Techstrong TV Interviews
Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.
-
Simulations and Open Source Python Projects - Chris Harrold, Ansys
Chris Harrold, developer experience program director for Ansys, explains how simulations will play a large role in improving the overall quality of application development starting with support for open source Python projects.
-
Teleport's State of Infrastructure Access and Security Report - Michael Ferranti, Teleport
Teleport's CMO, Michael Ferranti, fills us in on their recent report highlighting access and security challenges as infrastructure becomes more complex. As a bonus, Mike Rothman couldn't resist poking fun at zero-trust marketing hype, so they had a good discussion regarding how zero-trust can hel...
-
Docker Swarm - Shaun O'Meara, Mirantis
Shaun O'Meara, field CTO for Mirantis, explains why Docker Swarm is still gaining traction as a lighter weight container orchestration alternative to Kubernetes.
-
Cato Networks' Growth and the SASE Industry - Yishay Yovel, Cato Networks
Cato Networks announced that it became the fastest-growing enterprise network security startup with annual recurring revenue (ARR) growing from $1 million to $100 million in just five years. What's propelled the growth and what does it say about the rest of the SASE industry? Yishay Yovel gives t...
-
Critical Vulnerabilities in the IT Monitoring Tool - Stefan Schiller, SonarSource
Through their deep dive into the technical details of this vulnerability chain, SonarSource determined how an attacker can escalate to the Checkmk automation user by exploiting an authenticated arbitrary file read in NagVis. Stefan will discuss the multiple vulnerabilities that were discovered, h...
-
Accelerating the Future of Cyber Security - Jason Chen and Lindsey Polley, MACH37
Jason Chen, CEO and executive director of MACH37, and Dr. Lindsey Polley, director for cyber and space intelligence at MACH37, discuss what it takes to be the next-generation cyber product company and how their contributions to cybersecurity are monumental. They explore why accelerators are a sta...
-
Noname Recon - Filip Verloy, Noname Security
Noname Security recently announced the launch of Noname Recon, the latest addition to the company’s API Security Platform. With Recon, customers are now able to simulate an attacker performing reconnaissance on an organization’s domains, allowing them to rapidly find and fix issues – without any ...
-
Evolving Home Security - Keith Puckett and Mik Cox, Ubiety Technologies
This start-up is taking home security to the next level by helping us not just watch crime happen, but actually being able to identify the criminals by utilizing their new technology.
-
Should the CTO Know How to Code? - Hywel Carver, Skiller Whale
CTOs sit at the top of a highly technical, expensive organization. Some of them will have risen from being software developers through layers of management and leadership to arrive at that point. But is that background helpful? And is it necessary?
-
Cybersecurity Strategy and Performance - Sivan Tehila, Onyxia
Onyxia, an AI-powered cybersecurity strategy and performance platform, has raised $5 million in seed fundraising led by World Trade Ventures (WTV). Onyxia was founded by Sivan Tehila, who served as CISO of the Research and Analysis Division and Head of Information Security for the IDF prior to fo...
-
SBOMs and Software Supply Chain Security - Scott Robertson, ActiveState
ActiveState has launched a new active state repository to help software supply chain security, which uses SBOMs and builds software based upon case-specific dependencies.
-
Focusing on the Edge in 2023 - Theresa Lanowitz, AT&T Business
Theresa Lanowitz, head of cybersecurity evangelism for AT&T Business, goes through some of their 2023 predictions. She and Mike Rothman focus on edge computing use cases, and the impact on application security as all of this code increases the attack surface, regardless of where it's deployed.
-
Partnering with NTT Data - Russ Cobb, Cobalt
Cobalt announced a partnership with NTT DATA, a leading Managed Security Service Provider (MSSP) to offer stronger security to clients. The partnership expands NTT’s product and services portfolio to include Cobalt’s pentesting suite, which not only broadens Cobalt’s partner ecosystem, but also d...
-
EDB Tools and Extensions Release - Jozef de Vries, EnterpriseDB
EnterpriseDB announced the immediate global availability of EDB Tools and Extensions Release for PostgreSQL® 15 (EDB PG 15), which makes it easier than ever before for enterprises to deploy Postgres as their enterprise database standard. The announcement comes ahead of EDB’s next major release in...
-
Democratizing API Management - Rakshith Rao, APIwiz
APIwiz CEO Rakshith Rao explains how low-code tools will be employed to democratize the management of APIs in a way that reduces the misconfigurations that create cybersecurity challenges.
-
ClearML and Aporia Partnership - Liran Hason, Aporia & Moses Guttmann, ClearML
MLOps is one of the most rapidly expanding enterprise sectors today. But with fragmentation and inefficiencies continuing to undermine data science and engineering workflows, driving MLOps success and revenue generation continues to be incredibly slow going. To combat this, today, ClearML and Apo...
-
The Void - Courtney Nash, Verica
Courtney Nash presents the next iteration of The Void by Verica. Bringing in over 7,000 new incidents the report looks at a number of incidents to find trends, including that MTTR is not a reliable metric.
-
Ransomware Running Rampant - Andres Rodriguez, Nasuni
Nasuni CTO Andres Rodriguez explains why ransomware is running rampant because existing approaches to data protection are fundamentally broken at a time when the need for cybersecurity resiliency has never been greater.
-
Service Meshes and Application Security - Brian Gracely, Solo.io
Brian Gracely, vice president of product strategy for Solo.io, explains what service meshes such as Istio are emerging as the foundation upon which cloud-native application security will be built and maintained.
-
Cybersecurity in the Age of Connected Devices - Jim Hyman, Ordr
Recently appointed Ordr CEO Jim Hyman explains what cybersecurity needs to start with a thorough understanding of an ever-increasing attack surface in the age of connected devices.
-
Tech Labor Market Trends - Deepak Giridharagopal, Puppet
In a continuation from Alan's previous discussion with Deepak, they talk about trends in the tech labor market, the increased need for responsive security measures, what's next for the operations community, and more.
-
Codesee Vulnerability and Securing Software Supply Chains - Alex Ilgayev, Cycode
Alex Ilgayev, a security researcher for Cycode, dives into how a vulnerability discovered in an open source Codesee tool became the latest example of why there needs to be more focus in securing software supply chains
-
Open Source DevSpace Tool - Lukas Gentele, Loft Labs
Loft Labs CEO Lukas Gentele explains why donating an open source DevSpace tool to the Cloud Native Computing Foundation (CNCF) will advance Kubernetes developer productivity.
-
CockroachDB Update - Nate Stewart, Cockroach Labs
Cockroach Labs announced its most comprehensive update for CockroachDB, simplifying daily life for developers and making them more efficient by reducing the amount of application logic required to operate its hyper resilient cloud native database. This brings greater capabilities to the cloud-nat...