logo
episode-header-image
Oct 2024
48m 54s

How to Build the Ultimate Data Survival ...

Pure Storage
About this episode
Just as seasoned "preppers" maintain bug-out bags for physical emergencies, today's organizations need a comprehensive kit of digital resilience tools to weather any storm – from ransomware attacks to natural disasters. In our latest episode, join Technology Strategy Director Jason Walker and Technical Evangelist Matt Bradford to unpack the essential compone ... Show More
Up next
May 5
Data Defenders: When Storage Meets Security - The Varonis and Pure Storage Partnership
In an era where data breaches cost organizations millions and threaten business continuity daily, the intersection of data storage and security has never been more critical. Hear from two industry experts: Nolan Necoechea, Product Marketing leader from Varonis, and returning gues ... Show More
36m 45s
Apr 28
Manage Smarter with Pure1: Cool Capabilities and Practical Applications For Every Administrator
Discover great management capabilities with Pure SE Scott Nalawaniec, a former Pure customer and now a seasoned Systems Engineer from Portland. We dive deep into the world of Pure Storage's management platform, Pure1, and look at Scott's 5 favorite capabilities that make managing ... Show More
49m 53s
Apr 14
Data-Driven Transformation: Valerie Harrison on Cloud, AI, Automotive, and Women in Tech
In this episode of the Pure Report, we welcome Valerie Harrison, Principal Technologist at Pure Storage, for an in-depth exploration of technology transformation in cloud, AI, and the automotive industry. Valerie shares her fascinating career journey from Google to Pure Storage, ... Show More
52m 12s
Recommended Episodes
Feb 2025
Rethinking Cloud Security Strategies
Cloud security is more complex than ever. Organizations move fast, but security teams often struggle to keep up. In this episode of Threat Vector, host David Moulton speaks with Amol Mathur, SVP of Products for Prisma Cloud at Palo Alto Networks, about how platformization is resh ... Show More
35m 28s
Dec 2024
152: Stacc Attack
Jarett Dunn, AKA StaccOverflow, stole millions of dollars from a website called Pump Fun, and he wanted to do it in the most dramatic and theatrical way he could. His big heist is known as the “Stacc Attack”.https://x.com/STACCoverflowHe has a merch store now freestacc.io.Sponsor ... Show More
53m 3s
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s
May 29
Risk, Resilience and Real Talk with Sam Ainscow
In this episode of Threat Vector, host David Moulton speaks with Sam Ainscow, Group Chief Security Officer at Hill & Smith PLC. With over 20 years in cybersecurity, Sam shares his deep insights into cyber resilience, risk assessment, and incident response. He explains why a busi ... Show More
37m 45s
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Oct 2024
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it t ... Show More
36m 29s
Dec 2024
Revolutionizing Crisis Communication: The Power of Low-Code Tools
In this episode of the Wag The Dog Newsletter Podcast, your virtual hosts explore how low-code and no-code platforms like Replit are transforming the field of crisis, risk, and emergency communication. We dive into the challenges communicators faced in the past when developing cu ... Show More
5m 16s
Aug 2024
Cyber Security vs Frameworks
In the latest episode of Life of a CISO, Dr. Eric Cole dives deep into the critical difference between compliance and true cybersecurity. He emphasizes that while frameworks and compliance standards are essential, they often focus on checking boxes rather than addressing the holi ... Show More
30m 17s
Dec 2024
How Cybercriminals Leverage Disruption for Maximum Impact [Encore]
In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Wendi Whitmore, Senior Vice President of Unit 42, to discuss the increasing speed and sophistication of cyber attacks. Wendi shares her extensive expertise, highlighting the ... Show More
25 m
Dec 2024
Decoding XDR: Allie Mellen on What’s Next
Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more here. Check out our episode on "Cyber Espionage and Financial Crime: North Korea’s Double Threat" with Assaf Dahan, Director of Threat Research at Palo Alto ... Show More
39m 59s