A gumbo of cybersecurity insights about Data Protection, Data Governance, and Data Backup
…
continue reading
Frank conversations with GCs, CPOs, Product and Policy Leaders around navigating the technology ecosystem, hosted by Andy Dale, General Counsel & Chief Privacy Officer at OpenAP and Pedro Pavón, Privacy & Data Policy at Meta. The Data Protection Breakfast Club is produced by L Suite, an executive peer community for CLOs & GCs to make better, faster decisions. Learn more @ https://www.lsuite.co/
…
continue reading
![Artwork](/static/images/128pixel.png)
1
287: The Secret Weapon NFL Teams Use for Game-Changing Decisions! - OSNEXUS
23:24
23:24
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
23:24Steven Umbehocker, CEO of OSNEXUS discusses how businesses can protect critical data with object storage, immutability, and AI-powered automation. He dives into cybersecurity strategies, the role of AI in long-term data retention, and why enterprises must rethink storage for modern workloads. Plus, a fascinating look at how NFL teams leverage data …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
286: CEOs Beware: Ignoring Your Data Could Cost You Everything – The Data Group
22:24
22:24
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
22:24Paul Graeve, CEO of The Data Group, discusses the hidden dangers of poor data management. We talk about why CEOs must take charge of their data strategy, how bad data can derail AI initiatives, and why fragmented data is silently draining company resources. Paul offers practical steps for leaders to regain control, unify their data, and turn it int…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
"M&A, IPOs and Commander's Palace" w/ Kathleen Patton
43:46
43:46
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
43:46Andy & Pedro sit down with Kathleen Patton, a GC who has literally seen it all and done it all in her impressive career. The convo targets some of the biggest issues when leading an IPO and M&A deals, but also touches on her style of confident leadership that all in-house lawyers ought to model and learn from. In addition to her stints inside compa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
286: CEOs Beware: Ignoring Your Data Could Cost You Everything - The Data Group
22:24
22:24
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
22:24Paul Graeve, CEO of The Data Group, discusses the hidden dangers of poor data management. We talk about why CEOs must take charge of their data strategy, how bad data can derail AI initiatives, and why fragmented data is silently draining company resources. Paul offers practical steps for leaders to regain control, unify their data, and turn it int…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
285: Hackers Are One Step Ahead – Can You Recover Your Backups? – DCIG
28:21
28:21
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
28:21Jerome Wendt, CEO & Principal Analyst at DCIG, unpacks the latest trends in data protection. We dive into intermittent encryption, a stealthy new ransomware tactic, and how AI-driven anomaly detection is reshaping cybersecurity. Jerome also shares insights on VMware’s licensing shake-up, the rise of multi-hypervisor environments, and why backup sol…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
285: Hackers Are One Step Ahead – Can You Recover Your Backups? - DCIG
28:21
28:21
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
28:21Jerome Wendt, CEO & Principal Analyst at DCIG, unpacks the latest trends in data protection. We dive into intermittent encryption, a stealthy new ransomware tactic, and how AI-driven anomaly detection is reshaping cybersecurity. Jerome also shares insights on VMware’s licensing shake-up, the rise of multi-hypervisor environments, and why backup sol…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
284: How to Stay Safe Online: The Growing Risk of Digital Impersonation in 2025 – Memcyco
19:43
19:43
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
19:43Kate Cox, Business Development at Memcyco uncovers the alarming rise of digital impersonation attacks and the role AI plays in making scams more convincing than ever. We discuss how cybercriminals exploit AI to clone websites, steal data, and undermine consumer trust. Kate shares eye-opening statistics, real-world examples, and practical strategies…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
284: How to Stay Safe Online: The Growing Risk of Digital Impersonation in 2025 - Memcyco
19:43
19:43
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
19:43Kate Cox, Business Development at Memcyco uncovers the alarming rise of digital impersonation attacks and the role AI plays in making scams more convincing than ever. We discuss how cybercriminals exploit AI to clone websites, steal data, and undermine consumer trust. Kate shares eye-opening statistics, real-world examples, and practical strategies…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
"Looking Forward to the Greenland Data Protection Act" w/ Pedro & Andy
39:37
39:37
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
39:37Andy and Pedro discuss the current climate for tech companies and the impact of an administration change in the US. They also touch on the 2025 outlook for AI tools, privacy laws and how to advise clients in this environment.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
283: How Data Lakes and Deep Learning Are Revolutionizing Cybersecurity in 2025 – DeepTempo
24:34
24:34
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
24:34Evan Powell, Founding CEO of DeepTempo, explores advancements in cybersecurity through the innovative use of Large Log Model (LogLM). He discusses the challenges of securing data amidst increasing cyber threats, the role of platforms like Snowflake in reducing data silos, and best practices for leveraging AI in threat detection. Powell emphasizes a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
283: How Data Lakes and Deep Learning Are Revolutionizing Cybersecurity in 2025 - DeepTempo
24:34
24:34
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
24:34Evan Powell, Founding CEO of DeepTempo, explores advancements in cybersecurity through the innovative use of Large Log Model (LogLM). He discusses the challenges of securing data amidst increasing cyber threats, the role of platforms like Snowflake in reducing data silos, and best practices for leveraging AI in threat detection. Powell emphasizes a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
282: Shocking New Tactics Hackers Are Using to Steal Your Identity – Breez Security
19:41
19:41
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
19:41Abhinav Srivastava, Founder and CEO of Breez Security delve into the rising importance of identity security in combating credential compromises and safeguarding cloud and SaaS platforms. Abhinav explains how to use behavioral identity telemetry and AI to enhance detection and response capabilities. The conversation explores persistent security chal…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
282: Shocking New Tactics Hackers Are Using to Steal Your Identity - Breez Security
19:40
19:40
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
19:40Abhinav Srivastava, Founder and CEO of Breez Security delve into the rising importance of identity security in combating credential compromises and safeguarding cloud and SaaS platforms. Abhinav explains how to use behavioral identity telemetry and AI to enhance detection and response capabilities. The conversation explores persistent security chal…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
281: Your Phone Could Be the Perfect Target — Here’s Why – Nuke from Orbit
22:28
22:28
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
22:28James O’Sullivan, founder and CEO of Nuke from Orbit explore the hidden dangers of PIN usage and the risks posed when phones are stolen, emphasizing the underestimated security vulnerabilities in everyday mobile device usage. James shares the origin story of his company, born from a personal incident of phone theft, and details how Nuke from Orbit …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
281: Your Phone Could Be the Perfect Target -- Here’s Why - Nuke from Orbit
22:27
22:27
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
22:27James O'Sullivan, founder and CEO of Nuke from Orbit explore the hidden dangers of PIN usage and the risks posed when phones are stolen, emphasizing the underestimated security vulnerabilities in everyday mobile device usage. James shares the origin story of his company, born from a personal incident of phone theft, and details how Nuke from Orbit …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
“The Human Dimension: Hiring, Mentoring and Team Leadership” w/ Susan Rohol and Anne Bradley
1:01:25
1:01:25
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:01:25Andy & Pedro are joined by some great friends and incredible privacy/legal leaders Anne Bradley FPF fellow/startup advisors/founder and former Nike/Hulu CPO and Susan Rohol partner @ Willkie Farr and former Warner/Discovery CPO. We chat about hiring, mentoring and the challenges/rewards of both!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
280: Protecting Backups and Future-Proofing Skills in Containers – IDC
26:18
26:18
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:18Johnny Yu, Research Manager, Infrastructure Software Platforms, Worldwide Infrastructure Research at IDC dives into the challenges and strategies for backing up containerized workloads. We explore the evolution of container technology, differences from traditional backups, and the expertise gap in managing Kubernetes-based systems. Johnny discusses…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
280: Protecting Backups and Future-Proofing Skills in Containers – IDC
26:17
26:17
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:17Johnny Yu, Research Manager, Infrastructure Software Platforms, Worldwide Infrastructure Research at IDC dives into the challenges and strategies for backing up containerized workloads. We explore the evolution of container technology, differences from traditional backups, and the expertise gap in managing Kubernetes-based systems. Johnny discusses…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
279: Connecting AI and DevOps to Solve Modern Workflow Challenges – Jozu
20:00
20:00
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
20:00Gorkem Ercan, CTO and Founding Distinguished Engineer at Jozu, shares insights into overcoming the challenges of integrating AI and ML into DevOps workflows, emphasizing the critical role of immutable artifacts in ensuring trust and efficiency. He introduces KitOps.ml, an open-source project designed to simplify the management of AI/ML artifacts an…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
279: Connecting AI and DevOps to Solve Modern Workflow Challenges - Jozu
19:59
19:59
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
19:59Gorkem Ercan, CTO and Founding Distinguished Engineer at Jozu, shares insights into overcoming the challenges of integrating AI and ML into DevOps workflows, emphasizing the critical role of immutable artifacts in ensuring trust and efficiency. He introduces KitOps.ml, an open-source project designed to simplify the management of AI/ML artifacts an…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
278: Critical Mobile Vulnerabilities and How to Prevent Them – Appknox
25:25
25:25
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
25:25Subho Halder, Co-founder and CEO of AppKnox, dives into the evolving challenges and trends in mobile app security. He shares insights into protecting sensitive data on mobile applications, addressing issues like man-in-the-middle attacks, insecure coding practices, and fake apps. He emphasizes the importance of integrating security into the Softwar…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
278: Critical Mobile Vulnerabilities and How to Prevent Them - Appknox
25:24
25:24
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
25:24Subho Halder, Co-founder and CEO of AppKnox, dives into the evolving challenges and trends in mobile app security. He shares insights into protecting sensitive data on mobile applications, addressing issues like man-in-the-middle attacks, insecure coding practices, and fake apps. He emphasizes the importance of integrating security into the Softwar…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
277: Why Business Continuity Plans Often Fail – Strata Identity
23:22
23:22
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
23:22Eric Olden, Co-Founder and CEO of Strata Identity, dives into the challenges and innovations in identity management for multi-cloud environments. He explains the concept of identity orchestration, its role in zero-trust architecture, and the evolution of identity management from SAML to abstraction layers like IDQL and HEXA. Eric also highlights re…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
277: Why Business Continuity Plans Often Fail - Strata Identity
23:21
23:21
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
23:21Eric Olden, Co-Founder and CEO of Strata Identity, dives into the challenges and innovations in identity management for multi-cloud environments. He explains the concept of identity orchestration, its role in zero-trust architecture, and the evolution of identity management from SAML to abstraction layers like IDQL and HEXA. Eric also highlights re…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
“I’m Looking for the Trader Joe’s of Law Firms” w/ Rob Morvillo
52:14
52:14
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
52:14Andy & Pedro are joined by a good friend of the pod, Rob Morvillo - Chief Legal Officer @ Olo. The discussion focuses on the in-house lawyer’s relationship with their outside law firm counsel and how this has evolved over time.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
276: When Hackers Hit Your Backups, This One Thing May Save You - Myota
25:12
25:12
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
25:12Gabriel Gumbs, Chief Product Officer and President at Myota, unpacks the unsettling truths about immutability, the evolution of ransomware tactics, and why traditional backup systems are failing in the face of cyber threats. Discover a revolutionary approach to Polymorphic Immutability, designed to keep your data secure, recoverable, and cost-effec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
275: From Open-Source to APIs: The Critical Decisions Behind SaaS Architecture - Fastbreak RFP
26:31
26:31
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:31Peter Bonney, CEO and Founder of Fastbreak RFP, shares his journey in building a scalable SaaS platform for automating RFP responses using AI. Peter dives into the challenges of balancing innovation with the rapid evolution of foundational AI models, the trade-offs between open-source tools and third-party APIs, and the critical architectural decis…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
274: Preventing Breaches Through Smarter Detection Techniques - Vectra AI
25:49
25:49
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
25:49David Brooks, Cyber Security Architect at Vectra AI discusses early adversary detection, the role of AI and machine learning in preventing breaches, and the importance of network traffic analysis. David shares insights into balancing technology and empathy in cybersecurity, the value of layered defense strategies, and advice for aspiring profession…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
"McPrivacy” w/ Alan Chapell
39:10
39:10
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
39:10Andy and Pedro chat with their good friend Alan Chapell, longtime AdTech privacy lawyer and one of the key voices in the overlap between AdTech and competition law.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
273: Critical Attack Vectors Every SMB Must Defend Against - Dropsuite
22:33
22:33
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
22:33Mark Kirstein, Chief Product Officer at DropSuite discusses the evolving cyber threat landscape, particularly how SMBs are increasingly targeted by cybercriminals. He explains the rising importance of data protection and the critical role MSPs play in helping small businesses safeguard essential information. Mark shares insights on new attack vecto…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
272: Protecting the Next Generation of AI: Backup Challenges for Large Language Models - IDC
23:44
23:44
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
23:44Phil Goodwin, IDC’s Research VP, explore the challenges of backing up AI environments, focusing on large language models. Phil highlights the limitations of traditional backup methods for dynamic AI systems and the industry's push for genuine AI-driven data protection. We discuss the roles of companies like Dell, Commvault, Rubrik, and Cohesity in …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
271: Guarding the Kingdom: Protecting Microsoft Entra ID and IAM Systems- Dropsuite
25:18
25:18
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
25:18Bernard Clark, Senior Product Manager at DropSuite discusses the essential role of identity management and backup in today’s digital infrastructure. He highlights the critical need for organizations to protect Microsoft Entra ID, which he refers to as "the keys to the kingdom," underscoring its importance as a primary target for cyber threats. We e…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
"Hal from the Appliances Department" w/ Pedro & Andy
42:10
42:10
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
42:10Andy and Pedro discuss the importance of putting yourself out there in your career by speaking, writing and engaging in public conversations. They also bat around some really important concepts like what to watch on flights, motorcycle meditation and the best privacy pros to hear speak at events.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
270: How AI is Reshaping Large-Scale Databases for the Next Generation - MongoDB
22:11
22:11
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
22:11Pavel Duchovny, Lead Developer Advocate at MongoDB, discusses the role of AI stacks in modern application development. He explains how MongoDB integrates into the AI stack, focusing on operational and vector databases, and shares best practices for managing vector data and optimizing storage. He also covers MongoDB's innovative security features li…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
269: You’re Not as Protected as You Think: The Dark Side of SaaS - HYCU
24:45
24:45
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
24:45Simon Taylor, CEO of HYCU discusses the state of SaaS resilience and the critical need for SaaS data protection. We discuss insights from a recent report surveying over 417 IT decision-makers worldwide. Simon shares the shocking statistic that 61% of ransomware attacks occur through SaaS services, challenging the assumption that SaaS data is inhere…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
268: How This CEO Grew a Cybersecurity Empire from His Brother’s Garage - Stimulus Technologies
25:27
25:27
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
25:27Nathan Whittacre, CEO of Stimulus Technologies discusses evolving cybersecurity threats, strategies to safeguard businesses, and how companies can foster a culture of cybersecurity awareness. He shares insights on managing cross-site tokenization attacks, the role of AI in both generating and defending against cyber threats, and best practices for …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
267: Why the Data Lakehouse Is the Future—But What’s Stopping It from Getting There? - Upsolver
26:37
26:37
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:37Ori Rafael, CEO and co-founder of Upsolver explores the future of data management through data lakehouses. He explains the evolution of the lakehouse, a revolutionary architecture that combines the best of data lakes and warehouses. You will gain insights into key technologies like Apache Iceberg, how lakehouses enable advanced use cases such as AI…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
266: Crucial Cybersecurity Advisory Before, During & After the Election - SolCyber
26:37
26:37
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:37Scott McCrady, CEO of SolCyber discusses managed cybersecurity services, rising cyber insurance costs, and the impact of geopolitical conflicts on cybersecurity. He shares insights on how organizations can reduce risks and improve response strategies, especially in today's uncertain political and economic landscape. Scott also addresses the role of…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
265: Generative AI & Data Privacy: How Companies Can Build Consumer Trust in 2025 - DataGrail
23:37
23:37
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
23:37Daniel Barber, CEO of DataGrail delves into the founding of DataGrail, the challenges enterprises face in managing privacy, and how regulations like GDPR and CCPA impact the collection and processing of personal data. The conversation highlights the significance of consent in the digital age, the role of generative AI in data processing, and the ne…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
264: Authorization vs Authentication: What You Need to Know for Cybersecurity - AuthZed
26:42
26:42
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:42Jake Moshenko, Co-founder and CEO of AuthZed discusses the challenges of application security, focusing on the critical difference between authorization and authentication, and how these play a role in modern cybersecurity. He also touches on topics like ransomware threats, AI in cybersecurity, and trends in the job market, providing insightful adv…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
“Episode 100! Sharp Paintbrushes” w/ Andy & Pedro
38:40
38:40
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
38:40Andy and Pedro celebrate the 100th episode of DPBC! They discuss the future of tech companies in the EU, focusing on data protection regulations and the challenges these companies face. Thank you for listening!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
263: Immutable Data, Infinite Possibilities: The Decentralized Storage Revolution - Akave.io
28:07
28:07
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
28:07Stefaan Vervaet, CEO of Akave.ai discusses the revolutionary impacts of decentralized compute, immutability, and blockchain technology in data storage and protection. Stefaan shares insights on how Akave.ai is leveraging blockchain to create a decentralized storage solution that ensures data integrity and immutability, making it particularly valuab…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
262: The Intersection of Hiring Trends in Cloud, Cybersecurity, and Disaster Recovery - Arpio
19:05
19:05
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
19:05Doug Neumann, co-founder and CEO of Arpio, discusses how Arpio differentiates itself by offering a turnkey disaster recovery solution that addresses modern cloud architectures. He shares insights on navigating economic turbulence, the evolution of cybersecurity threats, and how Arpio is leveraging AI to accelerate ransomware recovery.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
261: The Fastest Emerging Unseen Attack Surface: The Next Big Cyber Risk - FireTail
27:06
27:06
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
27:06Jeremy Snyder, founder and CEO of FireTail, joins the show to discuss the rising importance of API security in a world where over 80% of internet requests are API calls. Jeremy shares his journey from launching FireTail to becoming a leading voice in cybersecurity, providing insights into how organizations can protect their APIs from increasingly c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
260: How to Overcome the Hiring Trust Gap: Secrets from a Former Google Engineer - Morgan Latimer Consulting
26:19
26:19
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:19Anthony Mays, a former Google software engineer and the founder of Morgan Latimer Consulting shares his inspiring journey from growing up in Compton and overcoming personal challenges to becoming a successful technologist. Discover the strategies that can be used to overcome the trust gap in hiring and land top roles. Learn how to build credibility…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
259: The Hidden Vulnerabilities in Enterprise Browsers - SquareX
26:50
26:50
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:50Vivek Ramachandran, the visionary founder of SquareX shares the origins of SquareX, highlighting how it aims to mitigate last-mile attacks by embedding security directly within the browser. The discussion delves deep into the importance of browser security in today's enterprise environments, addressing common threats such as ransomware, phishing, a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
258: AI Governance Essentials: How to Establish a Program from the Ground Up - Relyance AI
25:07
25:07
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
25:07Leila Golchehreh, Co-Founder and Chief Strategy Officer at Relyance AI delved into AI governance, the importance of data integrity, and best practices for integrating AI technologies securely. Leila shared her journey and vision for creating a company that bridges the gap between privacy and technology, emphasizing the need for continuous monitorin…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
257: From Wall Street to Your Fridge: The Databases You Didn’t Know Existed - Faircom
25:04
25:04
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
25:04Mike Bowers, Chief Architect at Faircom dives into the intricacies of database technology and its real-world applications. Mike shares insights on Faircom’s role in critical systems such as the U.S. stock market, FAA flight tracking, and even the International Space Station. We explore the evolution of data management, the impact of IoT, and the fu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
256: From Tapes to Terabytes: The Great Storage Shift - JetStor
21:47
21:47
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
21:47Gene Leyzarovich, Founder at JetStor shares insights on the evolution of data storage from tapes and magnetic disks to modern flash and hybrid systems. We discuss the significant impact of the Broadcom and VMware acquisition on licensing costs, prompting many organizations to explore alternatives like Proxmox and Hyper-V.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
"Yankees Hat at a Red Sox Game" w/ Nubiaa Shabaka
34:02
34:02
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
34:02Nubiaa Shabaka combines a wealth of expertise in privacy/cybersecurity with a deep curiosity and love of learning/collaborating. It is a skill we have consistently seen in several big organization CPOs. And Nubiaa has had some of the biggest roles you can have in privacy/cyber at a mix of very complex organizations. Currently she is the VP, & Chief…
…
continue reading