Artwork

Player FM - Internet Radio Done Right
Checked 5M ago
Agregado hace tres años
Contenido proporcionado por PKWARE. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente PKWARE o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !
icon Daily Deals

War on the Cyber Front

38:05
 
Compartir
 

Manage episode 322915570 series 3291795
Contenido proporcionado por PKWARE. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente PKWARE o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Conventional war is extending now to include cyberwarfare, malicious cyber attacks coinciding with military strikes on the ground that create an entirely new battleground. Cybersecurity expert Joe Faxlanger, Cyber Solutions Executive at RockITek, joins PKWARE Field CTO Mark Punzirudu and host Spencer Kupferman to discuss this move to cyberwarfare, the unintended consequences of these attacks, and the ethics involved in fighting back on the digital warfront.

  continue reading

22 episodios

Artwork
iconCompartir
 
Manage episode 322915570 series 3291795
Contenido proporcionado por PKWARE. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente PKWARE o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Conventional war is extending now to include cyberwarfare, malicious cyber attacks coinciding with military strikes on the ground that create an entirely new battleground. Cybersecurity expert Joe Faxlanger, Cyber Solutions Executive at RockITek, joins PKWARE Field CTO Mark Punzirudu and host Spencer Kupferman to discuss this move to cyberwarfare, the unintended consequences of these attacks, and the ethics involved in fighting back on the digital warfront.

  continue reading

22 episodios

Todos los episodios

×
 
Join PKWARE's CEO, Spencer Kupferman, and Eden Priela of Converge Technologies as they unravel the complexities of data security, emphasizing classification and discovery. Discover how AI-driven advancements have reshaped data management over the past decade. Explore use cases showcasing how classification and discovery mitigate risks and meet compliance mandates such as PCI. Gain insights into implementing a security-first mindset across organizations, locally and globally.…
 
In this podcast episode, featuring the insightful Dusty Rivers as the guest, we delve deep into the world of mainframe modernization—an essential conversation for businesses navigating the digital landscape. As an eminent figure well-versed in all facets of mainframe systems, Dusty talks about demystifying the concept of mainframe modernization. He passionately articulates its significance in today's tech landscape, highlighting how this evolution is not just a choice but a necessity for businesses aiming to stay competitive and agile in the digital era especially as it relates to z/OS systems.…
 
Our recent podcast with Len Santalucia delves deep into the ever-changing mainframe security landscape. We discuss how z/OS is the ultimate platform for sensitive data and has been for 40 years making it a prime target for those with malicious intent. Len identifies insider threats as one of the top security concerns for IBM Z, while providing insights into the best practices for actually protecting the data.…
 
In our latest Productivity Protected Podcast, we had the pleasure of speaking with Meredith Stowell, Vice President of IBM Z Ecosystem. With her extensive background in technology and a deep understanding of IBM's innovative solutions, Stowell shared her insights about her journey into technology, the evolution of mainframe technology, the impact of quantum-resistant cryptography, the intersection of Telum and AI with mainframe cybersecurity, the challenges posed by rapid AI advancements, and the key takeaways about IBM Z Ecosystem.…
 
In this podcast, we are speaking with Nidhi Mahajan, an expert from our Engineering Team, discussing our recently released Dynamic Masking feature. We discuss the differences between Dynamic Masking and Static Masking, highlighting our real-time approach and preservation of original data along with ensuring data integrity and ensuring compliance is met. Nidhi highlights how user-friendly PKWARE's Dynamic Masking is, with its intuitive interface, easy implementation and how the solution delivers robust data protection without compromise. Tune in to gain valuable insights from Nidhi's experience and learn about the cutting-edge capabilities of PKWARE's Dynamic Masking.…
 
As data has evolved over the years, so too has data risk management changed and evolved. Mandates such as HIPAA, GDPR, CCPA, and PCI DSS continue to adjust how organizations collect, use, store, and protect their data, while new advancements such as AI offer new ways to achieve—or circumvent—that protection. Converge VP Solution Architecture Dan Gregory joins host Spencer Kupferman to talk about security cultures, personalized data risk assessments, and what listeners can do today to prepare for the cybersecurity needs of tomorrow.…
 
Sensitive data discovery seems like a straightforward process, but in reality, it’s a nuanced practice that involves detailed understanding in order to make sure that organizations are as aware and protected as possible. Businesses must have a comprehensive view of data that is easy to implement and use, and can scale as data inevitably grows. Bloor Research Senior Analyst Daniel Howard joins host Spencer Kupferman to discuss data discovery and data governance, the challenges organizations face with discovery, and the importance of having an inclusive and ongoing process to protect sensitive data.…
 
At PKWARE, we’ve always been about progress, and that includes building an organization that celebrates and encourages women in technology and leadership roles. In honor of International Women’s Day and Women’s History Month, join Kathy Myhand, VP of People, and Jothi Agnitha, Engineering, along with guest host Dawn Jonckowski, Director of Corporate Communications, as they discuss the women who’ve blazed the trails for them and how to encourage the upcoming generations on their tech and leadership career journeys.…
 
The dark web is home to the fraud economy and multiple criminal communities, rife with stolen data. It’s a complex and twisted environment that the average internet user should avoid, but what happens when they learn their data is available for sale there? Founder and CEO of Q6 Cyber Eli Dominitz joins host Spencer Kupferman to discuss his career evolution into dark web threat intelligence, how to unravel and identify threat sources, and why businesses should always have an expert monitoring the dark web on their behalf.…
 
Protecting your data sometimes requires thinking like a threat actor. Enter ethical hackers, authorized security experts that try to break into your systems on purpose so you know where to improve security measures. Hacker and CypherCon founder Michael Goetzman joins Spencer Kupferman to share his tech journey into ethical hacking and how the annual CypherCon hacking event has impacted the cybersecurity world for the better.…
 
User interface and experience design is one of the most critical aspects of successful software. Done well, UX/UI actually goes largely unnoticed, and users will intuitively perform the right actions. With complex solutions like cybersecurity, user interface and experience become even more central to ensuring the right steps are performed to discover and protect data. UX/UI experts Mike Kornacki and Mike Rhode join host Spencer Kupferman to unpack more about UX/UI design, the science behind it, and how it can contribute to an organization’s cybersecurity.…
 
Over the past several decades, Israel has become a powerhouse in cybersecurity, supplying a large percentage of the world’s cyber technology. Israel has also focused on assisting smaller nations in creating cybersecurity startups. Josh Cohen, Director of Cyber Security at the Economic and Trade Office at the Embassy of Israel in Washington, D.C., joins host Spencer Kupferman to discuss more about Israel’s ongoing investment in cybersecurity both for its own nation and the world.…
 
In many organizations, the CFO’s responsibility in overseeing company funds puts them in control of signing off on risks, including how data is handled. CFOs end up playing a specific role in helping their organization prepare for the inevitable risk of a cyber-attack. PKWARE CFO Matt Zomboracz joins host Spencer Kupferman to discuss his experience in protecting sensitive data during his career in finance, as well as what CFOs need to know about data breaches.…
 
The ZIP file revolutionized the way information could be shared between computers prior to the internet, and it was invented by none other than PKWARE founder Phil Katz. Our unique role as a trusted data compression provider has enabled PKWARE to evolve over the last four decades to now include encryption and other forms of data security. Senior Director of Software Development Engineering and PKWARE historian Jack Dale joins Spencer Kupferman to talk about the journey from ZIP to data protection.…
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir