logo
episode-header-image
Oct 2024
48m 54s

How to Build the Ultimate Data Survival ...

Pure Storage
About this episode
Just as seasoned "preppers" maintain bug-out bags for physical emergencies, today's organizations need a comprehensive kit of digital resilience tools to weather any storm – from ransomware attacks to natural disasters. In our latest episode, join Technology Strategy Director Jason Walker and Technical Evangelist Matt Bradford to unpack the essential compone ... Show More
Up next
Aug 19
15 Architectural Decisions Series: Snapshots, Realistic Efficiency Metrics, and Adaptive RAID
Episode 4 of our series around Pure's fundamental design principles dives into aspects of Pure's technology that drive realistic efficiency for users. This episode tackles capabilities most Storage professionals are familiar with - snapshots, efficiency metrics and adaptive flexi ... Show More
34m 32s
Aug 12
15 Architectural Decisions Series: Controller Architecture and Limited Error Paths
Our series around Pure's fundamental design principles continues. Episode 3 discusses three key architectural decisions: stateless controllers, the second controller, and limited error paths. Hear from co-hosts JD Wallace and Andrew Miller about how stateless controllers mean no ... Show More
33m 25s
Aug 5
15 Architectural Decisions Series: Flash and Data Reduction
Our series around Pure's fundamental design principles continues. Episode two of the series centers in on the choice to use exclusively Flash memory and how best to leverage it. Next, the team dives into innovations in a wide range of data reduction technologies and advantages fo ... Show More
37m 54s
Recommended Episodes
Feb 2025
Rethinking Cloud Security Strategies
Cloud security is more complex than ever. Organizations move fast, but security teams often struggle to keep up. In this episode of Threat Vector, host David Moulton speaks with Amol Mathur, SVP of Products for Prisma Cloud at Palo Alto Networks, about how platformization is resh ... Show More
35m 28s
Dec 2024
152: Stacc Attack
Jarett Dunn, AKA StaccOverflow, stole millions of dollars from a website called Pump Fun, and he wanted to do it in the most dramatic and theatrical way he could. His big heist is known as the “Stacc Attack”.https://x.com/STACCoverflowHe has a merch store now freestacc.io.Sponsor ... Show More
53m 3s
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s
May 29
Risk, Resilience and Real Talk with Sam Ainscow
In this episode of Threat Vector, host David Moulton speaks with Sam Ainscow, Group Chief Security Officer at Hill & Smith PLC. With over 20 years in cybersecurity, Sam shares his deep insights into cyber resilience, risk assessment, and incident response. He explains why a busi ... Show More
37m 45s
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Oct 2024
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it t ... Show More
36m 29s
Dec 2024
Revolutionizing Crisis Communication: The Power of Low-Code Tools
In this episode of the Wag The Dog Newsletter Podcast, your virtual hosts explore how low-code and no-code platforms like Replit are transforming the field of crisis, risk, and emergency communication. We dive into the challenges communicators faced in the past when developing cu ... Show More
5m 16s
Aug 2024
Cyber Security vs Frameworks
In the latest episode of Life of a CISO, Dr. Eric Cole dives deep into the critical difference between compliance and true cybersecurity. He emphasizes that while frameworks and compliance standards are essential, they often focus on checking boxes rather than addressing the holi ... Show More
30m 17s
Dec 2024
How Cybercriminals Leverage Disruption for Maximum Impact [Encore]
In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Wendi Whitmore, Senior Vice President of Unit 42, to discuss the increasing speed and sophistication of cyber attacks. Wendi shares her extensive expertise, highlighting the ... Show More
25 m
Jul 15
161: mg
In this episode we talk with mg (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG Cable. A seemingly ordinary USB cable with extraordinary offensive capabilities.Learn more about mg at: o.mg.lolSponsorsSupport for this show comes from T ... Show More
1h 11m