Player FM - Internet Radio Done Right
Checked 4M ago
Added three years ago
Content provided by PKWARE. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by PKWARE or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED
T
The 85 South Show with Karlous Miller, DC Young Fly and Chico Bean
52:43
Play Later
Play Later
Lists
Like
Liked
52:43West Coast legend Ice Cube pulls up to the trap to talk about his new album and kick it one good tine with Karlous Miller, Chico Bean, DC Young Fly and Clayton English! Off the rip they start talking about DC being in the New Friday movies. Cube takes it all the way back to how he started in Compton and Karlous asks about the lyrics to "Today Was A Good Day!" The squad talks about The Big 3 and the struggle to build an all new league. Cube talks about how the govt opposition to his early music and talks about how he got involved in developing a political plan for Black People. From Mike Epps to Bernie Mac, the conversations sways to talking about how comedians impact the movies. Cube talks "All About The Benjamins" and tells a crazy story from the time he was filming Anaconda with J Lo. This is the coldest podcast! || 85 SOUTH App : www.channeleightyfive.com || Twitter/IG : @85SouthShow || Our Website: www.85southshow.com See omnystudio.com/listener for privacy information.…
Productivity Protected by PKWARE
Mark all (un)played …
Manage series 3291795
Content provided by PKWARE. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by PKWARE or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
The world’s accomplishments depend on data security. Join PKWARE CEO Spencer Kupferman every month as he chats with data security experts on eliminating security gaps, taking control of sensitive data, and meeting the most stringent data compliance requirements. Tune in to find out how industry leaders are eliminating data security gaps and achieving compliance goals.
…
continue reading
22 episodes
Mark all (un)played …
Manage series 3291795
Content provided by PKWARE. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by PKWARE or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
The world’s accomplishments depend on data security. Join PKWARE CEO Spencer Kupferman every month as he chats with data security experts on eliminating security gaps, taking control of sensitive data, and meeting the most stringent data compliance requirements. Tune in to find out how industry leaders are eliminating data security gaps and achieving compliance goals.
…
continue reading
22 episodes
All episodes
×1 Exploring Data Security: Classification, AI, and Compliance 34:51
34:51
Play Later
Play Later
Lists
Like
Liked
34:51Join PKWARE's CEO, Spencer Kupferman, and Eden Priela of Converge Technologies as they unravel the complexities of data security, emphasizing classification and discovery. Discover how AI-driven advancements have reshaped data management over the past decade. Explore use cases showcasing how classification and discovery mitigate risks and meet compliance mandates such as PCI. Gain insights into implementing a security-first mindset across organizations, locally and globally.…
1 SchemaLink Unveiled: Decoding PKWARE z/OS Data Security Solutions 39:05
39:05
Play Later
Play Later
Lists
Like
Liked
39:05Explore the groundbreaking SchemaLink Technology by PKWARE, unraveling how it solves the unsolved challenges in z/OS data security. Join us as we delve into the intricacies of PK Protect, questioning, understanding, and demystifying the evolution of precise sensitive data discovery on z/OS datasets.
1 Mainframe Evolution: Challenges, Security, and Success Stories with Dusty Rivers 29:34
29:34
Play Later
Play Later
Lists
Like
Liked
29:34In this podcast episode, featuring the insightful Dusty Rivers as the guest, we delve deep into the world of mainframe modernization—an essential conversation for businesses navigating the digital landscape. As an eminent figure well-versed in all facets of mainframe systems, Dusty talks about demystifying the concept of mainframe modernization. He passionately articulates its significance in today's tech landscape, highlighting how this evolution is not just a choice but a necessity for businesses aiming to stay competitive and agile in the digital era especially as it relates to z/OS systems.…
1 The Future of Mainframe Data Security is Now – Here’s What You Need to Know 36:41
36:41
Play Later
Play Later
Lists
Like
Liked
36:41Our recent podcast with Len Santalucia delves deep into the ever-changing mainframe security landscape. We discuss how z/OS is the ultimate platform for sensitive data and has been for 40 years making it a prime target for those with malicious intent. Len identifies insider threats as one of the top security concerns for IBM Z, while providing insights into the best practices for actually protecting the data.…
In our latest Productivity Protected Podcast, we had the pleasure of speaking with Meredith Stowell, Vice President of IBM Z Ecosystem. With her extensive background in technology and a deep understanding of IBM's innovative solutions, Stowell shared her insights about her journey into technology, the evolution of mainframe technology, the impact of quantum-resistant cryptography, the intersection of Telum and AI with mainframe cybersecurity, the challenges posed by rapid AI advancements, and the key takeaways about IBM Z Ecosystem.…
In this podcast, we are speaking with Nidhi Mahajan, an expert from our Engineering Team, discussing our recently released Dynamic Masking feature. We discuss the differences between Dynamic Masking and Static Masking, highlighting our real-time approach and preservation of original data along with ensuring data integrity and ensuring compliance is met. Nidhi highlights how user-friendly PKWARE's Dynamic Masking is, with its intuitive interface, easy implementation and how the solution delivers robust data protection without compromise. Tune in to gain valuable insights from Nidhi's experience and learn about the cutting-edge capabilities of PKWARE's Dynamic Masking.…
1 Data Risk Management: Best Practices and Predictions 34:52
34:52
Play Later
Play Later
Lists
Like
Liked
34:52As data has evolved over the years, so too has data risk management changed and evolved. Mandates such as HIPAA, GDPR, CCPA, and PCI DSS continue to adjust how organizations collect, use, store, and protect their data, while new advancements such as AI offer new ways to achieve—or circumvent—that protection. Converge VP Solution Architecture Dan Gregory joins host Spencer Kupferman to talk about security cultures, personalized data risk assessments, and what listeners can do today to prepare for the cybersecurity needs of tomorrow.…
Sensitive data discovery seems like a straightforward process, but in reality, it’s a nuanced practice that involves detailed understanding in order to make sure that organizations are as aware and protected as possible. Businesses must have a comprehensive view of data that is easy to implement and use, and can scale as data inevitably grows. Bloor Research Senior Analyst Daniel Howard joins host Spencer Kupferman to discuss data discovery and data governance, the challenges organizations face with discovery, and the importance of having an inclusive and ongoing process to protect sensitive data.…
1 Women in Tech: How Far We’ve Come and What’s Next 23:02
23:02
Play Later
Play Later
Lists
Like
Liked
23:02At PKWARE, we’ve always been about progress, and that includes building an organization that celebrates and encourages women in technology and leadership roles. In honor of International Women’s Day and Women’s History Month, join Kathy Myhand, VP of People, and Jothi Agnitha, Engineering, along with guest host Dawn Jonckowski, Director of Corporate Communications, as they discuss the women who’ve blazed the trails for them and how to encourage the upcoming generations on their tech and leadership career journeys.…
1 Stopping Cybercrime Before It Starts: Dark Web Threat Intelligence 34:58
34:58
Play Later
Play Later
Lists
Like
Liked
34:58The dark web is home to the fraud economy and multiple criminal communities, rife with stolen data. It’s a complex and twisted environment that the average internet user should avoid, but what happens when they learn their data is available for sale there? Founder and CEO of Q6 Cyber Eli Dominitz joins host Spencer Kupferman to discuss his career evolution into dark web threat intelligence, how to unravel and identify threat sources, and why businesses should always have an expert monitoring the dark web on their behalf.…
Protecting your data sometimes requires thinking like a threat actor. Enter ethical hackers, authorized security experts that try to break into your systems on purpose so you know where to improve security measures. Hacker and CypherCon founder Michael Goetzman joins Spencer Kupferman to share his tech journey into ethical hacking and how the annual CypherCon hacking event has impacted the cybersecurity world for the better.…
1 Why UX/UI is Crucial to Cybersecurity Software 29:18
29:18
Play Later
Play Later
Lists
Like
Liked
29:18User interface and experience design is one of the most critical aspects of successful software. Done well, UX/UI actually goes largely unnoticed, and users will intuitively perform the right actions. With complex solutions like cybersecurity, user interface and experience become even more central to ensuring the right steps are performed to discover and protect data. UX/UI experts Mike Kornacki and Mike Rhode join host Spencer Kupferman to unpack more about UX/UI design, the science behind it, and how it can contribute to an organization’s cybersecurity.…
1 Leading the Way: Israel’s Investment in Cybersecurity 38:02
38:02
Play Later
Play Later
Lists
Like
Liked
38:02Over the past several decades, Israel has become a powerhouse in cybersecurity, supplying a large percentage of the world’s cyber technology. Israel has also focused on assisting smaller nations in creating cybersecurity startups. Josh Cohen, Director of Cyber Security at the Economic and Trade Office at the Embassy of Israel in Washington, D.C., joins host Spencer Kupferman to discuss more about Israel’s ongoing investment in cybersecurity both for its own nation and the world.…
In many organizations, the CFO’s responsibility in overseeing company funds puts them in control of signing off on risks, including how data is handled. CFOs end up playing a specific role in helping their organization prepare for the inevitable risk of a cyber-attack. PKWARE CFO Matt Zomboracz joins host Spencer Kupferman to discuss his experience in protecting sensitive data during his career in finance, as well as what CFOs need to know about data breaches.…
1 From ZIP to Data Protection: The Evolution of a Software Company 35:59
35:59
Play Later
Play Later
Lists
Like
Liked
35:59The ZIP file revolutionized the way information could be shared between computers prior to the internet, and it was invented by none other than PKWARE founder Phil Katz. Our unique role as a trusted data compression provider has enabled PKWARE to evolve over the last four decades to now include encryption and other forms of data security. Senior Director of Software Development Engineering and PKWARE historian Jack Dale joins Spencer Kupferman to talk about the journey from ZIP to data protection.…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.