show episodes
 
Artwork

1
under CTRL

Tresorit

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Loading …
show series
 
Sebastian Straub, Principal Solutions Architect at N2WS, explores DORA (Digital Operational Resilience Act), emphasizing its stringent impact on financial institutions' cybersecurity. He highlights cloud-native backup strategies, cross-region and cross-account backups for disaster recovery, and the critical role of immutable backups against ransomw…
  continue reading
 
Govind Rangasamy, Head of Recovery Solutions and VP of Portfolio Marketing at Commvault (via Appranix acquisition), talks about the terrifying reality of ransomware, cyber threats, and the illusion of traditional data protection. With 38,000+ ransomware variants evolving daily, simply backing up data isn’t enough—you need to rebuild, not just recov…
  continue reading
 
Gavin Griffiths, Managing Director and Pat Mayock, VP of Sales at Insurgo dives into the hidden risks of tape storage and destruction. They expose shocking real-world security breaches—like school fingerprint records almost being sold—and discuss why traditional shredding and degaussing aren’t enough. Insurgo’s groundbreaking tech ensures data is t…
  continue reading
 
W. Curtis Preston, aka "Mr. Backup," reveals shocking insights from the world of data recovery. From a million-tape archive stored in a football-field-sized facility to the critical need for reading backup data without vendor lock-in, this conversation uncovers the hidden struggles of IT professionals. We dive into ransomware recovery, AI’s role in…
  continue reading
 
The healthcare sector faces unique challenges when it comes to secure data exchange. Sensitive patient information, compliance with stringent regulations, and growing cyber threats require organizations to adopt robust solutions to safeguard their operations and patient trust.In this webinar, we’ll discuss how healthcare organizations can protect t…
  continue reading
 
Gleb Budman, CEO & co-founder of Backblaze, discusses the future of data storage, cloud cost optimization, and resilience against cyber threats. Gleb shares his journey of bootstrapping Backblaze, competing against AWS, and ultimately taking the company public. We explore rising storage costs, AI-driven data explosion, ransomware defense strategies…
  continue reading
 
Steven Umbehocker, CEO of OSNEXUS discusses how businesses can protect critical data with object storage, immutability, and AI-powered automation. He dives into cybersecurity strategies, the role of AI in long-term data retention, and why enterprises must rethink storage for modern workloads. Plus, a fascinating look at how NFL teams leverage data …
  continue reading
 
Paul Graeve, CEO of The Data Group, discusses the hidden dangers of poor data management. We talk about why CEOs must take charge of their data strategy, how bad data can derail AI initiatives, and why fragmented data is silently draining company resources. Paul offers practical steps for leaders to regain control, unify their data, and turn it int…
  continue reading
 
Jerome Wendt, CEO & Principal Analyst at DCIG, unpacks the latest trends in data protection. We dive into intermittent encryption, a stealthy new ransomware tactic, and how AI-driven anomaly detection is reshaping cybersecurity. Jerome also shares insights on VMware’s licensing shake-up, the rise of multi-hypervisor environments, and why backup sol…
  continue reading
 
Digital Operational Resilience Act (DORA), is now mandatory for financial firms as of January 2025. Designed to fortify the information and communication technology (ICT) posture of the financial sector, DORA aims to ensure organizations can withstand, recover, and thrive after cyber disruptions.Now that the deadline has come and gone, where does y…
  continue reading
 
Kate Cox, Business Development at Memcyco uncovers the alarming rise of digital impersonation attacks and the role AI plays in making scams more convincing than ever. We discuss how cybercriminals exploit AI to clone websites, steal data, and undermine consumer trust. Kate shares eye-opening statistics, real-world examples, and practical strategies…
  continue reading
 
Evan Powell, Founding CEO of DeepTempo, explores advancements in cybersecurity through the innovative use of Large Log Model (LogLM). He discusses the challenges of securing data amidst increasing cyber threats, the role of platforms like Snowflake in reducing data silos, and best practices for leveraging AI in threat detection. Powell emphasizes a…
  continue reading
 
Abhinav Srivastava, Founder and CEO of Breez Security delve into the rising importance of identity security in combating credential compromises and safeguarding cloud and SaaS platforms. Abhinav explains how to use behavioral identity telemetry and AI to enhance detection and response capabilities. The conversation explores persistent security chal…
  continue reading
 
James O'Sullivan, founder and CEO of Nuke from Orbit explore the hidden dangers of PIN usage and the risks posed when phones are stolen, emphasizing the underestimated security vulnerabilities in everyday mobile device usage. James shares the origin story of his company, born from a personal incident of phone theft, and details how Nuke from Orbit …
  continue reading
 
Johnny Yu, Research Manager, Infrastructure Software Platforms, Worldwide Infrastructure Research at IDC dives into the challenges and strategies for backing up containerized workloads. We explore the evolution of container technology, differences from traditional backups, and the expertise gap in managing Kubernetes-based systems. Johnny discusses…
  continue reading
 
Gorkem Ercan, CTO and Founding Distinguished Engineer at Jozu, shares insights into overcoming the challenges of integrating AI and ML into DevOps workflows, emphasizing the critical role of immutable artifacts in ensuring trust and efficiency. He introduces KitOps.ml, an open-source project designed to simplify the management of AI/ML artifacts an…
  continue reading
 
Subho Halder, Co-founder and CEO of AppKnox, dives into the evolving challenges and trends in mobile app security. He shares insights into protecting sensitive data on mobile applications, addressing issues like man-in-the-middle attacks, insecure coding practices, and fake apps. He emphasizes the importance of integrating security into the Softwar…
  continue reading
 
Eric Olden, Co-Founder and CEO of Strata Identity, dives into the challenges and innovations in identity management for multi-cloud environments. He explains the concept of identity orchestration, its role in zero-trust architecture, and the evolution of identity management from SAML to abstraction layers like IDQL and HEXA. Eric also highlights re…
  continue reading
 
Our business customers have been facing challenges when collaborating on sensitive files with external and internal partners. One-way file sharing was often insufficient for confidential projects that required multiple review cycles Our newest feature addresses this need for a more dynamic way of file collaboration, building on our industry-leading…
  continue reading
 
Gabriel Gumbs, Chief Product Officer and President at Myota, unpacks the unsettling truths about immutability, the evolution of ransomware tactics, and why traditional backup systems are failing in the face of cyber threats. Discover a revolutionary approach to Polymorphic Immutability, designed to keep your data secure, recoverable, and cost-effec…
  continue reading
 
Peter Bonney, CEO and Founder of Fastbreak RFP, shares his journey in building a scalable SaaS platform for automating RFP responses using AI. Peter dives into the challenges of balancing innovation with the rapid evolution of foundational AI models, the trade-offs between open-source tools and third-party APIs, and the critical architectural decis…
  continue reading
 
David Brooks, Cyber Security Architect at Vectra AI discusses early adversary detection, the role of AI and machine learning in preventing breaches, and the importance of network traffic analysis. David shares insights into balancing technology and empathy in cybersecurity, the value of layered defense strategies, and advice for aspiring profession…
  continue reading
 
Mark Kirstein, Chief Product Officer at DropSuite discusses the evolving cyber threat landscape, particularly how SMBs are increasingly targeted by cybercriminals. He explains the rising importance of data protection and the critical role MSPs play in helping small businesses safeguard essential information. Mark shares insights on new attack vecto…
  continue reading
 
The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain?For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not re…
  continue reading
 
Phil Goodwin, IDC’s Research VP, explore the challenges of backing up AI environments, focusing on large language models. Phil highlights the limitations of traditional backup methods for dynamic AI systems and the industry's push for genuine AI-driven data protection. We discuss the roles of companies like Dell, Commvault, Rubrik, and Cohesity in …
  continue reading
 
Bernard Clark, Senior Product Manager at DropSuite discusses the essential role of identity management and backup in today’s digital infrastructure. He highlights the critical need for organizations to protect Microsoft Entra ID, which he refers to as "the keys to the kingdom," underscoring its importance as a primary target for cyber threats. We e…
  continue reading
 
Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data?Look no further, data rooms are here to sa…
  continue reading
 
Pavel Duchovny, Lead Developer Advocate at MongoDB, discusses the role of AI stacks in modern application development. He explains how MongoDB integrates into the AI stack, focusing on operational and vector databases, and shares best practices for managing vector data and optimizing storage. He also covers MongoDB's innovative security features li…
  continue reading
 
Simon Taylor, CEO of HYCU discusses the state of SaaS resilience and the critical need for SaaS data protection. We discuss insights from a recent report surveying over 417 IT decision-makers worldwide. Simon shares the shocking statistic that 61% of ransomware attacks occur through SaaS services, challenging the assumption that SaaS data is inhere…
  continue reading
 
In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance. What you will learn: Understanding of the core objectives and requirements of NIS2, and which …
  continue reading
 
Nathan Whittacre, CEO of Stimulus Technologies discusses evolving cybersecurity threats, strategies to safeguard businesses, and how companies can foster a culture of cybersecurity awareness. He shares insights on managing cross-site tokenization attacks, the role of AI in both generating and defending against cyber threats, and best practices for …
  continue reading
 
Ori Rafael, CEO and co-founder of Upsolver explores the future of data management through data lakehouses. He explains the evolution of the lakehouse, a revolutionary architecture that combines the best of data lakes and warehouses. You will gain insights into key technologies like Apache Iceberg, how lakehouses enable advanced use cases such as AI…
  continue reading
 
Scott McCrady, CEO of SolCyber discusses managed cybersecurity services, rising cyber insurance costs, and the impact of geopolitical conflicts on cybersecurity. He shares insights on how organizations can reduce risks and improve response strategies, especially in today's uncertain political and economic landscape. Scott also addresses the role of…
  continue reading
 
Daniel Barber, CEO of DataGrail delves into the founding of DataGrail, the challenges enterprises face in managing privacy, and how regulations like GDPR and CCPA impact the collection and processing of personal data. The conversation highlights the significance of consent in the digital age, the role of generative AI in data processing, and the ne…
  continue reading
 
Jake Moshenko, Co-founder and CEO of AuthZed discusses the challenges of application security, focusing on the critical difference between authorization and authentication, and how these play a role in modern cybersecurity. He also touches on topics like ransomware threats, AI in cybersecurity, and trends in the job market, providing insightful adv…
  continue reading
 
Stefaan Vervaet, CEO of Akave.ai discusses the revolutionary impacts of decentralized compute, immutability, and blockchain technology in data storage and protection. Stefaan shares insights on how Akave.ai is leveraging blockchain to create a decentralized storage solution that ensures data integrity and immutability, making it particularly valuab…
  continue reading
 
Doug Neumann, co-founder and CEO of Arpio, discusses how Arpio differentiates itself by offering a turnkey disaster recovery solution that addresses modern cloud architectures. He shares insights on navigating economic turbulence, the evolution of cybersecurity threats, and how Arpio is leveraging AI to accelerate ransomware recovery.…
  continue reading
 
Jeremy Snyder, founder and CEO of FireTail, joins the show to discuss the rising importance of API security in a world where over 80% of internet requests are API calls. Jeremy shares his journey from launching FireTail to becoming a leading voice in cybersecurity, providing insights into how organizations can protect their APIs from increasingly c…
  continue reading
 
Anthony Mays, a former Google software engineer and the founder of Morgan Latimer Consulting shares his inspiring journey from growing up in Compton and overcoming personal challenges to becoming a successful technologist. Discover the strategies that can be used to overcome the trust gap in hiring and land top roles. Learn how to build credibility…
  continue reading
 
Vivek Ramachandran, the visionary founder of SquareX shares the origins of SquareX, highlighting how it aims to mitigate last-mile attacks by embedding security directly within the browser. The discussion delves deep into the importance of browser security in today's enterprise environments, addressing common threats such as ransomware, phishing, a…
  continue reading
 
Leila Golchehreh, Co-Founder and Chief Strategy Officer at Relyance AI delved into AI governance, the importance of data integrity, and best practices for integrating AI technologies securely. Leila shared her journey and vision for creating a company that bridges the gap between privacy and technology, emphasizing the need for continuous monitorin…
  continue reading
 
Mike Bowers, Chief Architect at Faircom dives into the intricacies of database technology and its real-world applications. Mike shares insights on Faircom’s role in critical systems such as the U.S. stock market, FAA flight tracking, and even the International Space Station. We explore the evolution of data management, the impact of IoT, and the fu…
  continue reading
 
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. What you will learn: Pitfalls and challenges to avoid when ensuring data security in the Finance industry How Finance professionals can save valuable time and resources while …
  continue reading
 
Gene Leyzarovich, Founder at JetStor shares insights on the evolution of data storage from tapes and magnetic disks to modern flash and hybrid systems. We discuss the significant impact of the Broadcom and VMware acquisition on licensing costs, prompting many organizations to explore alternatives like Proxmox and Hyper-V.…
  continue reading
 
Yasser Ali, CEO of Polymer Data Security discusses data security amidst the rise of AI and machine learning, highlighting the increasing complexity of managing data integrity and risks in AI governance. The discussion shifts to AI governance, where Yasser outlines the primary risks, including data leakage, model biases, and the challenge of deep fa…
  continue reading
 
Rodrigo Loureiro, CEO of CyberConnective Corporation (C3) emphasizes the importance of understanding and addressing fundamental security measures such as patching servers, closing vulnerable ports, and maintaining up-to-date controls before investing in advanced technologies. He highlights AI's role in enhancing both attack and defense capabilities…
  continue reading
 
John D. Cook, founder and CEO of John D. Cook Consulting shares insights from his extensive background in math and statistics, focusing on data privacy. The discussion dives into the complexities of handling data breaches, emphasizing the stress and challenges organizations face when sensitive information is compromised. We also cover the importanc…
  continue reading
 
Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and bo…
  continue reading
 
Kelley Osburn, Senior Director of OEM and Channel Business Development at Graid Technology discuss the advancements and challenges in NVMe, Non-Volatile Memory Express storage and RAID, Redundant Array of Independent Disks technology. We also explore the future of NVMe and GPU integration, emphasizing the need for high-speed data access in AI and M…
  continue reading
 
Candida Valois, Field CTO at Scality dives into the crucial topic of ransomware and the role of immutable storage in defending against such attacks. Candida emphasizes that not all immutable storage solutions are equal and highlights the importance of true immutability, particularly through S3 object storage.…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play