Podcasts
Google Extends Reach of AI Coding Tools to Third-Party DevOps Platforms
Google today previewed a set of extensions to its artificial intelligence (AI) coding tools that are designed to be integrated directly within a development environment ...
How to Craft a Cloud Testing Strategy
Before crafting a cloud testing strategy, you should determine the top strategies, and testing goals, and devise a plan accordingly ...
How an Effective AppSec Program Shifts Your Teams From Fixing to Building
Development teams are under growing pressure to build cutting-edge applications with shorter development lifecycles. However, they are often slowed down by the growing burden of fixing security vulnerabilities. Ineffective application security processes ...
Automating Security with Palo Alto
Today, automation is more important than ever before. Integrating security and automation early into the SDLC decreases the risk of potential cyberattacks, provides early and relevant feedback, reduces time to market and ...
Managing Cloud Security with Check Point Software
Managing cloud security across multiple cloud providers, private cloud, AppSec and software as infrastructure, is highly complex. In this TechStrong TV episode, TJ Gonen, head of cloud security product line at Check ...
Data Needs and Challenges with CData
The data businesses and applications need are everywhere and access through a multitude of technical interfaces, including APIs, database queries, data layers like ODBC, cloud services and SaaS applications (to name a ...
DevOps Chat: Maximizing the Benefits of DevSecOps
When discussing security in DevOps, we often focus on the security tools instead of the DevSecOps process itself. In this DevOps Chat, ZeroNorth CEO John Worrall takes us to the root of ...
Web Isolation and Secure Web Gateways with Menlo Security
Since the COVID-19 outbreak, many enterprises have implemented remote work policies to monitor network traffic and protect sensitive data. Organizations have been adjusting and adopting new practices and technologies to improve data ...
Application Security and Continuous Observability with DeepFactor
Today's modern applications are becoming increasingly complex and released more frequently than ever before, therefore increasing security, privacy and compliance risks. How do you identify the security and compliance risks hidden in ...
Approaching Security as a Fundamental Element of Software Development
How we really integrate security into the SDLC? What are some of the best practices around secure software? In this episode of TechStrong TV, Jill Britton, director of compliance, and Stuart Foster, ...
The Use of Open Source in Mainframe Environments
Open source is a critical element of IT computing. As companies modernize the mainframe and start to add components to mainframe applications that are off the mainframe, they should to be able ...
Managing Data Risk in 2021
You can't protect your data if you don't know where it is stored. The first thing to consider when creating a risk-based approach to data protection is the ability to identify and ...