Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
A gumbo of insights and information about Cybersecurity and Data Protection
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data Security Strategies for the Finance Industry
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. What you will learn: Pitfalls and challenges to avoid when ensuring data security in the Finance industry How Finance professionals can save valuable time and resources while …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
255: Navigating the AI Minefield: Best Practices for Data Governance - Polymer
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29
Yasser Ali, CEO of Polymer Data Security discusses data security amidst the rise of AI and machine learning, highlighting the increasing complexity of managing data integrity and risks in AI governance. The discussion shifts to AI governance, where Yasser outlines the primary risks, including data leakage, model biases, and the challenge of deep fa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
254: Here’s the Best Way to Achieve Comprehensive Cybersecurity - CyberConnective Corp
24:32
24:32
Play later
Play later
Lists
Like
Liked
24:32
Rodrigo Loureiro, CEO of CyberConnective Corporation (C3) emphasizes the importance of understanding and addressing fundamental security measures such as patching servers, closing vulnerable ports, and maintaining up-to-date controls before investing in advanced technologies. He highlights AI's role in enhancing both attack and defense capabilities…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
253: Inside the Mind of a Data Privacy Expert - John D. Cook Consulting
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37
John D. Cook, founder and CEO of John D. Cook Consulting shares insights from his extensive background in math and statistics, focusing on data privacy. The discussion dives into the complexities of handling data breaches, emphasizing the stress and challenges organizations face when sensitive information is compromised. We also cover the importanc…
…
continue reading
Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and bo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
252: AI, ML, and NVMe: The Power Trio Driving Data Performance - Graid Technology
23:14
23:14
Play later
Play later
Lists
Like
Liked
23:14
Kelley Osburn, Senior Director of OEM and Channel Business Development at Graid Technology discuss the advancements and challenges in NVMe, Non-Volatile Memory Express storage and RAID, Redundant Array of Independent Disks technology. We also explore the future of NVMe and GPU integration, emphasizing the need for high-speed data access in AI and M…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
251: What Everyone Should Know About Immutable Storage - Scality
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26
Candida Valois, Field CTO at Scality dives into the crucial topic of ransomware and the role of immutable storage in defending against such attacks. Candida emphasizes that not all immutable storage solutions are equal and highlights the importance of true immutability, particularly through S3 object storage.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
250: Choosing Your Tech Path: Field CTO vs. Technical Evangelist - DataCenterDude
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37
Nick Howell, Global Field CTO for Cloud at NetApp discusses the evolving responsibilities and challenges faced by Field CTOs and Technical Evangelists. From navigating job market trends and salary transparency to exploring the future of AI and cybersecurity, this episode offers valuable insights for anyone in the tech industry.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Neue Funktionen von Tresorit (Spring Updates, 2024)
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55
Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024.By Tresorit
…
continue reading
![Artwork](/static/images/128pixel.png)
1
249: How Artificial Intelligence is Changing Data Protection - Quantum
22:45
22:45
Play later
Play later
Lists
Like
Liked
22:45
Jordan Winkelman, Field Solutions CTO at Quantum discusses the impact of AI on data management, emphasizing the importance of preserving data, ensuring compliance, and protecting it from cybersecurity threats. We also delve into the role of tape storage, deduplication, and cloud solutions in modern data protection strategies, while also touching on…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
New Features and Functions of Tresorit (Spring Updates, 2024)
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42
Discover the latest updates from Tresorit's R&D department and take a look at the roadmap for 2024.By Tresorit
…
continue reading
![Artwork](/static/images/128pixel.png)
1
248: Immutability: Protecting Data Integrity in the Cyber Age - Scality
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34
Giorgio Regni, CTO at Scality discusses immutability in data storage, explaining its evolution from media-based to software-based implementations. He also highlights the complexities of immutability, including administrative controls, compliance with regulations like GDPR, and the need for effective detection and recovery processes.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
247: Unexpected Consequences: Insights for VMware Users Post-Broadcom Deal - Nutanix
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24
Lee Caswell, SVP Product and Solutions Marketing at Nutanix highlights the increasing importance of adapting total cost of ownership (TCO) and return on investment (ROI) models to reflect new licensing costs. He also addresses the shift towards hybrid and multi-cloud environments, emphasizing the role of customer-managed security policies and the r…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
IT Security: How encryption can protect - and deceive you
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27
Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises.By Tresorit
…
continue reading
![Artwork](/static/images/128pixel.png)
1
246: United Front: CISOs Collaborate to Navigate SEC Regulations - ZScaler
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35
Sam Curry, VP & CISO at ZScaler explores the implications of new SEC reporting requirements, the increasing challenges of ransomware attacks, and the shift towards encryptionless extortion. Sam shares insights into how critical infrastructure is becoming more vulnerable and discusses new reporting standards introduced in 2024. The conversation also…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
245: Data Center Hunger Games: Only the Fittest Survive Mergers - Brass Valley
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35
Rocco D'Amico, the founder and CEO of Brass Valley dives into various aspects of IT Asset Disposition, including the hidden threats of dark data and end-of-life assets, challenges of data center closures and mergers, cost management, compliance and regulations, chain of custody, and innovations in the ITAD industry.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
244: Cloud Security Insights: From Innovation to Evangelism - Plerion
22:51
22:51
Play later
Play later
Lists
Like
Liked
22:51
Daniel Grzelak, Chief Innovation Officer at Plerion discusses his role's unique challenges with a focus on simplifying cloud security. He also shares valuable insights for aspiring tech leaders on becoming a technical evangelist or innovation officer, emphasizing expertise, opinion formation, and public engagement.…
…
continue reading
By Tresorit
…
continue reading
![Artwork](/static/images/128pixel.png)
1
243: Surviving the Unexpected: From Disaster Recovery to Cyber Recovery - BETSOL
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00
Justin Gesso, Senior Director of Marketing at BetSol, dives into critical disaster recovery strategies, emphasizing the need for thorough planning and testing. He talks about the evolving role of backup administrators in the age of cloud computing and automation, and the importance of maintaining a balance between human oversight and technological …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
242: From Vulnerability to Strength: Transforming Your Data Security Posture - Clarify360
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16
Jo Peterson, Vice President of Cloud and Security Services at Clarify360 discusses the critical importance of Data Security Posture Management (DSPM) in protecting against modern cyber threats. She covers the essential aspects of understanding exposure and accessibility of data, the importance of determining access levels, and how DSPM benefits org…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
241: Securing Active Directory Against Modern Cyber Threats - Cayosoft
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51
Dmitry Sotnikov, Chief Product Officer at Cayosoft a dives into the rising threat of ransomware, emphasizing the necessity of robust business continuity and disaster recovery plans for active directory. The conversation covers best practices for protecting and recovering Active Directory, the significance of having automated recovery solutions, and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
240: Are LLMs Too Large for Traditional Storage? - OSNEXUS
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37
Steven Umbehocker, Founder & CEO of OSNEXUS a dives into the current state and future of storage solutions in the age of AI and ML but also ignites a conversation on the readiness of traditional storage systems to handle the massive scale of LLMs. Through technical insights, forward-looking predictions, and practical advice, he highlights the criti…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
239: The Executive's Guide to Cybersecurity Incidents, Materiality, and the SEC - Clark Hill PLC
23:57
23:57
Play later
Play later
Lists
Like
Liked
23:57
Richard Halm, Senior Attorney, Cybersecurity, Data Protection, & Privacy at Clark Hill PLC explores the complexities of the new SEC rule on incident and risk disclosures. We dive into the resurgence of ransomware, the impact of AI on cybersecurity threats, and the critical elements of the SEC's requirements. The episode also covers the crucial conc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How to fortify your security with your workforce
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10
Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, where we will have a look at the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure.🛡️ From phishing link victims to ransomware scenarios, we'll explore real-life data bre…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
238: Navigating AI, Data Protection, and Beyond - Conexus
29:48
29:48
Play later
Play later
Lists
Like
Liked
29:48
Eric Daimler, CEO of Conexusdeep dives into the realms of AI, autonomous technologies, and data security. As a former Presidential Innovation Fellow under the Obama administration, Daimler shares his insights on AI's potential, its implications for data protection, and the revolutionary work of Conexus in solving the data deluge challenge. With dis…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
237: From NIST CSF to CMMC: Evolving Cybersecurity Standards Explained - Petronella Technology Group
26:34
26:34
Play later
Play later
Lists
Like
Liked
26:34
Craig Petronella, CEO of Petronella Technology Group dives into the complexities of the Cybersecurity Maturity Model Certification (CMMC). We discuss the inception and necessity of CMMC within the defense sector, its evolution from NIST standards, and the challenges of self-attestation. The conversation also touches on the financial aspects of comp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
236: The Intersection of Testing Backups and Tech Layoffs 2024 - Servosity
38:54
38:54
Play later
Play later
Lists
Like
Liked
38:54
Damien Stevens, Founder and CEO of Servosity delves into the critical importance of regular backup testing amidst the landscape of technological advancements and the recent trends in tech layoffs. He navigates through the complexities of maintaining data integrity in a time of tech industry fluctuations, highlighting the essential role of diligent …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
235: How to Store Data Virtually Forever - Cerabyte
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54
Martin Kunze, Founder and Chief Marketing Officer at Cerabyte discusses the long-term durability and efficiency of storing data. This approach addresses issues like data longevity, ecological impact, and the increasing volume of digital information. We also touch on the technical and philosophical implications of preserving digital heritage for fut…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dive into Cybersecurity: Zero Trust Privacy
43:20
43:20
Play later
Play later
Lists
Like
Liked
43:20
🔒 Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy. 🛡️ In this episode you’ll learn: Steps to take when reviewing your data strategies Common mistakes to avoid while working with data How to imp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
234: Beyond Basics: A Masterclass in AI That's Shaping the Industry! - Pangea Tech Consulting
36:19
36:19
Play later
Play later
Lists
Like
Liked
36:19
Dr. Ali Sekmen, CEO at Pangea Tech Consulting, and Chris Jones, Chief Technology Officer discuss the forefront of AI and machine learning, focusing on the development and application of these technologies in solving complex data science and engineering problems. With a blend of academic insight and practical industry experience, the episode delves …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
233: Every Second Counts: Identity Orchestration's Answer to Cyber Attacks - Strata Identity
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35
Gerry Gebel, Head of Standards at Strata Identity explores the evolving landscape of identity management and cybersecurity. The conversation delves into identity orchestration, policy orchestration, the importance of access policies, and the impact of emerging technologies like AI on cybersecurity practices. We also discuss the staggering increase …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
232: The 3-2-1 Rule Revisited: Overkill or a Cybersecurity Must-Have? - Synergy Six Degrees
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13
Kevin Bailey, Chief Analyst and Founder at Synergy Six Degrees talks about the evolving nature of data protection focusing on the 3-2-1 backup strategy and its relevance in modern cybersecurity. Kevin challenges traditional data protection methods, emphasizing the increasing sophistication of cyber-attacks and the importance of protecting active da…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tresorit Winter-Updates und Jahresrückblick Beschreibung
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07
By Renáta Bárdos, Peter Stössel
…
continue reading
![Artwork](/static/images/128pixel.png)
1
231: The Maestro of Cyber Defense: A CISO's Guide to Orchestrating Protection - Carbide
30:33
30:33
Play later
Play later
Lists
Like
Liked
30:33
Darren Gallop, Co-Founder and CEO at Carbide shares his unique journey from the music industry to leading a cybersecurity firm. The discussion covers a wide range of topics including the importance of leadership in cybersecurity, the evolving role of artificial intelligence in data protection, and the challenges faced by modern Chief Information Se…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
230: The Future of Digital Currencies and Blockchain Security - Mimo
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50
Claude Eguienta, Chief Executive Officer at Mimo discusses the company's role in providing tools and assets for users across different market cycles, particularly in crypto. We dive into the evolution of crypto, the security aspects of blockchain compared to traditional banking, and the potential of Central Bank Digital Currencies (CBDCs). We also …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
229: Dirty Little Secrets of Being a CISO - NeuEon
28:46
28:46
Play later
Play later
Lists
Like
Liked
28:46
Candy Alexander, Chief Information Security Officer and Security Practice Lead at NeuEon Inc. discusses the challenges and realities of being a CISO, emphasizing the importance of technical skills, strategic thinking, and effective communication with the C-suite. She further highlights the necessity of understanding and aligning with business strat…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tresorit Winter updates and year ahead review
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31
By Tresorit
…
continue reading
![Artwork](/static/images/128pixel.png)
1
228: Post-Ransomware Attack: Critical Actions You Can't Ignore - Quorum
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27
Gabe Gambill, VP Product and Tech Operations at Quorum provides a detailed guide for individuals and organizations recovering from a ransomware attack. He emphasizes the urgent need for immediate action to isolate and assess affected systems. He advises on the importance of clear communication with stakeholders and law enforcement, and the crucial …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
227: Why Simple Backups Don't Cut It Anymore - Scality
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52
Paul Speciale, Chief Marketing Officer at Scality discuss critical issues in cybersecurity, including ransomware and immutable storage. The episode emphasizes the role of immutable storage in enhancing cybersecurity strategies amidst increasing cyber threats and the integration of AI in data protection. It also highlights the importance of thorough…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Keeping workplace collaboration cybersecure
24:45
24:45
Play later
Play later
Lists
Like
Liked
24:45
In this episode of Under CTRL, Tresorit’s Chief Revenue Officer, Peter Stössel, is joined by Elisabeth Rötsch, an account executive for secure messaging app Threema. They’ll be discussing why secure communication should be a top priority for modern workforces, and how digitization can improve connectivity for global businesses. The episode will als…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
226: Tape Storage in 2024: Why You Need to Hear This Now - Tape Ark
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15
Guy Holmes, Founder and CEO of Tape Ark discusses various topics related to data protection, tape storage, and the evolution of data storage technologies. He also talks about the challenges and solutions in migrating legacy tape data to the cloud, enabling innovative uses of historical data. He shares insights on data liberation, and interesting pr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
225: Cutting Through Alerts by Optimizing Your Security Operations Center - Silk Security
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02
Yoav Nathaniel, CEO of Silk Security, joins us to discuss the transformative role of AI-driven solutions in cybersecurity risk management. Exploring how to leverage AI to enhance security operations and streamline risk assessment processes. Yoav offers unique insights into tackling the overwhelming challenge of managing security alerts. We delve in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
224: How Generative AI is Changing the Security Questionnaire Game - Vendict
26:35
26:35
Play later
Play later
Lists
Like
Liked
26:35
Udi Cohen, CEO and Co-founder of Vendict explores the groundbreaking impact of generative AI on the security compliance landscape. We dive deep into how this innovative technology is transforming the traditional processes, making the completion of security questionnaires faster, more accurate, and less resource-intensive.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sicherheit und Benutzerfreundlichkeit in Harmonie
25:38
25:38
Play later
Play later
Lists
Like
Liked
25:38
Wie kann Ihr Unternehmen die Sicherheit und Privatsphäre seiner Daten in Übereinstimmung mit aktuellen Datenschutzbestimmungen gewährleisten, ohne seinen Mitarbeitern das Leben – und die interne und externe Zusammenarbeit – schwer zu machen? In dieser gemeinschaftlich von Threema.Work und Tresorit produzierten Podcast-Episode erhalten Sie die Antwo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
223: Ransomware Resilience: Proven Strategies to Render It Powerless - Calamu
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23
Paul Lewis, CEO of Calamu, goes deep into the evolving landscape of cybersecurity and data protection. He explores cutting-edge strategies for combating ransomware, the role of AI in both offensive and defensive cybersecurity tactics, and the future of data storage solutions. He also shares his expert views on the challenges and solutions in cyber …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
222: Ransom Paid: Now, How Do We Catch Cyber Criminals? - Panther Protocol
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23
Anish Mohammed, co-founder and CTO of Panther Protocol delves into the use of cryptocurrency in ransomware and data exfiltration, focusing on the traceability of blockchain transactions and the mechanisms for transaction shielding. We also dive into decentralized finance (DeFi), blockchain, and the concept of Web 3.…
…
continue reading
Join Péter Budai, Tresoit’s Chief Product Officer, as he breaks down the data compliance landscape in Europe and the United States and looks at how firms can get the most from their data protection policies. Initially, compliance can seem daunting. But taking the time to evaluate your company’s digital infrastructure isn’t just about managing poten…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
221: Your Data, Your Rules: Exploring Self-Sovereign Identities - Verida
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35
Chris Were, CEO and Co-Founder of Verida drops details on self-sovereign identities, security, and how to keep control of your personal data in the midst of cyber incidents on the rise.By Demetrius Malbrough
…
continue reading
![Artwork](/static/images/128pixel.png)
1
220: The Pitfalls of Cybersecurity Incident Response - Sygnia
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25
Oren Wortman, VP of Cybersecurity Services, NA at Sygnia shares invaluable insights on the pitfalls of incident response and the importance of preparation. He emphasizes the adversarial mindset, where understanding and simulating potential attackers' moves is crucial for robust cybersecurity. The conversation touches on the sophistication of cyberc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
219: The Rise of Virtual CISO Neighborhood Watch - Health-ISAC
27:20
27:20
Play later
Play later
Lists
Like
Liked
27:20
Errol Weiss, Chief Security Officer at Health ISAC dives into cybersecurity, privacy, and data protection discussing the role of CISOs and their responsibilities. We also discuss ransomware attacks and data backup strategies, cybersecurity talent shortages, and internship programs for those aspiring to enter the cybersecurity industry.…
…
continue reading