Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Zero Trust Architecture Podcasts

show episodes
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
The TOF® Biosphere is a privacy focused platform. It accommodates real-world, event driven accounting in DLT and location free use of fiat or cryptocurrencies during legally compliant contractual based engagements. Users define and exchange on their own, trusted terms.
  continue reading
 
Your source for wide-ranging discussions from all around the Go community. Panelists include Mat Ryer, Jon Calhoun, Natalie Pistunovich, Johnny Boursiquot, Angelica Hill, Kris Brandow, and Ian Lopshire. We discuss cloud infrastructure, distributed systems, microservices, Kubernetes, Docker... oh and also Go! Some people search for GoTime or GoTimeFM and can't find the show, so now the strings GoTime and GoTimeFM are in our description too.
  continue reading
 
Host David Brossard discusses the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award ...
  continue reading
 
Artwork

1
Authority Partners Podcast

Authority Partners

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
OK, everyone knows that #APKnowsIT. Our global team of 500+ geeks, who work globally on five continents, across 30+ countries, are #CreatingExcellence every day. We want to share our excellence with the IT community. We aim to educate, inspire, and motivate IT, professionals, worldwide. Disclaimer: The views expressed in the podcasts are the speaker’s own and do not reflect the view of Authority Partners. ® AP 1998 - 2023
  continue reading
 
Loading …
show series
 
[email protected] Cloud perimeters are fading, identities are multiplying, and threats move faster than patches. We dive into the real mechanics of securing a hybrid world—mapping cloud deployment choices, clarifying shared responsibility across SaaS, PaaS, and IaaS, and showing how Zero Trust reshapes defenses around identity, posture, and c…
  continue reading
 
[email protected] Storage didn’t just get bigger; it got personal. We rewind to the late ’90s and early 2000s to unpack the clash between Iomega’s Zip drive and the laser-lit world of the CD—two formats that taught a generation how to back up, carry, and truly own their data. From the pain of 30‑floppy installs to the thrill of dropping a 700…
  continue reading
 
[email protected] Dive deep into the essential building blocks of secure enterprise networks with Professor J. Rod in this comprehensive exploration of network architecture, security appliances, and remote access solutions. What makes a truly secure organizational network? It's more than just firewalls and fancy equipment—it's thoughtful desi…
  continue reading
 
[email protected] What if the real cause of your random reboots isn’t the GPU at all—but the power plan behind it? We take you end to end through a stability-first build, starting with the underrated hero of every system: clean, properly sized power. You’ll learn how to calculate wattage with 25–30% headroom, navigate 80 Plus efficiency tiers…
  continue reading
 
[email protected] Remember that satisfying click of inserting a floppy disk? The nerve-wracking moments waiting for your term paper to save? The frustration of "Please insert disk 5 of 12" during game installations? Join Professor J-Rod on a nostalgic yet informative deep dive into the technology that defined personal computing for two decade…
  continue reading
 
[email protected] Ever wonder what happens behind the scenes when you tap "Login" on your favorite app? Authentication is the invisible guardian standing between your personal data and potential attackers, and it's more sophisticated than you might think. Authentication systems rely on three critical principles: Confidentiality keeps your cre…
  continue reading
 
[email protected] The digital world seems like magic to many, but behind every functioning computer is a complex system of hardware components and methodical troubleshooting approaches. In this comprehensive episode, we pull back the curtain on what makes IT specialists effective problem-solvers and explore the physical heart of computing sys…
  continue reading
 
Markus Viitamäki, Senior Infrastructure Architect at Embark Studios is back on the podcast. In this episode, he and Mattias Fridström discuss Markus’ previous engagement in the world’s largest gaming festival DreamHack, when to establish local gaming sites to meet customer needs (and what the requirements are), DDoS attacks in the gaming industry, …
  continue reading
 
[email protected] Cryptology isn't just theory—it's the invisible shield protecting your every digital move. This second installment of our cryptology deep dive moves beyond the fundamentals to reveal how these powerful tools operate in real-world systems that safeguard our digital lives. Digital signatures stand as one of cryptology's most p…
  continue reading
 
[email protected] Have you ever wondered what invisible force protects your private messages, banking details, and personal information as they travel across the internet? The answer lies in cryptology—the fascinating science of securing information through mathematical techniques. Cryptology forms the backbone of modern cybersecurity, addres…
  continue reading
 
[email protected] Step back in time with Professor JRod as we uncover the remarkable story of the 8-inch floppy disk – the groundbreaking invention that forever changed how we store and transport digital information. Before cloud storage, before USB drives, even before the familiar 3.5-inch diskettes of the 1990s, there was the original 8-inc…
  continue reading
 
[email protected] Cybersecurity isn't just about firewalls and antivirus software—it's about understanding the complex interplay between technical systems and human psychology. In this continuation of our Security+ series, we explore the multifaceted world of attack surfaces, threat vectors, and social engineering techniques that cybercrimina…
  continue reading
 
[email protected] Dive deep into the world of cybersecurity threat actors with Professor J-Rod as we unpack the essential definitions from Chapter 2 of the Security+ 701 certification exam. This knowledge-packed episode breaks down the critical foundation of information security risk management through clear, actionable explanations. We start…
  continue reading
 
[email protected] Diving into the foundations of cybersecurity certification, Professor JRod delivers an insightful exploration of CompTIA Security+ Chapter 1, revealing why this certification might actually be more approachable than many believe. Unlike many entry-level IT courses, Security+ builds upon concepts from A+ and Network+, creatin…
  continue reading
 
[email protected] Professor JRod makes a triumphant return to Technology Tap after a year-long hiatus, bringing listeners up to speed on his personal journey and diving straight into Security Plus 701 fundamentals. Having completed his doctorate and subsequently focusing on his health—resulting in an impressive 50-pound weight loss—he reconne…
  continue reading
 
David and Emme welcome Mark Fussell (Co-founder of Dapr and the CEO of Diagrid) on this episode of Dynamically Speaking! The group dives into the origin story of Dapr, how it fits into the cloud-native ecosystem, and why it matters for developers building modern, distributed applications. They also touch on Dapr’s relationship with CNCF, open stand…
  continue reading
 
Misha Kuperman, Chief Reliability Officer at Zscaler is back on the podcast. In this episode he and Mattias Fridström discuss if the recent trade tariffs will impact services from Zscaler, whether people in general understand cloud connectivity, if security in the cloud is just a waste of bandwidth resources, what customers know about the public in…
  continue reading
 
Emme and David welcome Roland Baum (Founder, umbrella.associates GmbH) and Gerry Gebel (VP Product & Standards, Strata Identity), live from Identiverse25 in Las Vegas! The gang talks about this year's event and the hot topics and panel sessions, what vendors are saying, and what they are seeing in the market. In this episode: Hot topics at Identive…
  continue reading
 
In this episode, Misha Kuperman, Chief Reliability Officer at Zscaler joins the podcast to discuss the past and recent developments in enterprise networking, whether the current geopolitical situation has had any impact on the way enterprises think about security, what’s behind the ‘zero trust’ concept and how this works in real life.…
  continue reading
 
David and Emme are joined by Mark Berg, Principal Architect at Axiomatics, for a hands-on episode of Dynamically Speaking! In this special installment, the trio dives into the practical side of policy creation using Abbreviated Language for Authorization (ALFA). Whether you're new to ALFA or looking to sharpen your skills, this episode offers a vis…
  continue reading
 
Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
  continue reading
 
Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
  continue reading
 
40% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
  continue reading
 
287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
  continue reading
 
David and Emme welcome Jacob Ideskog (CTO, Curity) on this special episode of Dynamically Speaking! The gang talks about how Axiomatics and Curity work together, Neo-Security Architecture, and what people can expect at our upcoming joint event on March 26th in London. In this episode: What is Neo-Security Architecture? Why is API security so import…
  continue reading
 
Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
  continue reading
 
60% of small businesses close within six months of a cyberattack. Cyber threats are evolving, and small to mid-sized businesses are becoming prime targets. Traditional security solutions—like standalone antivirus and firewalls—leave dangerous gaps that attackers exploit. Businesses need a proactive, unified approach to threat detection and response…
  continue reading
 
David & Emme look ahead to the Gartner IAM summit in London comparing it with the past agenda from the summit in North America. They look into insights around authorization that came out of the summit in Dallas and what they expect to see over in Europe. In this episode, they cover: Authorization insights from the Gartner IAM Summit in North Americ…
  continue reading
 
Ready for SaaS security without the complexity? Managing SaaS security is becoming one of the biggest challenges for IT teams. With employees using apps like Salesforce, Dropbox, and countless others, businesses struggle to keep access secure without adding friction to everyday workflows. Legacy security approaches—like VPNs and standalone logins—f…
  continue reading
 
Are You Ready to Scale Securely? For mid-market businesses, staying secure while growing your IT infrastructure is no easy task. Legacy solutions like VPNs can leave your network vulnerable, while the costs and complexity of piecing together security tools can overwhelm even the best IT teams. What’s the solution? Network as a Service (SASE)—a clou…
  continue reading
 
Eric Löwgren, Head of Network at data center provider GleSYS, is back on the podcast. This time, he and Mattias Fridström discuss physical and cyber security in data centers, optimizing sustainability through measures such as heat recovery (and getting customers to pay a premium for sustainability), increasing the understanding of network architect…
  continue reading
 
Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
  continue reading
 
In this inaugural episode of Perimeter Perspective, we introduce the podcast, its mission, and the value it brings to IT leaders, business owners, and tech enthusiasts. Learn what Perimeter Perspective is all about, the topics we’ll cover, and why cybersecurity and IT innovation are more critical than ever. Whether you're navigating zero trust arch…
  continue reading
 
Mat gathers the entire cast (sans Natalie, sadly) alongside our producer, Jerod Santo, for one last Go Time. That’s right, this is Go Time’s finale episode. After eight years and 340 episodes, we are going out on top. Join us one last time, you won’t regret it! We share our feelings, reminisce on the good times, list some of our favorite moments & …
  continue reading
 
Eric Löwgren, Head of Network at data center provider GleSYS, joins the podcast for a discussion on what impacts the selection of where to put a data center, the trend of moving things out of the cloud, AI driving power density and connectivity demands, and attracting ‘lead guitar’ talent to the data center industry.…
  continue reading
 
With so many great programming languages having emerged in the last decade, many of them purpose-built, when and where does Go still make sense and how do you make the case for it at work? Join the discussion Changelog++ members save 8 minutes on this episode because they made the ads disappear. Join today! Sponsors: Timescale – Purpose-built perfo…
  continue reading
 
David and Emme take a deep dive into the must attend sessions at Gartner IAM in Grapevine, Texas that relate to authorization. We can’t wait to see you there! In this episode: Look at sessions relating to authorization at Gartner IAM Texas Look ahead to AuthZEN working group’s interops at Gartner IAM London And more! Learn more Authorization Agenda…
  continue reading
 
Go Time producer, Jerod Santo, ranks & reviews the most (un)popular opinions of 2023. Join the discussion Changelog++ members save 9 minutes on this episode because they made the ads disappear. Join today! Sponsors: Fly.io – The home of Changelog.com — Deploy your apps close to your users — global Anycast load-balancing, zero-configuration private …
  continue reading
 
With the number of libraries available to Go developers these days, you’d think building a CLI app was now a trivial matter. But like many things in software development, it depends. In this episode, we explore the challenges that arose during one team’s journey towards a production-ready CLI. Join the discussion Changelog++ members save 9 minutes …
  continue reading
 
Writing a shell is rarely the kind of project you take on lightly. In this episode, Johnny is joined by Qi Xiao to explore how to go about such a feat in Go. Join the discussion Changelog++ members save 9 minutes on this episode because they made the ads disappear. Join today! Sponsors: Fly.io – The home of Changelog.com — Deploy your apps close to…
  continue reading
 
Yasir Ekinci joins Johnny & Mat to talk about how virtually every Observability vendor is rushing to add Generative AI capabilities to their products and what that entails from both a development and usability perspective. Join the discussion Changelog++ members save 10 minutes on this episode because they made the ads disappear. Join today! Sponso…
  continue reading
 
Robert Maher, CTO of Infinera, joins the podcast to talk about how the optical business has developed during the last 20 years, the strive for constant innovation, openness and disaggregation in the telecoms space, the impact of AI in areas such as self-provisioning, and hyperscalers building their own gear.…
  continue reading
 
The last time we did a roundup of our unpopular opinion polls, it was November of 2021! That’s too long ago, so today we fix that bug. Join Go Time producer, Jerod Santo, as he ranks & reviews the most (un)popular opinions of 2022. Join the discussion Changelog++ members save 9 minutes on this episode because they made the ads disappear. Join today…
  continue reading
 
In this episode, we will be talking to Russ Cox, who joined the Go team at Google in 2008 and has been the Go project tech lead since 2012, about stepping back & handing over the reins to Austin Clements, who will also join us! We also have Cherry Mui, who is stepping into Austin’s previous role as tech lead of the “Go core”. Join the discussion Ch…
  continue reading
 
Tech twitter (“tech X”?) is abuzz with Paul Graham’s Founder Mode essay. How does that affect you or come into play when you’re not a founder? Does it matter at all to you, your projects & your code? Join the discussion Changelog++ members save 9 minutes on this episode because they made the ads disappear. Join today! Sponsors: Coder.com – Instantl…
  continue reading
 
In this follow-up to episode #306, “How soon until AI takes my job?”, the gang of (grumpy?) veteran software engineers candidly chat about how their day to day is changing in the midst of improving AI tooling & hype. Join the discussion Changelog++ members save 11 minutes on this episode because they made the ads disappear. Join today! Sponsors: Co…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play