This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading
Creating the conditions for extraordinary success — SaaS entrepreneurs and operators turned investors, investing in European SaaS and enterprise tech, we discuss how to accelerate success, deliver better outcomes, every step of the way. Hosted by Paul Papadimitriou and Andy Leaver.
…
continue reading
Conversations between the venture investors and operators at Dell Technologies Capital and the people who are building what's next in enterprise technologies.
…
continue reading
Our Define Tomorrow podcast focuses on the latest technical insights covering the modern workspace, hybrid cloud and security.
…
continue reading
Welcome to the Enterprise Influencers Podcast where we explore the inner workings of large organizations and the people and technologies that help them get things done. We’re your hosts Patrick Falgoust and Giles Hamson. We’ve both worked as consultants and within the IT departments for some of the world’s largest organizations. We’ll be bringing you candid discussions with industry leaders that are helping to shape the future of enterprise technology and exploring what influences the decisi ...
…
continue reading
In this episode we dive into the critical world of backup strategies. Join us as we explore the essentials of why every business needs a robust backup plan and how to create one that stands the test of time. We'll break down the core standards and elements of an effective backup strategy, including immutable backups and encryption, and the 3-2-1 Ba…
…
continue reading
"We do have to hire to some extent ahead. And that's a bit of a bet. But again, when you've developed the conviction that you're onto something big, then we haven't waited. We move forward pretty forcefully building teams." Arthur Bellamy talks with DTC's Scott Darling about scaling Exotec to a global company with more than $1B in systems sold. The…
…
continue reading
What's it like to be the first communications leadership hire at a hypergrowth, IPO-bound startup? In this episode of The DTC Podcast, Ronda Scott talks with Lindsay McKinley, the first comms hire and director of communications at Samsara. She shares advice on how to swing for the fences when you're at a resource-constrained early-stage startup and…
…
continue reading
Ready to stay ahead of the curve? Tune in to this episode as we unpack the latest shifts in VMware following its exciting acquisition by Broadcom. We'll dive into crucial updates, like the EUC spin-off and revamped academic pricing, and what they mean for you. But that's not all – we'll break down the changes to your existing licenses and will disc…
…
continue reading
In this episode of the DTC Podcast, Deepak Jeevankumar interviews Slavik Markovich, co-founder of Sentrigo, Demisto, and Descope. Slavik shares lessons learned from his previous startups and discusses the acquisition of Demisto by Palo Alto Networks. He also talks about his current venture, Descope, which focuses on authentication and authorization…
…
continue reading
The technology focus for new innovation currently leans towards artificial intelligence in its various forms. Microsoft, Google, AWS and IBM all have their platforms; but how is the industry looking to take advantage of this capability to bring a further competitive edge to their businesses? Patrick (via CoPilot) found a great article with CEO's qu…
…
continue reading
1
Building Your Personal Brand in the Age of AI with Lee Reed - Enterprise Influencers [S02E02]
51:04
What do people say about you when you are not in the room? In this episode we are joined by Lee Reed, Global Product Manager and Technology Evangelist. Lee shares his thoughts on the importance of building a "personal brand" inside your organization with the aim of realizing your goals. Lee has a passion for communicating about technology and shari…
…
continue reading
Welcome listeners to Season 2 of the Enterprise Influencers Podcast. The long awaited and completely unannounced new season. In this episode Patrick and Giles catch up after a long and somewhat unexpected hiatus. What can we say, life got in the way, between intra-state moves and graduating seniors, we got busy. We're back and ready to tackle all o…
…
continue reading
Ankit Gordhandas, a staff engineer at Zapier, shares his journey from being a biomedical engineer to a startup founder and his current role at Zapier. He discusses how Zapier embraced AI and the impact it has had on the company. Ankit also talks about the pivot at his previous startup, Intersect Labs, and the decision to join Zapier. He explains th…
…
continue reading
Geeta Schmidt, co-founder and CEO of Humio, discusses the founding of the company and its evolution into a cybersecurity focus. She shares the importance of customer validation and the pride, as a Nordic-based startup, in acquiring Bloomberg as one of the company’s first major customers. Geeta also talks about how the leadership team evaluated the …
…
continue reading
In this episode, DTC's Victoria Kinnealey talks with Rick Berends, a veteran BISO, about the importance of startups in driving innovation and growth within enterprise organizations. They discuss the traits that startups should have to establish partnerships at an early stage, including agility, the ability to reduce complexity, and a focus on smart…
…
continue reading
Julie Crabill, a fractional CMO, discusses the benefits of the fractional C-suite model for early-stage startups and how it can help scale their marketing and go-to-market teams. She emphasizes the importance of understanding business priorities and having empathy for founders. Julie also shares insights on engaging with technical teams and determi…
…
continue reading
In this conversation, DTC Managing Director Deepak Jeevankumar interviews Varun Badhwar, co-founder and former CEO of RedLock and co-founder and current CEO of Endor Labs. They discuss topics such as creating a new category in cybersecurity, building a customer-centric company, and the challenges and successes of scaling a startup. Varun shares ins…
…
continue reading
Introducing The DTC Podcast. These episodes feature Exit Interviews with enterprise founders who've gone from square one to major acquisition, conversations with the CTOs, CISOs, and CIOs interested in the latest enterprise innovations, and deep dives into strategies and tactics with the sales, marketing, and brand practitioners leading the go-to-m…
…
continue reading
1
TWiET 573: DNS Deep Dive Part 3: Exploring Internal DNS and AD - KV-Botnet, Internal DNS Security, and Farewell Episode
1:15:07
1:15:07
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:15:07
The TWiET crew delves into botnets, securing hybrid work environments, the future of DNS architecture, and more. News Blips: Researchers uncover sophisticated IoT botnet named "K- Botnet" targeting US entities; linked to Chinese state-aligned hackers AI startup Vanta (a TWiT.tv Sponsor) launches AI suite to automate repetitive security and complian…
…
continue reading
1
TWiET 573: DNS Deep Dive Part 3: Exploring Internal DNS and AD - KV-Botnet, Internal DNS Security, and Farewell Episode
1:15:07
1:15:07
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:15:07
The TWiET crew delves into botnets, securing hybrid work environments, the future of DNS architecture, and more. News Blips: Researchers uncover sophisticated IoT botnet named "K- Botnet" targeting US entities; linked to Chinese state-aligned hackers AI startup Vanta (a TWiT.tv Sponsor) launches AI suite to automate repetitive security and complian…
…
continue reading
1
TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System
1:13:10
1:13:10
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:13:10
Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of In…
…
continue reading
1
TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System
1:13:10
1:13:10
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:13:10
Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of In…
…
continue reading
1
TWiET 571: DNS Deep Dive Part 1: Demystifying DNS - Enterprise DNS basics
1:08:10
1:08:10
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:08:10
Hackers Can Easily Extract ChatGPT Training Data Cheebert's prediction about VDI just came true Big Tech jobs are not as immune to layoffs as we thought Siemens PLCs are Still Vulnerable to Stuxnet-like Cyberattacks Josh Kuo, DNS Expert and Ross Gibson, Principal Solutions Architect of Infoblox join Brian Chee and Curt Franklin for part 1 of a 3 pa…
…
continue reading
1
TWiET 571: DNS Deep Dive Part 1: Demystifying DNS - Enterprise DNS basics
1:08:10
1:08:10
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:08:10
Hackers Can Easily Extract ChatGPT Training Data Cheebert's prediction about VDI just came true Big Tech jobs are not as immune to layoffs as we thought Siemens PLCs are Still Vulnerable to Stuxnet-like Cyberattacks Josh Kuo, DNS Expert and Ross Gibson, Principal Solutions Architect of Infoblox join Brian Chee and Curt Franklin for part 1 of a 3 pa…
…
continue reading
1
TWiET 570: Well-Placed Friction - EU's NIS2 Directive, better UX for DevOps w/ LaunchDarkly
1:11:11
1:11:11
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:11:11
Ransomware group reports a victim company to the SEC for failing to promptly disclose a breach. Shadowy hack-for-hire group behind sprawling web of global cyberattacks Electrical arc detection devices that can prevent dangerous home fires caused by faulty wiring. The worst passwords of 2023 The NIS2 Directive: The first piece of EU-wide legislation…
…
continue reading
1
TWiET 570: Well-Placed Friction - EU's NIS2 Directive, better UX for DevOps w/ LaunchDarkly
1:11:11
1:11:11
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:11:11
Ransomware group reports a victim company to the SEC for failing to promptly disclose a breach. Shadowy hack-for-hire group behind sprawling web of global cyberattacks Electrical arc detection devices that can prevent dangerous home fires caused by faulty wiring. The worst passwords of 2023 The NIS2 Directive: The first piece of EU-wide legislation…
…
continue reading
1
TWiET 569: Are Your Patches trackd? - Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD
1:13:00
1:13:00
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:13:00
CISA Alerts: High-Severity SLP Vulnerability currently being exploited. ChatGPT outages attributed to DDoS activity. Gen Z and Millennial employees are a bigger cybersecurity risk than older employees. Security firm finds highly invasive malware hidden in software developer tools. Strategies for bridging the cybersecurity skills gap. Mike Star, CEO…
…
continue reading
1
TWiET 569: Are Your Patches trackd? - Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD
1:13:00
1:13:00
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:13:00
CISA Alerts: High-Severity SLP Vulnerability currently being exploited. ChatGPT outages attributed to DDoS activity. Gen Z and Millennial employees are a bigger cybersecurity risk than older employees. Security firm finds highly invasive malware hidden in software developer tools. Strategies for bridging the cybersecurity skills gap. Mike Star, CEO…
…
continue reading
1
TWiET 568: Find the Gap Before You $pend - President Biden's AI Executive Order, Software TCO with Olive
1:05:07
1:05:07
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:05:07
Okta customer data exposed in support breach impacting 134 companies. Biden requests $3.1B more for FCC's "rip-and-replace" program to remove insecure equipment from federal networks, targeting Huawei and ZTE equipment. Kaspersky finds Android spyware targeting WhatsApp users, reusing malware from Telegram cyber attacks. U.S. Immigration and Custom…
…
continue reading
1
TWiET 568: Find the Gap Before You $pend - President Biden's AI Executive Order, Software TCO with Olive
1:05:07
1:05:07
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:05:07
Okta customer data exposed in support breach impacting 134 companies. Biden requests $3.1B more for FCC's "rip-and-replace" program to remove insecure equipment from federal networks, targeting Huawei and ZTE equipment. Kaspersky finds Android spyware targeting WhatsApp users, reusing malware from Telegram cyber attacks. U.S. Immigration and Custom…
…
continue reading
1
TWiET 567: Lost in Translation - Boosting security hygiene, DNS security with Infoblox
1:16:01
1:16:01
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:16:01
iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers. 0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft. Apple backs national right-to-repair bill. Pro-Russia hackers exploiting 0-day in Roundcube webmail software. 9 innovative ways to boost security hygiene for Cyber Awareness M…
…
continue reading
1
TWiET 567: Lost in Translation - Boosting security hygiene, DNS security with Infoblox
1:16:01
1:16:01
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:16:01
iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers. 0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft. Apple backs national right-to-repair bill. Pro-Russia hackers exploiting 0-day in Roundcube webmail software. 9 innovative ways to boost security hygiene for Cyber Awareness M…
…
continue reading
1
TWiET 566: DevOps Culture Vulture - Reimagining DevOps with System Initiative
1:17:27
1:17:27
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:17:27
This info-packed episode of TWiET dives into the hidden dangers of Google hosted ads with malware. Guest Adam Jacob shares his vision for a "second wave" of DevOps to achieve better collaboration and outcomes. Patch Winrar right now The most used IT Admin passwords Cisco reports 10,000 network devices backdoored with unpatched 0-day The global chip…
…
continue reading