Techstrong TV Interviews

Techstrong TV Interviews

Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.

Share
Techstrong TV Interviews
  • Technical Debt in DevOps - Juan Orlandini, Insight

    Juan Orlandini, CTO for Insight, explains how despite the rise of DevOps increasing amounts of technical debt is conspiring to slow the pace of innovation within enterprise IT organizations.

  • Application Workloads and IaaS - Rich Dandliker, Veza

    Rich Dandliker, chief strategist for Veza, explains why even after more than a decade of cloud computing the number of cybersecurity challenges organizations face continue to abound as more application workloads are shifted toward infrastructure-as-a-service (IaaS) platforms.

  • Generative AI Platforms in App Development - Kin Lane, Postman

    Kin Lane, chief evangelist for Postman, explains how generative artificial platforms (AI) such as ChatGPT may be more problematic than application developers appreciate when they are used to help write code.

  • U.S. National Security Strategy - Tony Scott, Intrusion

    Intrusion CEO Tony Scott and former CIO for the U.S. federal government weighs in on how the U.S. National Security Strategy outlined by the Biden administration will improve the overall state of cybersecurity.

  • Protecting Brand Value with Cybersecurity - Yoav Keren, BrandShield

    BrandShield Systems CEO Yoav Keren explains how the cat and mouse game between cybercriminals and cybersecurity professionals is evolving in a digital age where protecting brand value is more crucial than ever.

  • Elizabeth Lawler and Pete Cheslock, AppMap - Improving Developer Experience

    Elizabeth Lawler, Pete Cheslock and Alan discuss ways on improving developer experience, pros and cons of ChatGPT and generative AI, why organizations must reduce manual work and toil for developer teams to drive creativity and innovation. Elizabeth Lawler, founder and CEO of AppMap will also tou...

  • Current State of SIEM - Tyler Farrar, Exabeam

    Tyler discusses the current state of SIEM at US Organizations. Most security professionals display great confidence in their solutions being able to minimize the risk of cyberattack but when challenged, their confidence wanes. According to a recent SIEM survey conducted by Exabeam, when responden...

  • Convergance of Cybersecurity and Cloud Markets - Dan Schiappa, Arctic Wolf

    Dan provides advice for mid-market CISOs who are re-evaluating their cloud/security budgets, insights on how businesses can pivot their cloud security priorities to stay aligned with the current macroeconomic environment and ensure they stay safe and discusses why he believes that the cybersecuri...

  • Certificate Lifecycle Management - Tim Callan, Sectigo

    Sectigo’s chief experience officer, Tim Callan, shares from his vantage point what the CLM (certificate lifecycle management) space foresees in digital certificates in 2023 – the key to certificate management in the cloud, zero-touch deployment, crypto agility and more for enterprises. He will sh...

  • American Data Privacy and Protection Act - Mike O'Malley, SenecaGlobal

    In the near future, the U.S. will likely pass the American Data Privacy and Protection Act (ADPPA), a major bill that introduces oversight on how consumer data is collected and processed from U.S. citizens. The legislation is aimed at reducing the number of data breaches and to rein in abuses on ...

  • Use Cases for Wasm - Bailey Hayes, Cosmonic

    Bailey Hayes, a newly appointed member of the technical oversight committee for WebAssemby (Wasm) at the Bytecode Alliance and a director at Cosmonic, dives into the use cases for Wasm and the issues application developers will need to resolve as the portable format for building software continue...

  • Democratizing Data Engineering - John Lafleur, Airbyte

    Airbyte COO John Lafleur explains how data engineering is being democratized as it becomes much simpler to automate integration tasks using reusable connectors constructed using an open source platform the company is now building a community around.

  • Impact of Ransomware Attacks on Businesses - Allen Jenkins, InterVision

    Allen Jenkins, CISO and vice president of cybersecurity consulting at InterVision, explains why cybersecurity teams are underestimating the impact ransomware attacks are having on businesses no matter how quickly they recover

  • Styra Load - Tim Hinrichs, Styra

    Tim Hinrichs, co-founder and CTO of Styra, talks about Styra’s new Styra Load product, which was created to advance the capabilities of Open Policy Agent (OPA) by mitigating the effects of data heavy authorization, while reducing infrastructure costs and increasing authorization performance for p...

  • Evolving Legacy IT - Venkat Pillay, CloudFrame

    Venkat Pillay discusses CloudFrame, which is an application modernization software company that provides solutions that address the challenges of transforming mainframe COBOL applications into maintainable Java. In this interview, we'll discuss why key industries including financial services, oil...

  • Development Environment Security - Tomislav Pericin, ReversingLabs

    The weeks-long compromise of CI/CD vendor CircleCI in December sent shockwaves through development organizations around the globe. It also highlighted a key vulnerability facing development organizations: compromised and rogue developer accounts that abuse access to internal networks and assets, ...

  • Cloud Security Outlook 2023 - Subhalakshmi Ganapathy, ManageEngine

    Subhalakshmi Ganapathy, IT security evangelist at ManageEngine, the enterprise IT management division of Zoho Corporation, discusses results from the company's new study, Cloud Security Outlook 2023. ManageEngine commissioned Censuswide, an independent market research agency, to study the cloud l...

  • Challenges Facing IT Leaders - Ramin Ettehad, Oomnitza

    Earlier this month, Oomnitza published the second in a series of three reports on challenges facing IT leaders as they manage hardware, software, network and cloud infrastructure across increasingly distributed environments. This report, titled "2023 Snapshot Survey: SaaS and Cloud Spend Optimiza...

  • Marrying Automation with Intelligence - Zoe Clelland, Nintex

    The world of automation stretches wide but Zoe Clelland, VP of product and experience at Nintex, has a perspective on how companies can narrow in on what matters most through marrying automation with intelligence, while wrapping AI around it. This approach creates, what Zoe calls, an “infinite le...

  • Cybersecurity with ChatGPT and Big Data - Michael Rinehart, Securiti.ai

    Michael Rinehart, vice president of artificial intelligence (AI) for Securiti.ai, explains how cybersecurity teams will be able to leverage AI platforms such as ChatGPT in combination with Big Data to even the odds when it comes to thwarting cyberattacks.

  • Malware in Corporate Networks - David Anteliz, Skybox Security

    David Anteliz, senior technology director for Skybox Security, explains why there's a lot more malware lurking on corporate networks than many IT teams fully appreciate.

  • Cost Saving Automation - Anna Daugherty, Armory

    The recognition of high-tech spending and a need to preserve budgets has pushed teams to see where they can optimize their IT, cloud and software development processes while maintaining quality processes. Anna Daugherty, Armory senior product marketing manager, discusses how automation aids in co...

  • Data Privacy and Security Regulations - Spencer Kindt, Optiv

    In this discussion with Alan Shimel, Spencer Kindt, senior leader, Data: Privacy, Governance and Protection at Optiv, leads a healthy debate between the pros and cons of regarding data privacy and security regulations.

  • Data Security in Smart Homes - Nathan Hart, Canonical

    Nathan Hart, product manager from Canonical, talks about how device manufacturers can keep personal data safe in smart homes. The first step towards having secure devices is having a robust update policy. Many devices in today’s smart homes do not receive updates without manual intervention by th...