Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
A gumbo of insights and information about Cybersecurity and Data Protection
…
continue reading

1
271: Guarding the Kingdom: Protecting Microsoft Entra ID and IAM Systems- Dropsuite
25:18
25:18
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
25:18
Bernard Clark, Senior Product Manager at DropSuite discusses the essential role of identity management and backup in today’s digital infrastructure. He highlights the critical need for organizations to protect Microsoft Entra ID, which he refers to as "the keys to the kingdom," underscoring its importance as a primary target for cyber threats. We e…
…
continue reading

1
Working together and keeping data apart: unlocking the power of Data Rooms
32:18
32:18
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
32:18
Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data?Look no further, data rooms are here to sa…
…
continue reading

1
270: How AI is Reshaping Large-Scale Databases for the Next Generation - MongoDB
22:11
22:11
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
22:11
Pavel Duchovny, Lead Developer Advocate at MongoDB, discusses the role of AI stacks in modern application development. He explains how MongoDB integrates into the AI stack, focusing on operational and vector databases, and shares best practices for managing vector data and optimizing storage. He also covers MongoDB's innovative security features li…
…
continue reading

1
269: You’re Not as Protected as You Think: The Dark Side of SaaS - HYCU
24:45
24:45
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
24:45
Simon Taylor, CEO of HYCU discusses the state of SaaS resilience and the critical need for SaaS data protection. We discuss insights from a recent report surveying over 417 IT decision-makers worldwide. Simon shares the shocking statistic that 61% of ransomware attacks occur through SaaS services, challenging the assumption that SaaS data is inhere…
…
continue reading

1
What you need to know about NIS2 and how to prepare
30:36
30:36
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
30:36
In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance. What you will learn: Understanding of the core objectives and requirements of NIS2, and which …
…
continue reading

1
268: How This CEO Grew a Cybersecurity Empire from His Brother’s Garage - Stimulus Technologies
25:27
25:27
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
25:27
Nathan Whittacre, CEO of Stimulus Technologies discusses evolving cybersecurity threats, strategies to safeguard businesses, and how companies can foster a culture of cybersecurity awareness. He shares insights on managing cross-site tokenization attacks, the role of AI in both generating and defending against cyber threats, and best practices for …
…
continue reading

1
267: Why the Data Lakehouse Is the Future—But What’s Stopping It from Getting There? - Upsolver
26:37
26:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
26:37
Ori Rafael, CEO and co-founder of Upsolver explores the future of data management through data lakehouses. He explains the evolution of the lakehouse, a revolutionary architecture that combines the best of data lakes and warehouses. You will gain insights into key technologies like Apache Iceberg, how lakehouses enable advanced use cases such as AI…
…
continue reading

1
266: Crucial Cybersecurity Advisory Before, During & After the Election - SolCyber
26:37
26:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
26:37
Scott McCrady, CEO of SolCyber discusses managed cybersecurity services, rising cyber insurance costs, and the impact of geopolitical conflicts on cybersecurity. He shares insights on how organizations can reduce risks and improve response strategies, especially in today's uncertain political and economic landscape. Scott also addresses the role of…
…
continue reading

1
265: Generative AI & Data Privacy: How Companies Can Build Consumer Trust in 2025 - DataGrail
23:37
23:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
23:37
Daniel Barber, CEO of DataGrail delves into the founding of DataGrail, the challenges enterprises face in managing privacy, and how regulations like GDPR and CCPA impact the collection and processing of personal data. The conversation highlights the significance of consent in the digital age, the role of generative AI in data processing, and the ne…
…
continue reading

1
264: Authorization vs Authentication: What You Need to Know for Cybersecurity - AuthZed
26:42
26:42
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
26:42
Jake Moshenko, Co-founder and CEO of AuthZed discusses the challenges of application security, focusing on the critical difference between authorization and authentication, and how these play a role in modern cybersecurity. He also touches on topics like ransomware threats, AI in cybersecurity, and trends in the job market, providing insightful adv…
…
continue reading

1
263: Immutable Data, Infinite Possibilities: The Decentralized Storage Revolution - Akave.io
28:07
28:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
28:07
Stefaan Vervaet, CEO of Akave.ai discusses the revolutionary impacts of decentralized compute, immutability, and blockchain technology in data storage and protection. Stefaan shares insights on how Akave.ai is leveraging blockchain to create a decentralized storage solution that ensures data integrity and immutability, making it particularly valuab…
…
continue reading

1
262: The Intersection of Hiring Trends in Cloud, Cybersecurity, and Disaster Recovery - Arpio
19:05
19:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
19:05
Doug Neumann, co-founder and CEO of Arpio, discusses how Arpio differentiates itself by offering a turnkey disaster recovery solution that addresses modern cloud architectures. He shares insights on navigating economic turbulence, the evolution of cybersecurity threats, and how Arpio is leveraging AI to accelerate ransomware recovery.…
…
continue reading

1
261: The Fastest Emerging Unseen Attack Surface: The Next Big Cyber Risk - FireTail
27:06
27:06
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
27:06
Jeremy Snyder, founder and CEO of FireTail, joins the show to discuss the rising importance of API security in a world where over 80% of internet requests are API calls. Jeremy shares his journey from launching FireTail to becoming a leading voice in cybersecurity, providing insights into how organizations can protect their APIs from increasingly c…
…
continue reading

1
260: How to Overcome the Hiring Trust Gap: Secrets from a Former Google Engineer - Morgan Latimer Consulting
26:19
26:19
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
26:19
Anthony Mays, a former Google software engineer and the founder of Morgan Latimer Consulting shares his inspiring journey from growing up in Compton and overcoming personal challenges to becoming a successful technologist. Discover the strategies that can be used to overcome the trust gap in hiring and land top roles. Learn how to build credibility…
…
continue reading

1
259: The Hidden Vulnerabilities in Enterprise Browsers - SquareX
26:50
26:50
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
26:50
Vivek Ramachandran, the visionary founder of SquareX shares the origins of SquareX, highlighting how it aims to mitigate last-mile attacks by embedding security directly within the browser. The discussion delves deep into the importance of browser security in today's enterprise environments, addressing common threats such as ransomware, phishing, a…
…
continue reading

1
258: AI Governance Essentials: How to Establish a Program from the Ground Up - Relyance AI
25:07
25:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
25:07
Leila Golchehreh, Co-Founder and Chief Strategy Officer at Relyance AI delved into AI governance, the importance of data integrity, and best practices for integrating AI technologies securely. Leila shared her journey and vision for creating a company that bridges the gap between privacy and technology, emphasizing the need for continuous monitorin…
…
continue reading

1
257: From Wall Street to Your Fridge: The Databases You Didn’t Know Existed - Faircom
25:04
25:04
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
25:04
Mike Bowers, Chief Architect at Faircom dives into the intricacies of database technology and its real-world applications. Mike shares insights on Faircom’s role in critical systems such as the U.S. stock market, FAA flight tracking, and even the International Space Station. We explore the evolution of data management, the impact of IoT, and the fu…
…
continue reading

1
Data Security Strategies for the Finance Industry
36:04
36:04
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:04
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. What you will learn: Pitfalls and challenges to avoid when ensuring data security in the Finance industry How Finance professionals can save valuable time and resources while …
…
continue reading

1
256: From Tapes to Terabytes: The Great Storage Shift - JetStor
21:47
21:47
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
21:47
Gene Leyzarovich, Founder at JetStor shares insights on the evolution of data storage from tapes and magnetic disks to modern flash and hybrid systems. We discuss the significant impact of the Broadcom and VMware acquisition on licensing costs, prompting many organizations to explore alternatives like Proxmox and Hyper-V.…
…
continue reading

1
255: Navigating the AI Minefield: Best Practices for Data Governance - Polymer
23:29
23:29
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
23:29
Yasser Ali, CEO of Polymer Data Security discusses data security amidst the rise of AI and machine learning, highlighting the increasing complexity of managing data integrity and risks in AI governance. The discussion shifts to AI governance, where Yasser outlines the primary risks, including data leakage, model biases, and the challenge of deep fa…
…
continue reading

1
254: Here’s the Best Way to Achieve Comprehensive Cybersecurity - CyberConnective Corp
24:32
24:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
24:32
Rodrigo Loureiro, CEO of CyberConnective Corporation (C3) emphasizes the importance of understanding and addressing fundamental security measures such as patching servers, closing vulnerable ports, and maintaining up-to-date controls before investing in advanced technologies. He highlights AI's role in enhancing both attack and defense capabilities…
…
continue reading

1
253: Inside the Mind of a Data Privacy Expert - John D. Cook Consulting
15:37
15:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
15:37
John D. Cook, founder and CEO of John D. Cook Consulting shares insights from his extensive background in math and statistics, focusing on data privacy. The discussion dives into the complexities of handling data breaches, emphasizing the stress and challenges organizations face when sensitive information is compromised. We also cover the importanc…
…
continue reading

1
How to leverage compliance for success
41:13
41:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
41:13
Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and bo…
…
continue reading

1
252: AI, ML, and NVMe: The Power Trio Driving Data Performance - Graid Technology
23:14
23:14
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
23:14
Kelley Osburn, Senior Director of OEM and Channel Business Development at Graid Technology discuss the advancements and challenges in NVMe, Non-Volatile Memory Express storage and RAID, Redundant Array of Independent Disks technology. We also explore the future of NVMe and GPU integration, emphasizing the need for high-speed data access in AI and M…
…
continue reading

1
251: What Everyone Should Know About Immutable Storage - Scality
22:26
22:26
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
22:26
Candida Valois, Field CTO at Scality dives into the crucial topic of ransomware and the role of immutable storage in defending against such attacks. Candida emphasizes that not all immutable storage solutions are equal and highlights the importance of true immutability, particularly through S3 object storage.…
…
continue reading

1
250: Choosing Your Tech Path: Field CTO vs. Technical Evangelist - DataCenterDude
35:37
35:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
35:37
Nick Howell, Global Field CTO for Cloud at NetApp discusses the evolving responsibilities and challenges faced by Field CTOs and Technical Evangelists. From navigating job market trends and salary transparency to exploring the future of AI and cybersecurity, this episode offers valuable insights for anyone in the tech industry.…
…
continue reading

1
Neue Funktionen von Tresorit (Spring Updates, 2024)
26:55
26:55
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
26:55
Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024. Find out more at www.tresorit.comOleh Tresorit
…
continue reading

1
249: How Artificial Intelligence is Changing Data Protection - Quantum
22:45
22:45
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
22:45
Jordan Winkelman, Field Solutions CTO at Quantum discusses the impact of AI on data management, emphasizing the importance of preserving data, ensuring compliance, and protecting it from cybersecurity threats. We also delve into the role of tape storage, deduplication, and cloud solutions in modern data protection strategies, while also touching on…
…
continue reading

1
New Features and Functions of Tresorit (Spring Updates, 2024)
31:42
31:42
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
31:42
Discover the latest updates from Tresorit's R&D department and take a look at the roadmap for 2024. Find out more at www.tresorit.comOleh Tresorit
…
continue reading

1
248: Immutability: Protecting Data Integrity in the Cyber Age - Scality
20:34
20:34
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
20:34
Giorgio Regni, CTO at Scality discusses immutability in data storage, explaining its evolution from media-based to software-based implementations. He also highlights the complexities of immutability, including administrative controls, compliance with regulations like GDPR, and the need for effective detection and recovery processes.…
…
continue reading

1
247: Unexpected Consequences: Insights for VMware Users Post-Broadcom Deal - Nutanix
27:24
27:24
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
27:24
Lee Caswell, SVP Product and Solutions Marketing at Nutanix highlights the increasing importance of adapting total cost of ownership (TCO) and return on investment (ROI) models to reflect new licensing costs. He also addresses the shift towards hybrid and multi-cloud environments, emphasizing the role of customer-managed security policies and the r…
…
continue reading

1
IT Security: How encryption can protect - and deceive you
29:27
29:27
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
29:27
Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises.Find out more at www.tresorit.comOleh Tresorit
…
continue reading

1
246: United Front: CISOs Collaborate to Navigate SEC Regulations - ZScaler
27:35
27:35
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
27:35
Sam Curry, VP and CISO at ZScaler explores the implications of new SEC reporting requirements, the increasing challenges of ransomware attacks, and the shift towards encryptionless extortion. Sam shares insights into how critical infrastructure is becoming more vulnerable and discusses new reporting standards introduced in 2024. The conversation al…
…
continue reading

1
245: Data Center Hunger Games: Only the Fittest Survive Mergers - Brass Valley
19:35
19:35
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
19:35
Rocco D'Amico, the founder and CEO of Brass Valley dives into various aspects of IT Asset Disposition, including the hidden threats of dark data and end-of-life assets, challenges of data center closures and mergers, cost management, compliance and regulations, chain of custody, and innovations in the ITAD industry.…
…
continue reading

1
244: Cloud Security Insights: From Innovation to Evangelism - Plerion
22:51
22:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
22:51
Daniel Grzelak, Chief Innovation Officer at Plerion discusses his role's unique challenges with a focus on simplifying cloud security. He also shares valuable insights for aspiring tech leaders on becoming a technical evangelist or innovation officer, emphasizing expertise, opinion formation, and public engagement.…
…
continue reading

1
Why secure enough is NOT an option
36:05
36:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:05
Find out more at www.tresorit.comOleh Tresorit
…
continue reading

1
243: Surviving the Unexpected: From Disaster Recovery to Cyber Recovery - BETSOL
29:00
29:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
29:00
Justin Gesso, Senior Director of Marketing at BetSol, dives into critical disaster recovery strategies, emphasizing the need for thorough planning and testing. He talks about the evolving role of backup administrators in the age of cloud computing and automation, and the importance of maintaining a balance between human oversight and technological …
…
continue reading

1
242: From Vulnerability to Strength: Transforming Your Data Security Posture - Clarify360
20:16
20:16
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
20:16
Jo Peterson, Vice President of Cloud and Security Services at Clarify360 discusses the critical importance of Data Security Posture Management (DSPM) in protecting against modern cyber threats. She covers the essential aspects of understanding exposure and accessibility of data, the importance of determining access levels, and how DSPM benefits org…
…
continue reading

1
241: Securing Active Directory Against Modern Cyber Threats - Cayosoft
27:51
27:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
27:51
Dmitry Sotnikov, Chief Product Officer at Cayosoft a dives into the rising threat of ransomware, emphasizing the necessity of robust business continuity and disaster recovery plans for active directory. The conversation covers best practices for protecting and recovering Active Directory, the significance of having automated recovery solutions, and…
…
continue reading

1
240: Are LLMs Too Large for Traditional Storage? - OSNEXUS
28:37
28:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
28:37
Steven Umbehocker, Founder and CEO of OSNEXUS a dives into the current state and future of storage solutions in the age of AI and ML but also ignites a conversation on the readiness of traditional storage systems to handle the massive scale of LLMs. Through technical insights, forward-looking predictions, and practical advice, he highlights the cri…
…
continue reading

1
239: The Executive's Guide to Cybersecurity Incidents, Materiality, and the SEC - Clark Hill PLC
23:57
23:57
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
23:57
Richard Halm, Senior Attorney, Cybersecurity, Data Protection, and Privacy at Clark Hill PLC explores the complexities of the new SEC rule on incident and risk disclosures. We dive into the resurgence of ransomware, the impact of AI on cybersecurity threats, and the critical elements of the SEC's requirements. The episode also covers the crucial co…
…
continue reading

1
How to fortify your security with your workforce
37:10
37:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
37:10
Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, where we will have a look at the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure.🛡️ From phishing link victims to ransomware scenarios, we'll explore real-life data bre…
…
continue reading

1
238: Navigating AI, Data Protection, and Beyond - Conexus
29:48
29:48
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
29:48
Eric Daimler, CEO of Conexusdeep dives into the realms of AI, autonomous technologies, and data security. As a former Presidential Innovation Fellow under the Obama administration, Daimler shares his insights on AI's potential, its implications for data protection, and the revolutionary work of Conexus in solving the data deluge challenge. With dis…
…
continue reading

1
237: From NIST CSF to CMMC: Evolving Cybersecurity Standards Explained - Petronella Technology Group
26:34
26:34
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
26:34
Craig Petronella, CEO of Petronella Technology Group dives into the complexities of the Cybersecurity Maturity Model Certification (CMMC). We discuss the inception and necessity of CMMC within the defense sector, its evolution from NIST standards, and the challenges of self-attestation. The conversation also touches on the financial aspects of comp…
…
continue reading

1
236: The Intersection of Testing Backups and Tech Layoffs 2024 - Servosity
38:54
38:54
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
38:54
Damien Stevens, Founder and CEO of Servosity delves into the critical importance of regular backup testing amidst the landscape of technological advancements and the recent trends in tech layoffs. He navigates through the complexities of maintaining data integrity in a time of tech industry fluctuations, highlighting the essential role of diligent …
…
continue reading

1
235: How to Store Data Virtually Forever - Cerabyte
26:54
26:54
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
26:54
Martin Kunze, Founder and Chief Marketing Officer at Cerabyte discusses the long-term durability and efficiency of storing data. This approach addresses issues like data longevity, ecological impact, and the increasing volume of digital information. We also touch on the technical and philosophical implications of preserving digital heritage for fut…
…
continue reading

1
Dive into Cybersecurity: Zero Trust Privacy
43:20
43:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
43:20
🔒 Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy. 🛡️ In this episode you’ll learn: Steps to take when reviewing your data strategies Common mistakes to avoid while working with data How to imp…
…
continue reading

1
234: Beyond Basics: A Masterclass in AI That's Shaping the Industry! - Pangea Tech Consulting
36:19
36:19
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:19
Dr. Ali Sekmen, CEO at Pangea Tech Consulting, and Chris Jones, Chief Technology Officer discuss the forefront of AI and machine learning, focusing on the development and application of these technologies in solving complex data science and engineering problems. With a blend of academic insight and practical industry experience, the episode delves …
…
continue reading

1
233: Every Second Counts: Identity Orchestration's Answer to Cyber Attacks - Strata Identity
25:35
25:35
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
25:35
Gerry Gebel, Head of Standards at Strata Identity explores the evolving landscape of identity management and cybersecurity. The conversation delves into identity orchestration, policy orchestration, the importance of access policies, and the impact of emerging technologies like AI on cybersecurity practices. We also discuss the staggering increase …
…
continue reading

1
232: The 3-2-1 Rule Revisited: Overkill or a Cybersecurity Must-Have? - Synergy Six Degrees
29:13
29:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
29:13
Kevin Bailey, Chief Analyst and Founder at Synergy Six Degrees talks about the evolving nature of data protection focusing on the 3-2-1 backup strategy and its relevance in modern cybersecurity. Kevin challenges traditional data protection methods, emphasizing the increasing sophistication of cyber-attacks and the importance of protecting active da…
…
continue reading