining compliance are fundamentally broken in way that adversely impacts everything from cybersecurity to business risk management.
-
Tricentis NeoLoad 9.0 - Kevin Thompson, Tricentis
Tricentis announced the launch of Tricentis NeoLoad 9.0, and new products Tricentis Test Management for Jira and Tricentis Test Automation for Salesforce. The solutions expand the company’s market leading capabilities in continuous performance testing, test management, and test automation aimed a...
-
Open Source Streaming Data Analytics - Eric Sammer, Decodable
Decodable CEO Eric Sammer explains how the rise of open source streaming data analytics platforms are driving modern approaches to DataOps that are fueling digital business transformations.
-
DevDataSecOps - Karthik Ranganathan, Yugabyte
Now that security products are becoming increasingly automated, and the teams are increasingly integrated, the fly in the ointment is the data team. Karthik Ranganathan describes the next generation of the dev pipeline - DevDataSecOps.
-
AI Libraries for Developers - Hemanth Manda, IBM
Hemanth and Alan talk about how IBM released three AI libraries for developers to be able to incorporate into their apps with more to come.
-
Preventing Adversarial Machine Learning Attacks - Tito Sestito, HiddenLayer
Chris ‘Tito’ Sestito is Co-Founder & CEO of HiddenLayer, a cybersecurity start-up dedicated to preventing adversarial machine learning attacks. Tito discusses the 10/25 launch of the new HiddenLayer MLSec Platform as well as security issues affecting AI and the lack of technology offerings curren...
-
Modernizing Data Protection - Florian Malecki, Arcserve
Florian Malecki, chief marketing officer for Arcserve, explains why the need to modernize data protection has become so much more pressing in a ransomware era where there is no real defense against these types of cyberattacks.
-
Challenges of Secrets Management - Oded Hareven, Akeyless
Akeyless CEO Oded Hareven explains what makes secrets management so stubbornly difficult despite the rise of best DevSecOps processes after raising $65 million to solve the cybersecurity problem.
-
FinOps and Machine Learning - JT Giri, nOps
NOps CEO JT Giri explains how financial operations (FinOps) is being automatically implemented using machine learning algorithms to rein in cloud computing costs that have spun out of control.
-
State of the Software Supply Chain - Stephen Magill, Sonatype
Dr. Stephen Magill discusses the key findings from Sonatype's 8th Annual State of the Software Supply Chain Report. Over the past year, Sonatype studied dependency update patterns for thousands of open source projects, analyzed hundreds of survey responses, and took a critical look at commonly-he...
-
SolarWinds Observability - Josh Stageberg, SolarWinds
Josh talks about SolarWinds Observability, which is a fully-integrated, cloud-native SaaS offering that provides unified and comprehensive visibility for today's modern, distributed, hybrid and multi-cloud environments. The new SaaS platform blends SolarWinds observability solutions across networ...
-
CostIQ - Rod Stuhlmuller, Aviatrix
Rod talks about Aviatrix's new solution - CostIQ, which enables organizations to institute detailed network usage-based, multi-cloud chargebacks, accurately billing individual cost centers for real use. Furthermore CostIQ allows IT planners and cloud architects to effortlessly analyze expense usa...
-
Challenges of Starting Projects with Microservices - Darko Fabijan, Semaphore
Darko talks about why starting a new project with microservices may be tempting but that's almost never a good idea. The problem resides in that nailing the design is absolutely a must for microservices, and the first design is almost never the most optimal. We must try and discard different desi...
-
Supporting openCypher - Jay Yu, TigerGraph
TigerGraph announced its commitment to support openCypher, a popular query language for building graph database applications. Developers can now access a limited preview translation tool to learn how openCypher support will appear in TigerGraph’s flagship graph query language, GSQL.
-
Emergence from Stealth - Dev Nag, CtrlStack
Mike interviews Dev Nag, CEO of CtrlStack to discuss their emergence from stealth and how they are going beyond observability data to more effectively discover the root cause of application issues.