All Episodes
Over 300 episodes of expert discussions on data protection, cybersecurity, and IT infrastructure.
Why AI Fails Without the Right Data (And How to Fix It) - View Systems Inc.
Joel Christner, CEO of View Systems, talks about why so many enterprise AI projects fall flat—despite powerful models and high expectations. The culprit? Bad or disorganized data. Joel explains how fragmented tools, shadow IT, and poor data hygien...
Why Data Classification Might Be Your Biggest Security Risk - Data Management Veteran
Anand Athavale, Data Management veteran joins to explain why separating regulatory data (like PII) from security-sensitive data (like passwords and keys) is mission-critical. Learn how ransomware\'s evolution has blurred roles between compliance a...
Data Storage: The Unsung Hero of Every Crisis You Avoid - Infinidat
Eric Herzog, CMO of Infinidat, joins The Gumbo to break down the modern enterprise storage landscape—from ransomware resilience and AI integration to CapEx vs. OpEx tradeoffs. From why CIOs still undervalue storage in cybersecurity strategies to t...
The Battle for AI Supremacy Isn’t About Models—It’s About Infrastructure - Thunder Compute
Carl Peterson, CEO of Thunder Compute uncovers how Thunder Computer is redefining GPU utilization by enabling network-attached virtual GPUs—dramatically slashing costs and democratizing access. Carl shares the startup\'s Y Combinator origin story,...
Preparing for Data Privacy 2.0: What the Experts Aren’t Telling You - ClicData
Telmo Silva, CEO of ClicData, uncovers the hidden truths about the next wave of data privacy regulations—including the EU Data Act, GDPR updates, and the new AI Act. Telmo shares how smaller SaaS companies can prepare without drowning in legal con...

5 Trends That Will Separate Data Winners from Losers in 2025 - Yellowbrick Data
Mark Cusack, CTO of Yellowbrick Data unpacks the evolving data protection landscape. We explore the shift from cloud-first to cloud-optimized strategies, the power of private LLMs, the resurgence of data sovereignty, and how hybrid cloud is shapin...
How to Turn Your Backups Into Business Intelligence - Eon
Dr. Assaf Natanzon, VP and Chief Architect at Eon, joins host Demetrius to reveal how modern backups can go beyond storage and recovery to become a true source of insight. Hear how one company uncovered 20,000+ forgotten snapshots—and massive hidd...
Why Cybersecurity Isn’t Just for Hackers Anymore - Aspen Institute
Yameen Huq, Director of Cybersecurity Programs at the Aspen Institute explores the often-overlooked non-technical skills needed in cybersecurity, the evolving cyber policy landscape in Washington D.C., and the critical importance of aligning cyber...
The Fear Every CISO Has But Rarely Admits - Loreta Today
Loreta Tarozaite, CEO & Founder at Loreta Today breaks down the human side of cybersecurity leadership. We explore the fear of failure among CISOs, the power of executive presence, and how communication—not just technical skills—is the real driver...
Avoiding Cyber Disaster: Is Your Company DORA Compliant? - N2WS
Sebastian Straub, Principal Solutions Architect at N2WS, explores DORA (Digital Operational Resilience Act), emphasizing its stringent impact on financial institutions\' cybersecurity. He highlights cloud-native backup strategies, cross-region and...
Cloud Rewind: Because CTRL+Z Doesn’t Work on Ransomware - Commvault
Govind Rangasamy, Head of Recovery Solutions and VP of Portfolio Marketing at Commvault (via Appranix acquisition), talks about the terrifying reality of ransomware, cyber threats, and the illusion of traditional data protection. With 38,000+ rans...

Your Old Tapes Might Be a Goldmine for Hackers – Here’s Why! - Insurgo
Gavin Griffiths, Managing Director and Pat Mayock, VP of Sales at Insurgo dives into the hidden risks of tape storage and destruction. They expose shocking real-world security breaches—like school fingerprint records almost being sold—and discuss ...

The Enterprise Backup Industry’s Worst Nightmare? - S2|DATA
W. Curtis Preston, aka \"Mr. Backup,\" reveals shocking insights from the world of data recovery. From a million-tape archive stored in a football-field-sized facility to the critical need for reading backup data without vendor lock-in, this conve...

From Data Chaos to Control: The Future of Cloud Backup - Backblaze
Gleb Budman, CEO & co-founder of Backblaze, discusses the future of data storage, cloud cost optimization, and resilience against cyber threats. Gleb shares his journey of bootstrapping Backblaze, competing against AWS, and ultimately taking the c...
The Secret Weapon NFL Teams Use for Game-Changing Decisions! - OSNEXUS
Steven Umbehocker, CEO of OSNEXUS discusses how businesses can protect critical data with object storage, immutability, and AI-powered automation. He dives into cybersecurity strategies, the role of AI in long-term data retention, and why enterpri...

CEOs Beware: Ignoring Your Data Could Cost You Everything - The Data Group
Paul Graeve, CEO of The Data Group, discusses the hidden dangers of poor data management. We talk about why CEOs must take charge of their data strategy, how bad data can derail AI initiatives, and why fragmented data is silently draining company ...

Hackers Are One Step Ahead – Can You Recover Your Backups? - DCIG
Jerome Wendt, CEO & Principal Analyst at DCIG, unpacks the latest trends in data protection. We dive into intermittent encryption, a stealthy new ransomware tactic, and how AI-driven anomaly detection is reshaping cybersecurity. Jerome also shares...
How to Stay Safe Online: The Growing Risk of Digital Impersonation in 2025 - Memcyco
Kate Cox, Business Development at Memcyco uncovers the alarming rise of digital impersonation attacks and the role AI plays in making scams more convincing than ever. We discuss how cybercriminals exploit AI to clone websites, steal data, and unde...
How Data Lakes and Deep Learning Are Revolutionizing Cybersecurity in 2025 - DeepTempo
Evan Powell, Founding CEO of DeepTempo, explores advancements in cybersecurity through the innovative use of Large Log Model (LogLM). He discusses the challenges of securing data amidst increasing cyber threats, the role of platforms like Snowflak...

Shocking New Tactics Hackers Are Using to Steal Your Identity - Breez Security
Abhinav Srivastava, Founder and CEO of Breez Security delve into the rising importance of identity security in combating credential compromises and safeguarding cloud and SaaS platforms. Abhinav explains how to use behavioral identity telemetry an...
Your Phone Could Be the Perfect Target -- Here’s Why - Nuke from Orbit
James O\'Sullivan, founder and CEO of Nuke from Orbit explore the hidden dangers of PIN usage and the risks posed when phones are stolen, emphasizing the underestimated security vulnerabilities in everyday mobile device usage. James shares the ori...
Protecting Backups and Future-Proofing Skills in Containers - IDC
Johnny Yu, Research Manager, Infrastructure Software Platforms, Worldwide Infrastructure Research at IDC dives into the challenges and strategies for backing up containerized workloads. We explore the evolution of container technology, differences...
Connecting AI and DevOps to Solve Modern Workflow Challenges - Jozu
Gorkem Ercan, CTO and Founding Distinguished Engineer at Jozu, shares insights into overcoming the challenges of integrating AI and ML into DevOps workflows, emphasizing the critical role of immutable artifacts in ensuring trust and efficiency. He...
Critical Mobile Vulnerabilities and How to Prevent Them - Appknox
Subho Halder, Co-founder and CEO of AppKnox, dives into the evolving challenges and trends in mobile app security. He shares insights into protecting sensitive data on mobile applications, addressing issues like man-in-the-middle attacks, insecure...
Why Business Continuity Plans Often Fail - Strata Identity
Eric Olden, Co-Founder and CEO of Strata Identity, dives into the challenges and innovations in identity management for multi-cloud environments. He explains the concept of identity orchestration, its role in zero-trust architecture, and the evolu...
When Hackers Hit Your Backups, This One Thing May Save You - Myota
Gabriel Gumbs, Chief Product Officer and President at Myota, unpacks the unsettling truths about immutability, the evolution of ransomware tactics, and why traditional backup systems are failing in the face of cyber threats. Discover a revolutiona...
From Open-Source to APIs: The Critical Decisions Behind SaaS Architecture - Fastbreak RFP
Peter Bonney, CEO and Founder of Fastbreak RFP, shares his journey in building a scalable SaaS platform for automating RFP responses using AI. Peter dives into the challenges of balancing innovation with the rapid evolution of foundational AI mode...
Preventing Breaches Through Smarter Detection Techniques - Vectra AI
David Brooks, Cyber Security Architect at Vectra AI discusses early adversary detection, the role of AI and machine learning in preventing breaches, and the importance of network traffic analysis. David shares insights into balancing technology an...
Critical Attack Vectors Every SMB Must Defend Against - Dropsuite
Mark Kirstein, Chief Product Officer at DropSuite discusses the evolving cyber threat landscape, particularly how SMBs are increasingly targeted by cybercriminals. He explains the rising importance of data protection and the critical role MSPs pla...

Protecting the Next Generation of AI: Backup Challenges for Large Language Models - IDC
Phil Goodwin, IDC’s Research VP, explore the challenges of backing up AI environments, focusing on large language models. Phil highlights the limitations of traditional backup methods for dynamic AI systems and the industry\'s push for genuine AI-...
Guarding the Kingdom: Protecting Microsoft Entra ID and IAM Systems- Dropsuite
Bernard Clark, Senior Product Manager at DropSuite discusses the essential role of identity management and backup in today’s digital infrastructure. He highlights the critical need for organizations to protect Microsoft Entra ID, which he refers t...
How AI is Reshaping Large-Scale Databases for the Next Generation - MongoDB
Pavel Duchovny, Lead Developer Advocate at MongoDB, discusses the role of AI stacks in modern application development. He explains how MongoDB integrates into the AI stack, focusing on operational and vector databases, and shares best practices fo...
You’re Not as Protected as You Think: The Dark Side of SaaS - HYCU
Simon Taylor, CEO of HYCU discusses the state of SaaS resilience and the critical need for SaaS data protection. We discuss insights from a recent report surveying over 417 IT decision-makers worldwide. Simon shares the shocking statistic that 61%...
How This CEO Grew a Cybersecurity Empire from His Brother’s Garage - Stimulus Technologies
Nathan Whittacre, CEO of Stimulus Technologies discusses evolving cybersecurity threats, strategies to safeguard businesses, and how companies can foster a culture of cybersecurity awareness. He shares insights on managing cross-site tokenization ...
Why the Data Lakehouse Is the Future—But What’s Stopping It from Getting There? - Upsolver
Ori Rafael, CEO and co-founder of Upsolver explores the future of data management through data lakehouses. He explains the evolution of the lakehouse, a revolutionary architecture that combines the best of data lakes and warehouses. You will gain ...
Crucial Cybersecurity Advisory Before, During & After the Election - SolCyber
Scott McCrady, CEO of SolCyber discusses managed cybersecurity services, rising cyber insurance costs, and the impact of geopolitical conflicts on cybersecurity. He shares insights on how organizations can reduce risks and improve response strateg...
Generative AI & Data Privacy: How Companies Can Build Consumer Trust in 2025 - DataGrail
Daniel Barber, CEO of DataGrail delves into the founding of DataGrail, the challenges enterprises face in managing privacy, and how regulations like GDPR and CCPA impact the collection and processing of personal data. The conversation highlights t...
Immutable Data, Infinite Possibilities: The Decentralized Storage Revolution - Akave.io
Stefaan Vervaet, CEO of Akave.ai discusses the revolutionary impacts of decentralized compute, immutability, and blockchain technology in data storage and protection. Stefaan shares insights on how Akave.ai is leveraging blockchain to create a dec...
The Intersection of Hiring Trends in Cloud, Cybersecurity, and Disaster Recovery - Arpio
Doug Neumann, co-founder and CEO of Arpio, discusses how Arpio differentiates itself by offering a turnkey disaster recovery solution that addresses modern cloud architectures. He shares insights on navigating economic turbulence, the evolution of...
The Fastest Emerging Unseen Attack Surface: The Next Big Cyber Risk - FireTail
Jeremy Snyder, founder and CEO of FireTail, joins the show to discuss the rising importance of API security in a world where over 80% of internet requests are API calls. Jeremy shares his journey from launching FireTail to becoming a leading voice...

How to Overcome the Hiring Trust Gap: Secrets from a Former Google Engineer - Morgan Latimer Consulting
Anthony D. Mays, a former Google software engineer and the founder of Morgan Latimer Consulting shares his inspiring journey from growing up in Compton and overcoming personal challenges to becoming a successful technologist. Discover the strategi...
The Hidden Vulnerabilities in Enterprise Browsers - SquareX
Vivek Ramachandran, the visionary founder of SquareX shares the origins of SquareX, highlighting how it aims to mitigate last-mile attacks by embedding security directly within the browser. The discussion delves deep into the importance of browser...
AI Governance Essentials: How to Establish a Program from the Ground Up - Relyance AI
Leila Golchehreh, Co-Founder & Chief Strategy Officer at Relyance AI delved into AI governance, the importance of data integrity, and best practices for integrating AI technologies securely. Leila shared her journey and vision for creating a compa...
From Wall Street to Your Fridge: The Databases You Didn’t Know Existed - Faircom
Mike Bowers, Chief Architect at Faircom dives into the intricacies of database technology and its real-world applications. Mike shares insights on Faircom’s role in critical systems such as the U.S. stock market, FAA flight tracking, and even the ...
From Tapes to Terabytes: The Great Storage Shift - JetStor
Gene Leyzarovich, Founder at JetStor shares insights on the evolution of data storage from tapes and magnetic disks to modern flash and hybrid systems. We discuss the significant impact of the Broadcom and VMware acquisition on licensing costs, pr...
Navigating the AI Minefield: Best Practices for Data Governance - Polymer
Yasir Ali, CEO of Polymer Data Security discusses data security amidst the rise of AI and machine learning, highlighting the increasing complexity of managing data integrity and risks in AI governance. The discussion shifts to AI governance, where...
Here’s the Best Way to Achieve Comprehensive Cybersecurity - CyberConnective Corp
Rodrigo Loureiro, CEO of CyberConnective Corporation (C3) emphasizes the importance of understanding and addressing fundamental security measures such as patching servers, closing vulnerable ports, and maintaining up-to-date controls before invest...
Inside the Mind of a Data Privacy Expert - John D. Cook Consulting
John D. Cook, founder and CEO of John D. Cook Consulting shares insights from his extensive background in math and statistics, focusing on data privacy. The discussion dives into the complexities of handling data breaches, emphasizing the stress a...
AI, ML, and NVMe: The Power Trio Driving Data Performance - Graid Technology
Kelley Osburn, Senior Director of OEM and Channel Business Development at Graid Technology discuss the advancements and challenges in NVMe, Non-Volatile Memory Express storage and RAID, Redundant Array of Independent Disks technology. We also expl...
What Everyone Should Know About Immutable Storage - Scality
Candida Valois, Field CTO at Scality dives into the crucial topic of ransomware and the role of immutable storage in defending against such attacks. Candida emphasizes that not all immutable storage solutions are equal and highlights the importanc...
Choosing Your Tech Path: Field CTO vs. Technical Evangelist - DataCenterDude
Nick Howell, Global Field CTO for Cloud at NetApp discusses the evolving responsibilities and challenges faced by Field CTOs and Technical Evangelists. From navigating job market trends and salary transparency to exploring the future of AI and cyb...
How Artificial Intelligence is Changing Data Protection - Quantum
Jordan Winkelman, Field Solutions CTO at Quantum discusses the impact of AI on data management, emphasizing the importance of preserving data, ensuring compliance, and protecting it from cybersecurity threats. We also delve into the role of tape s...
Immutability: Protecting Data Integrity in the Cyber Age - Scality
Giorgio Regni, CTO at Scality discusses immutability in data storage, explaining its evolution from media-based to software-based implementations. He also highlights the complexities of immutability, including administrative controls, compliance w...
Unexpected Consequences: Insights for VMware Users Post-Broadcom Deal - Nutanix
Lee Caswell, SVP Product and Solutions Marketing at Nutanix highlights the increasing importance of adapting total cost of ownership (TCO) and return on investment (ROI) models to reflect new licensing costs. He also addresses the shift towards hy...
United Front: CISOs Collaborate to Navigate SEC Regulations - ZScaler
Sam Curry, VP & CISO at ZScaler explores the implications of new SEC reporting requirements, the increasing challenges of ransomware attacks, and the shift towards encryptionless extortion. Sam shares insights into how critical infrastructure is b...
Data Center Hunger Games: Only the Fittest Survive Mergers - Brass Valley
Rocco D\'Amico, the founder and CEO of Brass Valley dives into various aspects of IT Asset Disposition, including the hidden threats of dark data and end-of-life assets, challenges of data center closures and mergers, cost management, compliance a...
Cloud Security Insights: From Innovation to Evangelism - Plerion
Daniel Grzelak, Chief Innovation Officer at Plerion discusses his role\'s unique challenges with a focus on simplifying cloud security. He also shares valuable insights for aspiring tech leaders on becoming a technical evangelist or innovation off...
Surviving the Unexpected: From Disaster Recovery to Cyber Recovery - BETSOL
Justin Gesso, Senior Director of Marketing at BetSol, dives into critical disaster recovery strategies, emphasizing the need for thorough planning and testing. He talks about the evolving role of backup administrators in the age of cloud computing...
From Vulnerability to Strength: Transforming Your Data Security Posture - Clarify360
Jo Peterson, Vice President of Cloud and Security Services at Clarify360 discusses the critical importance of Data Security Posture Management (DSPM) in protecting against modern cyber threats. She covers the essential aspects of understanding exp...
Securing Active Directory Against Modern Cyber Threats - Cayosoft
Dmitry Sotnikov, Chief Product Officer at Cayosoft a dives into the rising threat of ransomware, emphasizing the necessity of robust business continuity and disaster recovery plans for active directory. The conversation covers best practices for b...
Are LLMs Too Large for Traditional Storage? - OSNEXUS
Steven Umbehocker, Founder & CEO of OSNEXUS a dives into the current state and future of storage solutions in the age of AI and ML but also ignites a conversation on the readiness of traditional storage systems to handle the massive scale of LLMs....
The Executive\'s Guide to Cybersecurity Incidents, Materiality, and the SEC - Clark Hill PLC
Richard Halm, Senior Attorney, Cybersecurity, Data Protection, & Privacy at Clark Hill PLC explores the complexities of the new SEC rule on incident and risk disclosures. We dive into the resurgence of ransomware, the impact of AI on cybersecurity...
Navigating AI, Data Protection, and Cybersecurity - Conexus
Eric Daimler, CEO of Conexusdeep dives into the realms of AI, autonomous technologies, and data security. As a former Presidential Innovation Fellow under the Obama administration, Daimler shares his insights on AI\'s potential, its implications f...

From NIST CSF to CMMC: Evolving Cybersecurity Standards Explained - Petronella Technology Group
Craig Petronella, CEO of Petronella Technology Group dives into the complexities of the Cybersecurity Maturity Model Certification (CMMC). We discuss the inception and necessity of CMMC within the defense sector, its evolution from NIST standards,...

The Intersection of Testing Backups and Tech Layoffs 2024 - Servosity
Damien Stevens, Founder and CEO of Servosity delves into the critical importance of regular backup testing amidst the landscape of technological advancements and the recent trends in tech layoffs. He navigates through the complexities of maintaini...

How to Store Data Virtually Forever - Cerabyte
Martin Kunze, Founder and Chief Marketing Officer at Cerabyte discusses the long-term durability and efficiency of storing data. This approach addresses issues like data longevity, ecological impact, and the increasing volume of digital informatio...
Beyond Basics: A Masterclass in AI That\'s Shaping the Industry! - Pangea Tech Consulting
Dr. Ali Sekmen, CEO at Pangea Tech Consulting, and Chris Jones, Chief Technology Officer discuss the forefront of AI and machine learning, focusing on the development and application of these technologies in solving complex data science and engine...
Every Second Counts: Identity Orchestration\'s Answer to Cyber Attacks - Strata Identity
Gerry Gebel, Head of Standards at Strata Identity explores the evolving landscape of identity management and cybersecurity. The conversation delves into identity orchestration, policy orchestration, the importance of access policies, and the impac...
The 3-2-1 Rule Revisited: Overkill or a Cybersecurity Must-Have? - Synergy Six Degrees
Kevin Bailey, Chief Analyst and Founder at Synergy Six Degrees talks about the evolving nature of data protection focusing on the 3-2-1 backup strategy and its relevance in modern cybersecurity. Kevin challenges traditional data protection methods...

The Maestro of Cyber Defense: A CISO\'s Guide to Orchestrating Protection - Carbide
Darren Gallop, Co-Founder and CEO at Carbide shares his unique journey from the music industry to leading a cybersecurity firm. The discussion covers a wide range of topics including the importance of leadership in cybersecurity, the evolving role...
The Future of Digital Currencies and Blockchain Security - Mimo
Claude Eguienta, Chief Executive Officer at Mimo discusses the company\'s role in providing tools and assets for users across different market cycles, particularly in crypto. We dive into the evolution of crypto, the security aspects of blockchain...

Dirty Little Secrets of Being a CISO - NeuEon
Candy Alexander, Chief Information Security Officer and Security Practice Lead at NeuEon Inc. discusses the challenges and realities of being a CISO, emphasizing the importance of technical skills, strategic thinking, and effective communication w...

Post-Ransomware Attack: Critical Actions You Can\'t Ignore - Quorum
Gabe Gambill, VP Product and Tech Operations at Quorum provides a detailed guide for individuals and organizations recovering from a ransomware attack. He emphasizes the urgent need for immediate action to isolate and assess affected systems. He a...

Why Simple Backups Don\'t Cut It Anymore - Scality
Paul Speciale, Chief Marketing Officer at Scality discuss critical issues in cybersecurity, including ransomware and immutable storage. The episode emphasizes the role of immutable storage in enhancing cybersecurity strategies amidst increasing cy...

Tape Storage in 2024: Why You Need to Hear This Now - Tape Ark
Guy Holmes, Founder and CEO of Tape Ark discusses various topics related to data protection, tape storage, and the evolution of data storage technologies. He also talks about the challenges and solutions in migrating legacy tape data to the cloud,...

Cutting Through Alerts by Optimizing Your Security Operations Center - Silk Security
Yoav Nathaniel, CEO of Silk Security, joins us to discuss the transformative role of AI-driven solutions in cybersecurity risk management. Exploring how to leverage AI to enhance security operations and streamline risk assessment processes. Yoav o...

How Generative AI is Changing the Security Questionnaire Game - Vendict
Udi Cohen, CEO and Co-founder of Vendict explores the groundbreaking impact of generative AI on the security compliance landscape. We dive deep into how this innovative technology is transforming the traditional processes, making the completion of...

Ransomware Resilience: Proven Strategies to Render It Powerless - Calamu
Paul Lewis, CEO of Calamu, goes deep into the evolving landscape of cybersecurity and data protection. He explores cutting-edge strategies for combating ransomware, the role of AI in both offensive and defensive cybersecurity tactics, and the futu...

Ransom Paid: Now, How Do We Catch Cyber Criminals? - Panther Protocol
Anish Mohammed, co-founder and CTO of Panther Protocol delves into the use of cryptocurrency in ransomware and data exfiltration, focusing on the traceability of blockchain transactions and the mechanisms for transaction shielding. We also dive in...

The Pitfalls of Cybersecurity Incident Response - Sygnia
Oren Wortman, VP of Cybersecurity Services, NA at Sygnia shares invaluable insights on the pitfalls of incident response and the importance of preparation. He emphasizes the adversarial mindset, where understanding and simulating potential attacke...

The Rise of Virtual CISO Neighborhood Watch - Health-ISAC
Errol Weiss, Chief Security Officer at Health ISAC dives into cybersecurity, privacy, and data protection discussing the role of CISOs and their responsibilities. We also discuss ransomware attacks and data backup strategies, cybersecurity talent ...

Breaking Down the Hype of Airgap and Immutable Backups - Mr. Backup
We dive deep with W. Curtis Preston, aka Mr. Backup, as we discover the real-world implications, benefits, and truths behind the buzzwords of Airgap and Immutability and learn why they\'re essential in today\'s data protection landscape.

Unmasking the Risks of Your Data Storage - Hostirian
We sit down with Ken Cox, President of Hostirian, to delve deep into the intricacies of data storage. Together, we\'ll unmask the often-overlooked risks and explore best practices to ensure your data remains secure and accessible.

How Ransomware Changed the Cybersecurity Landscape - Recorded Future
We journey through the history of ransomware with Allan Liska from the Computer Security Incident Response Team at Recorded Future. From its early origins to its current impact on infrastructure deployment and disaster recovery, Allan provides a c...

From Chaos to Compliance: Solving the compliance headaches of Microsoft 365 - Hornetsecurity
Andy Syrewicze, a Microsoft MVP and Technical Evangelist at Hornetsecurity delves into the intricate world of Microsoft 365 compliance, discussing the journey \"From Chaos to Compliance.\" Andy sheds light on the challenges posed by the ever-evolv...

Ransomware\'s New Adversary: The Power of Identity Orchestration - Strata Identity
Eric Olden, Co-founder and CEO of Strata Identity, Inc., delves into the evolving identity landscape amidst rapid global changes. Addressing compliance in a multi-cloud world, the necessity of MFA and the innovative approach of Identity Orchestrat...

Restore Speed: Business Maker or Breaker? - Pure Storage
Debjeet Bagchi, Senior Technical Marketing Engineer at Pure Storage, exploring the intricacies of unstructured data management, the critical importance of robust data protection, and the evolving landscape of the storage industry in the age of pub...

Unveiling the True ROI of Legacy vs. Cloud-Native - Emma
Dmitry Panenkov, CEO of Emma has an eye-opening discussion on revolutionizing cloud workloads. Dmitry unpacks the compelling origin story of Emma, describing it as a solution born out of the urgent need for heightened data protection standards in ...

How to Protect Your Backups from Cyberattacks - Alcion
Niraj Tolia, CEO and Co-Founder at Alcion dives deep into the evolving landscape of cyber threats like ransomware, offering insights on how these new risks change the way customers should approach data protection. We also discuss surprising revela...

Where Squid Games, AI, and Data Protection Merge - Lenovo
Robert Daigle, Director, Global AI Business Leader at Lenovo discusses the rapid evolution and democratization of AI, offering insights for IT professionals to navigate this changing landscape. Delving into AI\'s transformative journey, Robert hig...

SaaS Protection Pitfalls: What Existing Solutions Are Missing - Eoghan Casey
Eoghan Casey, VP of Cybersecurity Strategy and Product Development at OwnBackup delves into the intricate world of SaaS security by shedding light on the shortcomings of current data protection solutions. We discuss the gaps in prevalent strategie...

Navigating the CISO Post-Breach Landscape - Colm Keegan
Colm Keegan, Senior Consultant, Product Marketing at Dell Technologies addresses the formidable challenges that organizations face with multicloud integration and the unstoppable surge of data growth. What does zero trust truly signify, why should...

Cloud Commandments: Backup, Recovery, and Security - Storagepipe / Thrive
Steven Rodin, CEO and President at Storagepipe dives into the intricate world of hybrid cloud environments, unraveling the principles and best practices to secure and sustain digital assets. From establishing reliable backups to implementing disas...

Bridging the On-Prem and Cloud Storage Gap - Cloudian
Jon Toor, Chief Marketing Officer at Cloudian where we dissect the benefits of object storage. We delve into navigating the dynamic interplay between cloud and on-premises solutions, and how object storage can be the game-changer for backup enviro...

Plumbing the Depths of Unstructured Data - Superna
Alex Hesterberg, CEO at Superna embarks on a captivating exploration of the expanding world of unstructured data and data security trends. The discussion gets fervid as Alex enlightens us about the amplified use of unstructured data platforms in r...

Ransomware, Resiliency, and Recovery: The Triple R\'s of Data Security - Quorum
Jim Garn, CEO at QuorumLabs, Inc. provides an in-depth perspective on the ongoing ransomware feud, the importance of offensive strategies besides defensive measures, and the weighty implications of the White House\'s recent cybersecurity strategy ...

Data Security\'s Power Couple: Backup and Metadata - GRAU DATA
David Cerf, Chief Data Evangelist at GRAU DATA generously lends us his in-depth knowledge on data protection, tape solutions. Through our conversation, you\'ll learn the significance of a layered approach to data protection, the key steps towards ...

Object Storage vs. Tape Backup: The Ultimate Showdown - OSNEXUS
Steven Umbehocker, Founder and CEO of OSNEXUS takes us on a flavorful journey through the world of data storage as he dishes out his knowledge on the heated debate between object storage and tape backup. We\'ll be stirring the pot on the advantage...

Preserving Privacy in a World of AI - 4FreedomMobile
David Sinclair, Founder and CEO of 4FreedomMobile reveals how his platform is designed to safeguard your privacy and put an end to tracking. We dive deep into the various attack vectors contributing to surveillance and how both Apple and Android d...

The Resilience Roadmap: Exploring Your Assets for a Stronger Tomorrow - runZero
Huxley Barbee, Security Evangelist at runZero shares his valuable insights on various approaches to asset discovery, such as agents, authenticated active scanning, and pulling data from other solutions. We\'ll also touch on the pros and cons of pa...
Backup-as-a-Service: The Unstoppable Ascend - The Futurum Group
Krista Macomber, Senior Analyst, Data Protection and Security at The Futurum Group explores the importance of SaaS Data Protection and the use of API. We also dive into automating disaster recovery processes, implementing multi-factor authenticati...
Unraveling Kubernetes and Data Protection: Rethinking Data Management - TLA Tech B.V.
Joep Piscaer, Independent Industry Analyst at TLA Tech B.V. unravels the complex world of Kubernetes, backup and recovery, and their impact on stateful and stateless applications. He also discusses the state of Kubernetes Data Protection.
Cyber Resilience: Breach, Recover, Improve - acsense
Muli Motola, Co-Founder and CEO at acsense discusses the critical role of identity access management and continuous access in ensuring business continuity. We also explor how to provide resilience to IT systems in the face of emerging security ris...
The Chef\'s Special: Insights from the RSA Conference - Veritas
Dr. Joye Purser, CISSP, Global Lead - Field Cybersecurity at Veritas Technologies dives into her first-hand experience of this leading conference, revealing her discoveries of the latest trends, solutions, and potential challenges in the realm of ...
The AI and Cloud Revolution in Data Protection - DCIG
Jerome Wendt, President and Founder of DCIG discusses the practical applications of artificial intelligence in data protection and optimization. Uncover how AI can be utilized in ransomware detection, data placement, and increase your understandin...
Why Are “Secure” Companies Still Being Hacked? - Mamori
Omar Masri, founder and CEO of Mamori explores the challenges and trends in the ever-evolving world of cybersecurity. Omar reveals the perfect storm created by increased demand for theft, increased vulnerability, and outdated software security, an...
Mastering the Cloud with Zero Trust Architecture - Netsurit
André Kearthland, Solutions Architect at Netsurit explores the importance of implementing cloud services securely and migrating data to public clouds like Microsoft Azure. Emphasizing the significance of a Zero Trust architecture, he sheds light o...
Redefining Cloud Storage: A Deep Dive into Decentralization - Filebase
Zac Cohen, COO and Co-Founder at Filebase dives deep into the benefits of decentralized storage, discussing the crucial role of APIs in the storage industry, data management, and analytics space. We also explore a world without major cloud provide...
Data and Resilience in the AI Age - Arcitecta
Jason Lohrey, Founder and CEO of Arcitecta dives into the world of data management and explore the challenges of managing vast amounts of data. We also discuss the differences between structured and unstructured data, the importance of metadata, a...
The Impact of Third-Party Cybersecurity Risk on Business Continuity - VISO Trust
Paul Valente, co-founder and CEO of VISO Trust discussed the growing importance of knowing your third parties, their control posture, and the data shared with them, as well as the challenges faced by security teams in assessing third parties at sc...

Decrypting Ransomware: The Latest Techniques for Fighting Back - Nubeva
Steve Perkins, Chief Marketing Officer at Nubeva explores how decryption is the fastest path to ransomware recovery, the steps to take when responding to a ransomware attack, and the average time and cost of a ransom.

Closing the SaaS Backup Disconnect - Enterprise Strategy Group
Christophe Bertrand, Practice Director of Data Management and Analytics at Enterprise Strategy Group shares his insights on how companies can close the SaaS backup disconnect and ensure that their data is fully protected.

Ransomware Recovery: Checking Your Data - Index Engines
Jim McGann, VP of Marketing and Business Development at Index Engines educates us on the importance of considering cyber threats as the new disaster and shares his insights on validating your backups to avoid potential data loss.

Navigating the Cloud: Strategies for Improving Your Security Posture - Solvo
Shira Shamban, Co-Founder and CEO at Solvo brings insight on the challenges faced by developers working on-prem and the difficulties faced by cybersecurity teams in putting guardrails in place to increase security posture.

Why it’s Critical to Backup Your Atlassian Jira Data - Revyz | Markforged
Sanket Parlikar, Co-Founder at Revyz and Aaron Geister, Atlassian Administrator at Markforged shares their insights on the challenges, pitfalls, and benefits of backing up and protecting your Atlassian Jira data.

The Collision of Backup, Recovery, and Security - Cohesity
Sanjay Poonen, CEO and President at Cohesity shares his insights on the intersection of Data Protection, Data Management, and Data Security. He also discusses his thoughts on ransomware recovery warranties and insurance and the formation of the Se...

The Evolution of Data Storage: From Disks to Tapes to Objects in the Cloud - OSNEXUS/Seagate Lyve Cloud
Steven Umbehocker, Founder & CEO at OSNEXUS and John Conlin, Territory Manager at Seagate Lyve Cloud discuss the evolution of backup from disk-to-tape to disk-to-object and disk-to-cloud.

Disaster Recovery is not Cyber-Recovery - IDC
Phil Goodwin, Research VP, Infrastructure Software Platforms at IDC discusses the differences between Disaster Recovery and Cyber-Recovery, why data protection and data security are merging, and how DIY efforts are insufficient and unable to keep ...

Do You Need Ransomware Cyber Liability Insurance? - Canauri / CryptoStopper
Greg Edwards, CEO at Canauri ransomware protection formerly known as CryptoStopper discusses how to take a layered security approach, why you need cyber liability insurance, and some of the myths about ransomware that still exist today.

The #1 Way to Increase Your Pay in 2022 - Greenwich.HR
Cary Sparrow, Founder & CEO of Greenwich.HR discusses the current IT hiring trends, the best and fastest way to gain intelligence on daily hiring and pay behaviors, and why the great resignation morphed into the great recycling.

Keys to Accelerate Your AI Journey - KUNGFU.AI
Michael Wharton, Principal Machine Learning Engineer at KUNGFU.AI discusses some of the biggest hurdles to AI adoption today, his view on artificial intelligence and machine learning, and his vision around containers and the role they will play in...

Putting a New Spin on RTO & RPO - Chief Evangelist
David Chapa, Chief Evangelist and Product Strategist discusses the Technical Evangelist role, why we should flip the term backup & recovery, the reason ransomware is here to stay, and his views on Recovery Time and Recovery Point Objectives.

The Cardinal Sin of Backup - IDC
Phil Goodwin, Research VP, Infrastructure Software Platforms at IDC discusses the best way for organizations to harness the value of their data, the role monitoring and alerting plays when keeping data secure and resilient, and the evolution of AI...

The Rise and Dangers of Hardware Hacking - ERI
John Shegerian, Co-Founder, Chairman and CEO of Electronic Recyclers International - ERI discusses his journey through recycling electronic waste for environmental and sustainability reasons, the importance of data protection, insights on hardware...

The Great Resignation IT Playbook - Heller Search Associates
Martha Heller, Executive Recruiter of CIO, CTO, Digital Executives and CEO of Heller Search Associates discusses the Chief Data Officer role and its rising importance during this Great Resignation and some advice for rising data leaders and aspiri...

Modern Problems of Identity Authentication - DeleteMe by Abine
John Gilmore, Head of Research at DeleteMe by Abine discusses why authentication is a problem right now, how big tech has changed consumer behavior in the face of major privacy problems, and how new state level regulations like CCPA and VDPA will ...

How to Liberate Data on Tape Hardware - Tape Ark
Guy Holmes, President and Chief Executive Officer of Tape Ark discusses why organizations are moving data from legacy tape into the cloud, some of the most common types of data moved into the cloud, and other fascinating details about tape that I’...

Secrets to Obtain Value from Industry Analysts - Schaffer AR
Robin Schaffer, Principal AR Consultant at Schaffer AR discusses how you can raise your thinking beyond Analysts being just PR channels, what the most valuable aspects of analyst relations are, and how tech companies can effectively work with anal...

The Current State of Databases - Vettabase
Federico Razzoli, Founder of Vettabase discusses some of the differences between different Open Source databases, a brief history around why databases morphed from traditional to NoSQL, and his opinions on MariaDB, Cassandra, MySQL, PostgreSQL dat...

How to Secure Backups like a CISO - Continuity Software
Doron Pinhaus, CTO of Continuity Software discusses some of the ramifications of hackers gaining control of your storage system, interesting findings from the NIST Guide for Storage Security, and the best way for listeners to be prepared for a cyb...

2022 State of Data Protection and Storage - StorONE
George Crump, Chief Marketing Officer at StorONE discusses the evolution of the Backup and Storage industry, why ransomware protection is key to protecting your data and backup infrastructure, and debunking some of the theories around all-flash ba...

Building Resilient Health through Technology - Plant Jammer
Michael Haase, CEO of Plant Jammer discusses the creation and evolution of Plant Jammer, details about the cloud architecture, the use of artificial Intelligence and Gastronomic algorithms including how to gather actionable insights about your die...

Growing Adoption of Object Storage for Backups - OSNEXUS
Steven Umbehocker, Founder and CEO of OSNEXUS explains why object storage has the scalability required for companies to manage petabytes of backup data, his views on the open-source Ceph technology, and when to use the public cloud object storage ...

The Data Governance Guidebook & Playbook - Radio Systems Corp
Kim Wienzierl, Director of Data at Radio Systems Corp. provides details on how to implement a data governance strategy, some of the challenges of deploying data governance, and how to measure the success of a data governance program.

How to Prevent Salesforce Phishing Attacks - Perception Point
Shlomi Levin, Co-founder and CTO of Perception Point discusses how you can safeguard your organization from cyberattacks like phishing and spoofing and also provides some details around how attackers tried to leverage the Salesforce Mass Email ser...

Protect Yourself Before Entering the Metaverse - humanID
Bastian Purrer and Namik Muduroglu, co-founders of humanID discuss some of the challenges associated with cybersecurity, recommendations on using MFA, zero-trust, immutability, and advice to CIO’s for protecting their data in the cloud.

Gaining Full Control of Your Data Protection - Fortanix
Frank Yoo, Director of WW Sales Engineering at Fortanix gives advice to CIOs and why they should look beyond just protecting the perimeter, details on how to automate your security practices as repeatable processes, and why you should have full co...

The Secret to Keeping Your Secrets Secure - Doppler
Brian Vallelunga, CEO and Founder of Doppler discusses the three layers of the Secrets Management industry, how encryption is used as the vehicle to keep your secrets secure, and why not having a secrets manager can bite you later on.

The Psychological Journey of Data Protection - Arcserve
Ivan Pittaluga, CTO at Arcserve provides his view and details on filesystem theory, why you should understand the metadata of very large filesystems especially Network Accessible Filesystems, and a few nuggets of using tape and immutable storage.

Why implement a multi-layered data protection approach - Arcserve
Shridar Subramanian, Chief Marketing Officer and Head of Product Management at Arcserve discusses his view on the next wave of adoption in the Data Protection industry and why it’s important for CIO’s to lock down a solid disaster recovery plan fo...

Data Erasure: Is your data really gone? - White Canyon Software
Paul Katzoff, the CEO of WhiteCanyon Software discusses some of the challenges facing data security vendors, some tips on how to effectively wipe your corporate hard drives, and a peek into the future of data storage and security.

Hacking the Puzzle of Data Security - SPHERE Technology Solutions
Rita Gurevich, CEO and Founder of SPHERE Technology Solutions drops some valuable gems on developing good data protection habits when moving to the public cloud, the best ways to protect your critical data, and some powerful insights on data gover...

The Recovery Feedback Loop Demystified - Verified Backups
Chris Marshall, President of Verified Backups LLC discusses the criticality of testing your database recovery, making sure the data is encrypted, and the importance of knowing your data is automatically restored and verified on a daily basis.

Protecting High-Performance Data Environments
Noemi Greyzdorf, Data Protection and Marketing expert discusses how to contain the expanding costs of data protection, some ways you can mitigate data protection costs, and the role networking plays in data protection architecture and design.

Overcoming Legacy Thought Patterns with Automation - Morpheus Data
Martez Reed, Director of Technical Marketing at Morpheus Data drops tons of nuggets around the management of disparate architectures and workloads, the tools needed to bring them all together again including details on protecting Kubernetes data, ...

Data Hygiene to Reduce SaaS Attacks - Perception Point
Shlomi Levin, Co-founder and CTO of Perception Point discusses some techniques on how to keep your data safe across multiple platforms whether using containers or other cloud-native approaches and gives key insights on how to keep your SaaS CRM da...

How to Accelerate the Power of Your Backups - Bridgeworks
David Trossell, CEO and CTO of Bridgeworks discusses how you can achieve those RTOs and RPOs that are so critical to your recovery strategy, how to accelerate your backup beyond blazing, and how to keep your data safer in this age of ransomware.

Tips on G Suite Backup & Cloud Migration - RedStor
Ed Renwick, New Partner Acquisition Lead at RedStor discusses why it’s important to protect your data in G Suite, some of the hottest trends in the data management industry, and some tips on the best way to protect or recover from a ransomware att...

How to Achieve Application Resiliency - Appranix
Govind Rangasamy, Founder and CEO of Appranix breaks down what it means for your applications to be truly resilient, some of the key differences between cloud application resiliency, traditional backup and Disaster Recovery, and explains some of h...

The Most Powerful Admins in the Data Center - Druva
W. Curtis Preston, Chief Technical Evangelist at Druva talks about business continuity and the importance of protecting against insider threats, unique ways of protecting all of your data utilizing tried and true methods of backup, and some intere...

Taking Responsibility of Your SaaS Data - Rewind
Dave North, Director, Technical Operations at Rewind provide details on the importance of protecting all types of SaaS data including Shopify, BigCommerce, GitHub, Trello, etc… and why the shared responsibility model is key to understanding and im...

Handling Data Breaches in 2021 - Cybereason
Sam Curry, Chief Security Officer at Cybereason enlightens us on how to keep your organization security aware especially while remote, dropping some gems for Chief Information Security Officers and why security breaches are on the rise in 2021.

Redefining Data Intelligence - BigID
Dimitri Sirota, CEO of BigID provides details on the role that data intelligence plays in data privacy, data protection and also cloud migration. He also shares some tidbits of information around high-profile cyber attacks and how to help you gain...

Relieving Backup Pressures and Cutting Costs - Wasabi and Komprise
David Boland, Prod Marketing Director at Wasabi Technologies and Randy Hopkins, VP Global Systems Engr at Komprise provides details on how to cut your backup & recovery costs whether on-premises or in the cloud and most importantly how they are ta...

Ransomware: Does Paying the Ransom Payoff?
Sam Roguine, Backup, DR and Ransomware Prevention Evangelist formerly at Arcserve reveals some of the tactics that ransomware gangs use to infiltrate your backup environment, how to combat ransomware, and how to quickly recover and regain control ...

Mastering Global Microsoft 365 Protection - CoreView
Doug Hazelman, Senior VP and Chief Evangelist at CoreView discusses how to keep your Microsoft 365 data secure and protected beyond what Microsoft provides out of the box, best practices on security and compliance, and tips on how to more efficien...

Building Automation into Data Protection
Ken Ringdahl, SVP Engineering at Datto discusses the appliance approach to backup vs a software defined approach, the annual state of the channel ransomware report, and the importance of utilizing different types of storage for backup and archive.

White-Label Data Protection as a Service
Stacy Hayes, Co-founder and EVP N. America of Assured Data Protection discusses how to build a successful Backup and Recovery as a Service business, details about White-Label Data Protection-as-a-Service, and why they chose Rubrik as their platfor...

VMware Cloud Disaster Recovery with Datrium
Lee Caswell, VP of Marketing, Cloud Platform Business Unit - CPBU at VMware discusses the Datrium acquisition, his view on containers vs. virtual machines and some details on Project Monterey where he talks about offloading CPUs and using Smart NICs.

Murali Balcha - Kubernetes Backup and Recovery for MultiCloud
Murali Balcha, Founder and CTO of Trilio discusses why he founded Trilio, some principles that are required behind a cloud-native architecture for data protection and data management, and why it’s important to protect Kubernetes data.

Caitlin Halferty – 2021: The Year Digital Transformation Goes Viral
Caitlin Halferty, Director, AI Accelerator and Client Success at IBM Global Chief Data Office discusses the differences between DataOps and DevOps, details on how artificial intelligence is a key component to gathering analytics, and her view of t...

Nitzan Shapira – DevOps: Troubleshoot Less and Fix Issues Faster
Nitzan Shapira, Co-Founder and CEO of Epsagon discusses why microservices and containers are hot, how to analyze trends or spikes automatically, and some other cool ways to troubleshoot and dig through your logs faster with less effort.

Eric Bassier – The Digital Gold Rush: Uncovering the 100-year Archive
Eric Bassier, Sr. Director of Products at Quantum breaks down one of the most exciting topics happening in the Backup/Recovery market right now and that’s the ability to archive data forever and how to recover that data utilizing erasure coding, A...

Sathya Sankaran – How to Build a Data Protection Ecosystem
Sathya Sankaran, Chief Operating Officer at Catalogic Software provides details on the Data Protection market, why the single pane of glass proverb is still relevant, and why building data protection ecosystems are accelerating fast.

Tim Williams – The Analysis of Backup Data to Defeat Ransomware
Tim Williams, Founder and CEO of Index Engines lays out a solid ransomware recovery plan to help your CISO sleep better at night with several steps that include scanning, analytics, analysis, repetition, and investigation.

Gou Rao – How Backup has Changed for Kubernetes
Gou Rao, CTO, Cloud-Native Business Unit, Pure Storage formerly Portworx discusses how the digital transformation is accelerating and why data center workflows are evolving into 1st class application citizens and what’s the best way to protect Kub...

Data Protection Gumbo – Season 2 – Episode 10 – Ayana Miller & Careyann Farrell - Digital Detox with GDPR
Ayana Miller, Founder of Privilgd and Careyann Farrell, Sr Sales Professional discuss how individuals, as well as companies, should be prepared for GDPR and provide tips on next steps.

Data Protection Gumbo – Season 2 - Episode 6 - Sam Curry: Ransomware - Immutability or Airgap your Backups?
Sam Curry - Chief Product and Security Officer of Cybereason discusses the importance of immutability or having an airgap solution for your backups in case ransomware affects your data.

Data Protection Gumbo – Season 2: Episode 5 – Jedidiah Yueh: Getting Deduped - How to Invent a Billion Dollar Data Protection Product
Jedidiah Yueh - Founder / Executive Chairman of Delphix discusses how Avamar deduplication technology was developed into one of the hottest technologies in the data storage and backup industry.

Data Protection Gumbo - Season 2: Episode 1 - The Data Protection Diet
Like a weight loss plan; everyone including consumers need a solid data protection or personal disaster recovery plan. So before you can create a solid personal data protection plan you need to consider going on what I call a Data Protection diet....

Data Protection Gumbo - Season 1: Episode 24 - DATOSiO: Part 2, Why Do You Need to Protect a Distributed Database?
In episode 24, Jeannie Liou, Shalabh Goyal, and Jeff Marinstein discuss how to solve new data management challenges for cloud and big data databases, so that enterprises can confidently deploy and scale their applications without worrying about da...

Data Protection Gumbo - Season 1: Episode 20 - INFINIDAT: InfiniBox, Flash and Beyond!
In episode 20, The Gumbo interviews Steve Kenniston, VP of Product Management to discuss how the InfiniBox eliminates performance, availability and scalability issues to accelerate critical business applications.

Data Protection Gumbo - Season 1: Episode 19 - HPE: How to Spice Up Your Data Protection Environment
In episode 19, Stephen Spellicy and Gagan Bhatia of Hewlett-Packard Enterprises, provide details of HPE\'s Data Protection portfolio and how you can Spice Up your Data Protection environment.
Showing 272 of 300+ episodes
Watch on YouTube
Subscribe to our channel for video episodes and exclusive content
Subscribe on YouTube














































































