Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Solutions Podcasts

show episodes
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Browsing Security

LayerX Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Artwork

1
Foreign Policy Live

Foreign Policy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
Artwork

1
Philosophize This!

Stephen West

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Beginner friendly if listened to in order! For anyone interested in an educational podcast about philosophy where you don't need to be a graduate-level philosopher to understand it. In chronological order, the thinkers and ideas that forged the world we live in are broken down and explained.
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Artwork

1
Farm Gate

ffinlo Costain

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The regenerative agriculture podcast, in search of practical solutions for ecological security. Produced by 8point9: https://www.8point9.com Farming news, regenerative farming, agroecology, land use, natural capital, land news
  continue reading
 
HawkShield is a Singapore-based, data and network security provider. We offer AI-powered data security and privacy services to companies of different sizes and industries. Contact us today. https://www.hawkshield.ai/
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Talking Security is your go-to podcast for everything related to Microsoft Security and DevSecOps. Hosted by Frans Oudendorp and Pouyan Khabazi, we dive deep into topics like Microsoft Defender, Entra, Intune, Zero Trust, identity protection, security automation, and secure development practices. In each episode, we engage with Microsoft MVPs, product team members, and security experts to explore real-world challenges, practical solutions, and the latest innovations across the Microsoft Secu ...
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Artwork

1
We Chat Divorce Podcast

My Divorce Solution

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
WeChat Divorce, The #1 Podcast for Financial Divorce Preparation Tips and Strategies Bringing expert financial insights, stories, and tools to empower your divorce journey. Hosted by Karen Chellew and Catherine Shanahan, founders of My Divorce Solution, we help listeners take the power back by turning the fear into focus, the focus into knowledge, and the knowledge into power. My Divorce Solution
  continue reading
 
Artwork
 
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we’re proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we’re pleased to share the talent and perspective of our staff as it relates to today’s emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
  continue reading
 
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
  continue reading
 
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Artwork
 
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
  continue reading
 
Artwork

1
AWS Podcast

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
  continue reading
 
Ken Tumolo and his son Nick Tumolo join you on the Tumolo Financial Radio to offer solutions and strategies for your retirement needs. With decades of financial experience, Ken and Nick offer tax recommendations, Social Security maximization, wealth management, retirement income planning and much more.
  continue reading
 
Artwork
 
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
The IQT Podcast explores and offers insight about rapidly evolving technology trends and their impact and contributions to national security. Subscribe to hear from IQT and other thought leaders across a variety of tech domains, including AI and machine learning, biotechnology, autonomous systems, and more. IQT identifies, adapts, and delivers technology solutions from commercial startups to support the national security missions of the U.S. and its allies. Learn more at www.iqt.org.
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork

1
Retirement Solutions - The Podcast

Tyson Thacker and Ryan Thacker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Retirement Solutions – The Podcast, with Tyson Thacker and Ryan Thacker, where precision meets purpose. This B.O.S.S. podcast is committed to “Building the Optimal System of Security.” Learn how you could craft the ideal retirement blueprint that surpasses mere wealth accumulation. Explore the nuances of retirement planning with expert insights, as Tyson and Ryan navigate the ever-evolving landscape of investments, insurance solutions, and financial planning for retirees and pre-r ...
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
CollisionCast

FenderBender

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CollisionCast is the premier collision repair industry podcast, helping shop owners and operators improve their businesses with real-world solutions to common problems, delivered by leading industry experts and elite shop leaders.
  continue reading
 
Gregg MacInnis, Owner and President of Gmac Family Financial, joins you on Countdown to Retirement to offer up innovative financial strategies, solutions, security, and overall financial health. Listen as Gregg talks about his passion to serve his community and break down financial planning for your retirement.
  continue reading
 
Artwork

1
CloudNext

GlobalDots

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CloudNext is your go-to source for cloud innovation and leaders' insight. Your way to stay up-to-date with the latest trends and innovations critical to Cloud, Security, and DevOps success. Pick the brains of C-level executives of renowned companies in tech, sharing their stories of innovation and personal growth. Explore their transformative insights as they fuse personal narratives with strategic advice, revealing how to achieve technological solutions for the challenges & pain points in t ...
  continue reading
 
Loading …
show series
 
ePlus Security + F5 API Security Podcast Series where ePlus’ David Tumlin and F5’s Chuck Herrin share why visibility is the foundation of modern security—and how together, ePlus & F5 are helping organizations manage the real challenges of API security in today’s hybrid, multi-cloud world.By David Tumlin, ePlus and Chuck Herrin, F5
  continue reading
 
Star Link Communication is revolutionizing workforce management by offering AI-powered facial recognition systems to eliminate proxy attendance and ensure data accuracy. To support a smooth upgrade from outdated fingerprint systems, the company provides buyback options. Responding to client feedback, Star Link has enhanced device durability with re…
  continue reading
 
Boost AWS Security: Remove Default Outbound Rules from Security Groups https://schedule.businesscompassllc.com/ When securing your cloud infrastructure on AWS, many developers and security teams overlook one subtle but impactful setting: the default outbound rules in AWS Security Groups. These rules, which allow all outbound traffic by default, can…
  continue reading
 
Designing High-Availability Architectures: Load Balancing Strategies in AWS https://schedule.businesscompassllc.com/ In today's always-on digital world, ensuring that applications are available, responsive, and scalable under variable traffic loads is critical. High Availability (HA) isn't just a buzzword—it's a requirement for modern cloud-native …
  continue reading
 
CDK for Terraform: Modules vs Constructs — What's the Difference? https://schedule.businesscompassllc.com/ Infrastructure as Code (IaC) has become critical to modern cloud development. CDK for Terraform (CDKTF) combines the power of Terraform's mature provisioning engine with the expressiveness of programming languages such as TypeScript, Python, a…
  continue reading
 
Cross-Account Networking in AWS: Share VPC Prefix Lists Using RAM and Organizations https://schedule.businesscompassllc.com/ In modern cloud architectures, efficient and secure network configuration across multiple AWS accounts is essential. One common scenario is sharing Amazon Virtual Private Cloud (VPC) resources—particularly prefix lists—to sta…
  continue reading
 
Deploying to AWS Lambda: ZIP Files vs. Containers Explained https://schedule.businesscompassllc.com/ AWS Lambda has revolutionized serverless computing by abstracting away server management and offering scalable execution environments for your code. When deploying functions to Lambda, you have two primary packaging formats: ZIP archives and contain…
  continue reading
 
How to Use AWS WAF with Reactive Infrastructure for Cost-Effective Threat Blocking https://schedule.businesscompassllc.com/ Organizations need innovative, scalable, and budget-friendly security mechanisms as cyber threats increase in frequency and sophistication. AWS Web Application Firewall (WAF) provides robust protections against common attack v…
  continue reading
 
Authorization Demystified: Best Practice #3 for Securing REST APIs with API Gateway https://schedule.businesscompassllc.com/ Securing REST APIs is foundational in building modern, scalable, and secure applications. When paired with strong authorization practices, Amazon API Gateway becomes a robust tool for protecting your backend services from una…
  continue reading
 
AWS Anti-Patterns: Mistakes That Could Break Your Cloud Project https://schedule.businesscompassllc.com/ Cloud computing offers unparalleled agility, scalability, and innovation—but only if used correctly. AWS provides a robust ecosystem, but misuse or neglect of best practices can lead to cost overruns, security breaches, or architectural nightmar…
  continue reading
 
Advanced AWS Networking: Inter-Regional Routing with Private NATs and Transit Gateway https://schedule.businesscompassllc.com/ As organizations grow and adapt multi-region cloud strategies, enabling secure and efficient inter-regional communication becomes essential. To facilitate this, AWS provides powerful networking components like Transit Gatew…
  continue reading
 
Automating Security in AWS Pipelines with Shift Left Methodology https://schedule.businesscompassllc.com/ In today's fast-paced DevOps environments, integrating security earlier in the development lifecycle is not a luxury—it’s a necessity. The traditional approach of treating security as a final checkpoint before deployment is increasingly being r…
  continue reading
 
Headphones that listen to you? Modern listening devices are a two-way street and bad guys are driving the wrong way on it. We’ll tell you how to stop them. Also, a security bother with Brother printers - one they cannot fix. We’ll tell you how to protect against it. And AT&T has a new security protection and some great messaging for its customers. …
  continue reading
 
In this episode, Brad Bussie and field CISO Mark Aksel explore how AI is transforming manufacturing, from predictive maintenance to advanced supply chain strategies. They break down the real impacts of tariffs and share how companies can future-proof operations with smarter AI-driven decisions. ## Topics Covered * Using AI for predictive maintenanc…
  continue reading
 
As today’s vehicles evolve into software-defined data hubs, concerns over national security have extended deep into automotive supply chains. In this episode of Cars, Hackers, and Cyber Security, we unpack the U.S. government’s sweeping new ban on connected vehicle systems originating from China and Russia-and what it means for automakers, supplier…
  continue reading
 
MSP’s Guide to AWS Cost Optimization for Enterprise Clients https://schedule.businesscompassllc.com/ As enterprises scale their cloud infrastructure, managing and optimizing AWS costs becomes critical. Managed Service Providers (MSPs) are vital in helping organizations identify inefficiencies, implement savings strategies, and build a cost-aware cl…
  continue reading
 
Cyber attackers are increasingly targeting the very tools developers trust—integrated development environments (IDEs), low-code platforms, and public code repositories. In this episode of Threat Vector, host David Moulton speaks with Daniel Frank and Tom Fakterman from Palo Alto Networks' threat research team. They uncover how nation-state actors a…
  continue reading
 
AWS Cross-Zone Load Balancing: What It Is and How It Works https://schedule.businesscompassllc.com/ As cloud-native applications scale across multiple Availability Zones (AZs), efficient traffic distribution becomes critical for performance and resilience. AWS Cross-Zone Load Balancing plays a vital role in achieving this balance, especially for ap…
  continue reading
 
Ground-Up Cloud Automation: Building with Terraform https://schedule.businesscompassllc.com/ In today’s fast-paced digital landscape, automating cloud infrastructure is no longer a luxury—it's a necessity. Whether you're a startup scaling quickly or an enterprise migrating to the cloud, manual provisioning is error-prone and inefficient. This is wh…
  continue reading
 
Simplifying AWS Permissions for EKS: Comparing Pod Identity and IRSA https://schedule.businesscompassllc.com/ Amazon Elastic Kubernetes Service (EKS) is a powerful tool for orchestrating containerized applications in the cloud, but securely granting IAM permissions to pods has long been a nuanced challenge. Historically, IAM Roles for Service Accou…
  continue reading
 
AWS S3 Security Deep Dive: Protecting Data Integrity Beyond Visibility https://schedule.businesscompassllc.com/ Amazon S3 (Simple Storage Service) is the backbone of many cloud-native applications and enterprise data architectures. While visibility into access patterns and configurations is critical, proper data protection goes beyond dashboards an…
  continue reading
 
Secure Your Cloud Workloads with Amazon Inspector: Everything You Need to Know https://schedule.businesscompassllc.com/ As cloud infrastructure becomes increasingly complex and vital to business operations, ensuring security is non-negotiable. Enter Amazon Inspector, an automated vulnerability management service that helps you continually monitor t…
  continue reading
 
How AWS Global Accelerator Enhances Application Uptime and Performance https://schedule.businesscompassllc.com/ In today’s global digital ecosystem, ensuring high availability and low latency for your applications is critical. AWS Global Accelerator is a powerful networking service designed to enhance application performance, availability, and resi…
  continue reading
 
Seamless ECS Deployment: Launch Your App with Amazon ECS Today https://schedule.businesscompassllc.com/ Deploying modern applications in the cloud has never been easier. With Amazon ECS (Elastic Container Service), you can launch and manage containerized applications with high performance, scalability, and minimal overhead. Whether you're a seasone…
  continue reading
 
Making the Most of AWS VPC Endpoints: Smart Cost-Saving Strategies https://schedule.businesscompassllc.com/ Amazon Virtual Private Cloud (VPC) Endpoints offer a secure and scalable way to connect your VPC to AWS services without traversing the public internet. They eliminate the need for internet gateways, NAT devices, or VPN connections, providing…
  continue reading
 
AWS SNS vs SQS: The Dynamic Duo Developers Need to Know About https://schedule.businesscompassllc.com/ When building distributed systems on AWS, two messaging services often emerge as key players: Amazon Simple Notification Service (SNS) and Amazon Simple Queue Service (SQS). While both are designed to decouple and scale microservices, their use ca…
  continue reading
 
Today's tense geopolitical landscape, coupled with the silos of social media, has made it easier than ever for people to not only become radicalized but to make violent moves in service of their views—sometimes to widespread acclaim online. As high-profile assassination attempts—successful or otherwise—continue to dominate U.S. headlines, many exec…
  continue reading
 
In this episode of Talking Security – MVP Security Insights, Frans Oudendorp and Pouyan Khabazi sit down with Eric Woodruff—Chief Identity Architect at Semperis and long-time identity expert—to explore his journey from managing Active Directory in the public sector to shaping cutting-edge identity strategies in the cloud era. Eric shares what it me…
  continue reading
 
Journalist Edward Luce is the author of a new biography on President Jimmy Carter’s national security advisor Zbig: The Life of Zbigniew Brzezinski, America’s Great Power Prophet. He joins FP Live to share how this grand strategist’s legacy still shapes foreign policy today. Theodore Bunzel: Where Have All the Geostrategists Gone? Learn more about …
  continue reading
 
Should you take the lump sum or stick with monthly support payments? In this episode, Catherine and Karen unpack one of the most misunderstood yet consequential decisions in divorce: alimony buyouts. Together, they demystify how these lump sum payments are calculated, who truly benefits, and what hidden pitfalls can jeopardize your financial future…
  continue reading
 
Amazon EKS Hybrid Nodes Explained: Connect Your On-Prem Infrastructure to the Cloud https://schedule.businesscompassllc.com/ As organizations embrace hybrid cloud strategies, the demand for seamless integration between on-premises infrastructure and the cloud continues to grow. Amazon Elastic Kubernetes Service (EKS) Hybrid Nodes offer a powerful s…
  continue reading
 
Unleashing AI with Amazon Bedrock: A Practical Guide for Developers https://schedule.businesscompassllc.com/ Artificial Intelligence (AI) transforms how developers build, scale, and deploy modern applications. With the launch of Amazon Bedrock, AWS has democratized access to foundation models (FMs) from leading AI providers like Anthropic, AI21 Lab…
  continue reading
 
Fixing Terraform IAM Roles After managed_policy_arns Deprecation https://schedule.businesscompassllc.com/ As of recent updates in the Terraform AWS Provider, the widely used managed_policy_arns argument in the aws_iam_role resource is officially deprecated. This change has affected many infrastructure-as-code workflows, requiring teams to refactor …
  continue reading
 
AWS Config at Scale: Enforcing Compliance Across Organizations with CloudFormation Lambda Hooks https://schedule.businesscompassllc.com/ In modern enterprises, cloud infrastructure grows rapidly, often across multiple AWS accounts and regions. With this growth comes the challenge of maintaining compliance with internal governance and industry regul…
  continue reading
 
Beyond Basics: Advanced DynamoDB Single Table Design Strategies https://schedule.businesscompassllc.com/ Amazon DynamoDB is a robust NoSQL database that supports key-value and document data models, making it ideal for serverless and event-driven architectures. While many developers are familiar with basic DynamoDB features, mastery truly begins wit…
  continue reading
 
Maximize EKS Efficiency: Dynamic Kubernetes Scaling with Karpenter https://schedule.businesscompassllc.com/ Amazon Elastic Kubernetes Service (EKS) empowers teams to run Kubernetes workloads efficiently. However, managing infrastructure cost and performance at scale remains a challenge. Enter Karpenter, an open-source, high-performance Kubernetes a…
  continue reading
 
CI/CD at Scale: Deploying Jenkins on AWS with Terraform Automation https://schedule.businesscompassllc.com/ In today’s fast-paced DevOps landscape, Continuous Integration and Continuous Deployment (CI/CD) are essential for delivering quality software efficiently and reliably. Jenkins, one of the most popular open-source CI/CD tools, becomes even mo…
  continue reading
 
Hardening AWS Network Security with VPC Firewalls and Endpoints: A Complete Guide https://schedule.businesscompassllc.com/ In today’s cloud-driven world, ensuring robust network security in your AWS infrastructure is not just recommended—it's essential. Virtual Private Clouds (VPCs) provide powerful tools such as VPC Firewalls and VPC Endpoints tha…
  continue reading
 
Monitoring EC2 Health and SSM Status with AWS Lambda and EventBridge: A Step-by-Step Guide https://schedule.businesscompassllc.com/ Ensuring your Amazon EC2 instances are healthy and reachable is vital for infrastructure stability and application uptime. In this podcast, we’ll walk through how to monitor EC2 instance health and AWS Systems Manager …
  continue reading
 
AWS at Scale: Key Takeaways from Managing a Multi-Million Dollar Data Architecture https://schedule.businesscompassllc.com/ As businesses grow, so do their data needs. Managing a multi-million dollar data architecture on AWS (Amazon Web Services) demands a high level of strategy, engineering discipline, cost control, and architectural foresight. Th…
  continue reading
 
Welcome to Reimagining Cyber! In this episode, Tyler Moffitt (Senior Security Strategist, OpenText) , dissects one of the hottest—and most misunderstood—topics in tech: the AI bubble in cybersecurity. Is AI revolutionizing threat detection and response, or are we falling for another overhyped tech trend? Tyler draws parallels to the blockchain fren…
  continue reading
 
Most security teams chase alerts. Liran’s team builds systems. Playtika’s CISO, Liran Sheinbox, reveals how automation with a developer mindset helped reduce MTTR to seconds, even with a lean team. He shares how real design partnerships build trust, why AI is no longer “just a feature,” and how working with startups can drive innovation and retain …
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is Anne Marie Zettlemoyer, former vp of security, Activision Blizzard. In this episode SOC automat…
  continue reading
 
Welcome to the IQT Podcast. In this episode of "IQT Explains," we explore asymmetric deterrence — a strategic approach in modern defense that emphasizes quantity, innovation, and resilience over traditional firepower, led by our host, Kevin Schaeffer. Joining him are Kevin Wepasnick, a senior technology architect and drone systems enthusiast, and S…
  continue reading
 
What do speeding tickets and stock market risk have in common? In this episode, the Tumolo family uses real-life stories—from race cars to retirement regrets—to explain why taking your foot off the gas is essential as you approach retirement. They share how reallocating investments, managing risk, and planning for income can help you weather downtu…
  continue reading
 
Streaming Data to Snowflake: Load from AWS S3 with Snowpipe and CDC https://schedule.businesscompassllc.com/ Modern data architectures thrive on real-time insights, and organizations increasingly need seamless ways to stream data efficiently. With its robust integration capabilities, Snowflake offers a powerful mechanism to load streaming data usin…
  continue reading
 
What is AWS Glue? A Complete Introduction to Amazon’s Serverless ETL Tool https://schedule.businesscompassllc.com/ As businesses generate more data than ever, practical, scalable data integration tools become critical. Enter AWS Glue — a fully managed, serverless ETL (Extract, Transform, Load) service designed to prepare and transform data for anal…
  continue reading
 
FinOps on AWS: A Smart Strategy to Cut Cloud Costs and Boost ROI https://schedule.businesscompassllc.com/ Cloud computing has revolutionized how businesses operate, but with great flexibility comes the challenge of managing and optimizing costs. As AWS continues to dominate the cloud landscape, organizations are turning to FinOps (Financial Operati…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play