Doron Pinhaus, CTO of Continuity Software discusses some of the ramifications of hackers gaining control of your storage system, interesting findings from the NIST Guide for Storage Security, and the best way for listeners to be prepared for a...
Mark Chuang, Head of Product Marketing at VMware discusses the sophistication of ransomware and protection mechanisms, breaking the kill chain, and advice on implementing disaster recovery.
Kashish Gupta, Co-Founder of Hightouch discusses reverse ETL, some reasons for moving data out of a data warehouse, and the critical role that APIs play in the data analytics industry.
Michael Haase, CEO of Plant Jammer discusses the creation and evolution of Plant Jammer, details about the cloud architecture, the use of artificial Intelligence and Gastronomic algorithms including how to gather actionable insights about your diet...
Doug Soltesz, Director of Product Solutions at Storage Made Easy discusses how to protect data in the cloud from ransomware, the role of APIs in data protection, and two kinds of automation.
Kevin Campbell, CEO of Syniti discusses the importance of data in all businesses today, the current state of data management, and some steps business leaders can take to create more mature data management strategies.
Steven Umbehocker, Founder and CEO of OSNEXUS explains why object storage has the scalability required for companies to manage petabytes of backup data, his views on the open-source Ceph technology, and when to use the public cloud object storage vs...
Kim Wienzierl, Director of Data at Radio Systems Corp. provides details on how to implement a data governance strategy, some of the challenges of deploying data governance, and how to measure the success of a data governance program.
Rob Turk, aka the Modern Day Tape Enthusiast provides us with a brief history of the use of tape, who the players are that’s still in the game of the tape industry, and some advice on utilizing tape to combat ransomware.
Shlomi Levin, Co-founder and CTO of Perception Point discusses how you can safeguard your organization from cyberattacks like phishing and spoofing and also provides some details around how attackers tried to leverage the Salesforce Mass Email...