<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/1910572.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Ink8r (in·​cu·​ba·​tor) Podcast</title>

  <lastBuildDate>Fri, 24 Apr 2026 14:30:24 -0400</lastBuildDate>
  <link>https://www.ink8r.com/</link>
  <language>en-us</language>
  <copyright>© 2026 Ink8r (in·​cu·​ba·​tor) Podcast</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>b20ad162-ffea-51b0-a9ba-d97594e8b5ab</podcast:guid>
  <itunes:author>ink8r</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[A podcast covering socio-technical themes, concepts, and technologies that matter to the modern enterprise]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>ink8r</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/00795b01515w4nqkdz12cvhwwv3k?.jpg</url>
     <title>Ink8r (in·​cu·​ba·​tor) Podcast</title>
     <link>https://www.ink8r.com/</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/00795b01515w4nqkdz12cvhwwv3k?.jpg" />
  <itunes:category text="Technology" />
  <podcast:person role="co-host" href="https://www.ink8r.com/darren" img="https://storage.buzzsprout.com/fnjzxzguzyrs86kgbhfdsc185fav">Darren Boyd</podcast:person>
  <podcast:person role="co-host" href="https://www.ink8r.com/satbir" img="https://storage.buzzsprout.com/4e8tv8yf9wo82x0821o8v505rwv8">Satbir Sran</podcast:person>
  <item>
    <itunes:title>Episode #53 - Productivity Through Self-Awareness</itunes:title>
    <title>Episode #53 - Productivity Through Self-Awareness</title>
    <itunes:summary><![CDATA[In this compelling episode of The Incubator Podcast, hosts Satbir Sran and Darren Boyd dive into the theme of productivity with TJ Walia, Founder and CEO of ZenTek Solutions. TJ shares his transformative journey from burnout to balance, sparked by a severe panic attack during his high-pressure career at Microsoft. His story unveils practical strategies for reclaiming productivity through self-awareness and intentional boundaries.  Key takeaways include: Recognize Burnout: Monitor behavior for...]]></itunes:summary>
    <description><![CDATA[<p>In this compelling episode of The Incubator Podcast, hosts Satbir Sran and Darren Boyd dive into the theme of productivity with TJ Walia, Founder and CEO of ZenTek Solutions. TJ shares his transformative journey from burnout to balance, sparked by a severe panic attack during his high-pressure career at Microsoft. His story unveils practical strategies for reclaiming productivity through self-awareness and intentional boundaries.<br/><br/>Key takeaways include:<br/><b>Recognize Burnout:</b> Monitor behavior for signs of chronic stress, like agitation or strained relationships, and pause to assess sustainability.<br/><br/><b>Set Boundaries:</b> Use tools like calendars to prioritize tasks, block personal time, and avoid multitasking. TJ emphasizes focusing on three key stakeholders and projects to filter out noise.<br/><br/><b>Embrace Mindfulness:</b> Simple practices, like observing nature or doing nothing, can quiet the mind and boost creativity.<br/><br/><b>Leverage Technology:</b> Tools like Outlook rules and AI can streamline workflows, saving hours daily.<br/><br/><b>Communicate Priorities:</b> Proactively reschedule with clients to ensure quality delivery, balancing their needs with personal capacity.<br/><br/>TJ’s approach, now shared through ZenTek, empowers organizations with team-building, morale-boosting strategies, and AI-driven productivity hacks. Connect with him on LinkedIn for corporate development services or to learn how to save 2-4 hours daily. This episode is a must-listen for anyone seeking to escape the rat race and thrive with purpose.</p>]]></description>
    <content:encoded><![CDATA[<p>In this compelling episode of The Incubator Podcast, hosts Satbir Sran and Darren Boyd dive into the theme of productivity with TJ Walia, Founder and CEO of ZenTek Solutions. TJ shares his transformative journey from burnout to balance, sparked by a severe panic attack during his high-pressure career at Microsoft. His story unveils practical strategies for reclaiming productivity through self-awareness and intentional boundaries.<br/><br/>Key takeaways include:<br/><b>Recognize Burnout:</b> Monitor behavior for signs of chronic stress, like agitation or strained relationships, and pause to assess sustainability.<br/><br/><b>Set Boundaries:</b> Use tools like calendars to prioritize tasks, block personal time, and avoid multitasking. TJ emphasizes focusing on three key stakeholders and projects to filter out noise.<br/><br/><b>Embrace Mindfulness:</b> Simple practices, like observing nature or doing nothing, can quiet the mind and boost creativity.<br/><br/><b>Leverage Technology:</b> Tools like Outlook rules and AI can streamline workflows, saving hours daily.<br/><br/><b>Communicate Priorities:</b> Proactively reschedule with clients to ensure quality delivery, balancing their needs with personal capacity.<br/><br/>TJ’s approach, now shared through ZenTek, empowers organizations with team-building, morale-boosting strategies, and AI-driven productivity hacks. Connect with him on LinkedIn for corporate development services or to learn how to save 2-4 hours daily. This episode is a must-listen for anyone seeking to escape the rat race and thrive with purpose.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/17135878-episode-53-productivity-through-self-awareness.mp3" length="32991851" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yfjkh5cbh7taxdzm7syk4k7hmxcq?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17135878</guid>
    <pubDate>Sun, 11 May 2025 09:00:00 -0700</pubDate>
    <itunes:duration>2746</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>53</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #52 - Exploring Cybersecurity Strategies for 2025</itunes:title>
    <title>Episode #52 - Exploring Cybersecurity Strategies for 2025</title>
    <itunes:summary><![CDATA[In this episode of the Incubator Podcast, hosts Satbir Sran and Darren Boyd sit down with Daniel Hooper, a cybersecurity expert with over 25 years of experience, including a decade as a CISO. They dive into the evolving world of cybersecurity, exploring key challenges and strategies for 2025.  Daniel shares his journey from technical roles to a business-focused CISO, emphasizing the need to align security with organizational goals. He highlights AI as a game-changer for enhancing security ope...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the Incubator Podcast, hosts Satbir Sran and Darren Boyd sit down with Daniel Hooper, a cybersecurity expert with over 25 years of experience, including a decade as a CISO. They dive into the evolving world of cybersecurity, exploring key challenges and strategies for 2025.<br/><br/>Daniel shares his journey from technical roles to a business-focused CISO, emphasizing the need to align security with organizational goals. He highlights AI as a game-changer for enhancing security operations, like investigations in Security Operations Centers, and enabling safe business innovations, such as secure chatbots. However, AI’s accessibility also empowers adversaries, pushing CISOs to stay vigilant through threat modeling and risk assessments.<br/><br/>Looking ahead, Daniel identifies identity management, attack surface, third-party risk, and vulnerability management as top priorities. He advocates for proactive, automated solutions over reactive fixes. On the talent front, he suggests addressing skill gaps with training, promotions, or contractors before hiring full-time staff, ensuring resources match business needs.<br/><br/>Third-party risk, driven by booming SaaS and API integrations, is a growing concern. Daniel calls for standardized risk assessments to cut redundant due diligence, urging focus on business-specific needs like GDPR compliance. He also reflects on the CISO’s increasing accountability, with legal scrutiny from regulators like the SEC adding pressure. Despite this, Daniel remains motivated by the challenge of safeguarding organizations.<br/><br/>Daniel envisions security teams evolving into integrated “Centers of Excellence,” focusing on identity as the new perimeter and proactive risk management over alert-driven responses. Daniel&apos;s parting call is for the cybersecurity community to collaborate on streamlined third-party risk frameworks, saving time and sharpening focus on unique business requirements.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the Incubator Podcast, hosts Satbir Sran and Darren Boyd sit down with Daniel Hooper, a cybersecurity expert with over 25 years of experience, including a decade as a CISO. They dive into the evolving world of cybersecurity, exploring key challenges and strategies for 2025.<br/><br/>Daniel shares his journey from technical roles to a business-focused CISO, emphasizing the need to align security with organizational goals. He highlights AI as a game-changer for enhancing security operations, like investigations in Security Operations Centers, and enabling safe business innovations, such as secure chatbots. However, AI’s accessibility also empowers adversaries, pushing CISOs to stay vigilant through threat modeling and risk assessments.<br/><br/>Looking ahead, Daniel identifies identity management, attack surface, third-party risk, and vulnerability management as top priorities. He advocates for proactive, automated solutions over reactive fixes. On the talent front, he suggests addressing skill gaps with training, promotions, or contractors before hiring full-time staff, ensuring resources match business needs.<br/><br/>Third-party risk, driven by booming SaaS and API integrations, is a growing concern. Daniel calls for standardized risk assessments to cut redundant due diligence, urging focus on business-specific needs like GDPR compliance. He also reflects on the CISO’s increasing accountability, with legal scrutiny from regulators like the SEC adding pressure. Despite this, Daniel remains motivated by the challenge of safeguarding organizations.<br/><br/>Daniel envisions security teams evolving into integrated “Centers of Excellence,” focusing on identity as the new perimeter and proactive risk management over alert-driven responses. Daniel&apos;s parting call is for the cybersecurity community to collaborate on streamlined third-party risk frameworks, saving time and sharpening focus on unique business requirements.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/17134392-episode-52-exploring-cybersecurity-strategies-for-2025.mp3" length="21496809" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7ca1bskkpbwfyjm7fr25fzzwwfpl?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17134392</guid>
    <pubDate>Fri, 09 May 2025 23:00:00 -0700</pubDate>
    <itunes:duration>1787</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>52</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #51 - Securing the API Frontier with Salt Security</itunes:title>
    <title>Episode #51 - Securing the API Frontier with Salt Security</title>
    <itunes:summary><![CDATA[In this episode of the Incubator Podcast, hosts Satbir Sran and Darren Boyd sit down with Nick Rago, Vice President of Product Strategy at Salt Security, a leading firm in API security.  The conversation dives into the evolution of API security, the pioneering role of Salt Security, and the innovative approaches the company takes to address the growing challenges in the API landscape. Rago shares the origins of Salt Security and how the company is shaping the future of API governance and...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the Incubator Podcast, hosts Satbir Sran and Darren Boyd sit down with Nick Rago, Vice President of Product Strategy at Salt Security, a leading firm in API security.  The conversation dives into the evolution of API security, the pioneering role of Salt Security, and the innovative approaches the company takes to address the growing challenges in the API landscape. Rago shares the origins of Salt Security and how the company is shaping the future of API governance and protection.<br/><br/>*API Security Challenges*<br/>- Evolving Threat Landscape: APIs have become a prevalent attack vector, with adversaries exploiting business logic flaws that traditional edge defenses (e.g., WAFs, CDNs) cannot detect. Approximately 80% of API breaches are schema-compliant, bypassing conventional security measures.<br/>- Visibility and Governance: Many enterprises lack visibility into their API attack surface, treating APIs as untracked IT assets. This leads to misconfigurations, which account for 70% of API breaches, often requiring minimal technical skill to exploit.<br/>- Industry Awakening: Gartner’s 2024 report highlights API breaches as a top security priority. Enterprises are beginning to treat APIs as critical IT assets, integrating them into CMDBs and establishing governance frameworks.<br/><br/>*Salt Security’s Unique Approach*<br/>- Intent Analysis: Unlike traditional behavioral analysis, Salt’s patented technology focuses on intent analysis, identifying malicious activities with high fidelity (only 0.02% of behavioral anomalies are malicious). This prevents SOC overload and enables confident blocking states.<br/>- Comprehensive Governance: Salt emphasizes posture governance, helping organizations define and enforce API standards across their ecosystem. This includes integrating with API gateways and management platforms like Kong to ensure consistency.<br/>- Ease of Deployment: Salt’s platform is designed for quick deployment and delivers deep insights rapidly, identifying top attack vectors, vulnerable endpoints, and usage concentrations. Its policy engine is intuitive, with out-of-the-box policies tailored to various industries.<br/>- Ecosystem Integration: Recent innovations, such as integration with CrowdStrike’s Falcon Foundry, allow for API discovery within minutes by leveraging existing EDR footprints, accelerating time to value.<br/><br/>*Innovations and Future Directions*<br/>- SaltSurface Technology: Introduced last year, this reconnaissance tool identifies externally facing API endpoints, uncovering rogue APIs (e.g., exposed HVAC systems in hotels).<br/>- Data Security and Governance: Salt is expanding its platform to address data security, helping organizations understand what data flows through their APIs and enforce data governance policies.<br/>- AI and LLM Integration: Leveraging advanced machine learning and large language models, Salt’s platform now provides automated SOC feedback, explaining why specific actions (e.g., blocking) are recommended.<br/>- Upcoming Releases: In the first half of 2025, Salt plans to roll out new technologies to further simplify deployment, enhance data governance, and address AI-driven API sprawl.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the Incubator Podcast, hosts Satbir Sran and Darren Boyd sit down with Nick Rago, Vice President of Product Strategy at Salt Security, a leading firm in API security.  The conversation dives into the evolution of API security, the pioneering role of Salt Security, and the innovative approaches the company takes to address the growing challenges in the API landscape. Rago shares the origins of Salt Security and how the company is shaping the future of API governance and protection.<br/><br/>*API Security Challenges*<br/>- Evolving Threat Landscape: APIs have become a prevalent attack vector, with adversaries exploiting business logic flaws that traditional edge defenses (e.g., WAFs, CDNs) cannot detect. Approximately 80% of API breaches are schema-compliant, bypassing conventional security measures.<br/>- Visibility and Governance: Many enterprises lack visibility into their API attack surface, treating APIs as untracked IT assets. This leads to misconfigurations, which account for 70% of API breaches, often requiring minimal technical skill to exploit.<br/>- Industry Awakening: Gartner’s 2024 report highlights API breaches as a top security priority. Enterprises are beginning to treat APIs as critical IT assets, integrating them into CMDBs and establishing governance frameworks.<br/><br/>*Salt Security’s Unique Approach*<br/>- Intent Analysis: Unlike traditional behavioral analysis, Salt’s patented technology focuses on intent analysis, identifying malicious activities with high fidelity (only 0.02% of behavioral anomalies are malicious). This prevents SOC overload and enables confident blocking states.<br/>- Comprehensive Governance: Salt emphasizes posture governance, helping organizations define and enforce API standards across their ecosystem. This includes integrating with API gateways and management platforms like Kong to ensure consistency.<br/>- Ease of Deployment: Salt’s platform is designed for quick deployment and delivers deep insights rapidly, identifying top attack vectors, vulnerable endpoints, and usage concentrations. Its policy engine is intuitive, with out-of-the-box policies tailored to various industries.<br/>- Ecosystem Integration: Recent innovations, such as integration with CrowdStrike’s Falcon Foundry, allow for API discovery within minutes by leveraging existing EDR footprints, accelerating time to value.<br/><br/>*Innovations and Future Directions*<br/>- SaltSurface Technology: Introduced last year, this reconnaissance tool identifies externally facing API endpoints, uncovering rogue APIs (e.g., exposed HVAC systems in hotels).<br/>- Data Security and Governance: Salt is expanding its platform to address data security, helping organizations understand what data flows through their APIs and enforce data governance policies.<br/>- AI and LLM Integration: Leveraging advanced machine learning and large language models, Salt’s platform now provides automated SOC feedback, explaining why specific actions (e.g., blocking) are recommended.<br/>- Upcoming Releases: In the first half of 2025, Salt plans to roll out new technologies to further simplify deployment, enhance data governance, and address AI-driven API sprawl.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/17099815-episode-51-securing-the-api-frontier-with-salt-security.mp3" length="27833359" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5f9txozw1uzxmg79zydzmb2rpd6n?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17099815</guid>
    <pubDate>Sun, 04 May 2025 23:00:00 -0700</pubDate>
    <itunes:duration>2316</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>51</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #3 - Democratizing Telemetry Collection with Morgan McLean</itunes:title>
    <title>Episode #3 - Democratizing Telemetry Collection with Morgan McLean</title>
    <itunes:summary><![CDATA[In this episode, we speak with Morgan McLean, Director of Product Management for Splunk Observability Cloud, and co-founder of OpenCensus and OpenTelemetry.  As a governance committee member of the OpenTelemetry project, Morgan is shaping how to democratize the collection of telemetry signals (metrics, logs, traces) into a single braid based on context propagation.   Listen as Morgan provides a perspective on Observability and OpenTelemetry, shares how concepts in OpenTelemetry prov...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we speak with Morgan McLean, Director of Product Management for Splunk Observability Cloud, and co-founder of OpenCensus and OpenTelemetry.  As a governance committee member of the OpenTelemetry project, Morgan is shaping how to democratize the collection of telemetry signals (metrics, logs, traces) into a single braid based on context propagation.   Listen as Morgan provides a perspective on Observability and OpenTelemetry, shares how concepts in OpenTelemetry provide support to distributed applications, and lends practical implementation guidance for introducing signal collection standards in the enterprise.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we speak with Morgan McLean, Director of Product Management for Splunk Observability Cloud, and co-founder of OpenCensus and OpenTelemetry.  As a governance committee member of the OpenTelemetry project, Morgan is shaping how to democratize the collection of telemetry signals (metrics, logs, traces) into a single braid based on context propagation.   Listen as Morgan provides a perspective on Observability and OpenTelemetry, shares how concepts in OpenTelemetry provide support to distributed applications, and lends practical implementation guidance for introducing signal collection standards in the enterprise.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10146141-episode-3-democratizing-telemetry-collection-with-morgan-mclean.mp3" length="32059383" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9cntoqhl83dzoku1lnj21u0tgsrh?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10146141</guid>
    <pubDate>Sun, 04 May 2025 23:00:00 -0700</pubDate>
    <itunes:duration>2667</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #50 - Building a Data Security Foundation with Bedrock Security</itunes:title>
    <title>Episode #50 - Building a Data Security Foundation with Bedrock Security</title>
    <itunes:summary><![CDATA[In this episode of the Incubator podcast, co-hosts Satbir Sran and Darren Boyd sit down with Bruno Kurtic, the CEO and co-founder of Bedrock Security, to discuss his journey in enterprise software. Bruno shares his experience building Sumo Logic, a cloud-native log analytics platform that went public, and how those lessons drive innovations at Bedrock Security.   Bruno explains that the core of Bedrock Security’s approach is a "metadata link," which builds a comprehensive data inventory ...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the Incubator podcast, co-hosts Satbir Sran and Darren Boyd sit down with Bruno Kurtic, the CEO and co-founder of Bedrock Security, to discuss his journey in enterprise software. Bruno shares his experience building Sumo Logic, a cloud-native log analytics platform that went public, and how those lessons drive innovations at Bedrock Security. <br/><br/>Bruno explains that the core of Bedrock Security’s approach is a &quot;metadata link,&quot; which builds a comprehensive data inventory from creation to consumption. This helps organizations discover, classify, and manage data effectively—the foundational step before any security can be implemented. He discusses how Bedrock’s platform leverages generative AI for accurate, scalable, and real-time data analysis, setting it apart from traditional solutions. <br/><br/>The conversation touches on the intersection of data security and AI, advising CXOs and security leaders to focus on data discovery first to create a strong foundation. Bruno emphasizes that when organizations understand their data, they unlock opportunities for smarter security, better compliance, and even cost savings. Bedrock’s focus on data classification, access control, and proactive security measures positions it as a critical tool in managing enterprise data security. The episode concludes with Bruno highlighting new use cases in AI and evolving customer needs. <br/><br/>This discussion is essential for understanding the future of data-centric security and how to approach it strategically within any organization. </p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the Incubator podcast, co-hosts Satbir Sran and Darren Boyd sit down with Bruno Kurtic, the CEO and co-founder of Bedrock Security, to discuss his journey in enterprise software. Bruno shares his experience building Sumo Logic, a cloud-native log analytics platform that went public, and how those lessons drive innovations at Bedrock Security. <br/><br/>Bruno explains that the core of Bedrock Security’s approach is a &quot;metadata link,&quot; which builds a comprehensive data inventory from creation to consumption. This helps organizations discover, classify, and manage data effectively—the foundational step before any security can be implemented. He discusses how Bedrock’s platform leverages generative AI for accurate, scalable, and real-time data analysis, setting it apart from traditional solutions. <br/><br/>The conversation touches on the intersection of data security and AI, advising CXOs and security leaders to focus on data discovery first to create a strong foundation. Bruno emphasizes that when organizations understand their data, they unlock opportunities for smarter security, better compliance, and even cost savings. Bedrock’s focus on data classification, access control, and proactive security measures positions it as a critical tool in managing enterprise data security. The episode concludes with Bruno highlighting new use cases in AI and evolving customer needs. <br/><br/>This discussion is essential for understanding the future of data-centric security and how to approach it strategically within any organization. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/16620995-episode-50-building-a-data-security-foundation-with-bedrock-security.mp3" length="23036464" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/x8svl4zgtiipogtw3ao74u086a0z?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16620995</guid>
    <pubDate>Fri, 14 Feb 2025 20:00:00 -0800</pubDate>
    <itunes:duration>1916</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>50</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #49 - Securing SaaS: Reco’s AI-Driven End-to-End SSPM Solution</itunes:title>
    <title>Episode #49 - Securing SaaS: Reco’s AI-Driven End-to-End SSPM Solution</title>
    <itunes:summary><![CDATA[In this episode of the Incubator Podcast, hosts Darren Boyd and Satbir Sran welcome Ofer Klein, the co-founder and CEO of Reco.ai, to delve into the evolving landscape of SaaS Security Posture Management (SSPM). Ofer shares his diverse background—from flying helicopters in the Israeli Air Force to launching multiple startups—and explains how his experience, along with the expertise of his co-founders (who bring unique skills from their time in the Israeli FBI), laid the foundation for Reco.ai...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the Incubator Podcast, hosts Darren Boyd and Satbir Sran welcome Ofer Klein, the co-founder and CEO of Reco.ai, to delve into the evolving landscape of SaaS Security Posture Management (SSPM). Ofer shares his diverse background—from flying helicopters in the Israeli Air Force to launching multiple startups—and explains how his experience, along with the expertise of his co-founders (who bring unique skills from their time in the Israeli FBI), laid the foundation for Reco.ai’s innovative approach to SaaS security.<br/><br/>This podcast episode centers on the explosive growth of SaaS applications in the enterprise environment, a trend that accelerated during the COVID-19 pandemic and continues with the rise of AI-driven tools. Ofer explains how organizations are now managing hundreds of SaaS apps, many of which are shadow applications that can expose significant risks. Reco.ai’s platform tackles this challenge by creating an AI-driven graph that maps every interaction between people, applications, and data in real-time. This comprehensive view enables organizations to discover unknown apps, assess risk through detailed configuration and compliance checks, and execute detection and response strategies—all within one unified solution.<br/><br/>Real-world examples shared during the podcast highlight how the platform has helped companies streamline operations, reduce manual workload by up to 80%, and foster collaboration between security and business teams. Ofer emphasizes the importance of context-based decision-making, which allows organizations to prioritize risks, align with regulatory requirements, and ensure that operational changes do not hinder business productivity.<br/><br/>Looking ahead, Ofer discusses emerging trends in SaaS security, including the increasing complexity of generative AI and the critical need for consolidated, end-to-end security solutions. His advice for organizations is clear: in a landscape where SaaS usage and potential vulnerabilities are growing exponentially, the time to invest in comprehensive SaaS security is now. This conversation not only demystifies the challenges of managing SaaS environments but also offers actionable insights for enterprises striving to secure their digital ecosystems without compromising innovation.<br/><br/>We hope you enjoy the episode as much as we enjoyed hosting Ofer!</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the Incubator Podcast, hosts Darren Boyd and Satbir Sran welcome Ofer Klein, the co-founder and CEO of Reco.ai, to delve into the evolving landscape of SaaS Security Posture Management (SSPM). Ofer shares his diverse background—from flying helicopters in the Israeli Air Force to launching multiple startups—and explains how his experience, along with the expertise of his co-founders (who bring unique skills from their time in the Israeli FBI), laid the foundation for Reco.ai’s innovative approach to SaaS security.<br/><br/>This podcast episode centers on the explosive growth of SaaS applications in the enterprise environment, a trend that accelerated during the COVID-19 pandemic and continues with the rise of AI-driven tools. Ofer explains how organizations are now managing hundreds of SaaS apps, many of which are shadow applications that can expose significant risks. Reco.ai’s platform tackles this challenge by creating an AI-driven graph that maps every interaction between people, applications, and data in real-time. This comprehensive view enables organizations to discover unknown apps, assess risk through detailed configuration and compliance checks, and execute detection and response strategies—all within one unified solution.<br/><br/>Real-world examples shared during the podcast highlight how the platform has helped companies streamline operations, reduce manual workload by up to 80%, and foster collaboration between security and business teams. Ofer emphasizes the importance of context-based decision-making, which allows organizations to prioritize risks, align with regulatory requirements, and ensure that operational changes do not hinder business productivity.<br/><br/>Looking ahead, Ofer discusses emerging trends in SaaS security, including the increasing complexity of generative AI and the critical need for consolidated, end-to-end security solutions. His advice for organizations is clear: in a landscape where SaaS usage and potential vulnerabilities are growing exponentially, the time to invest in comprehensive SaaS security is now. This conversation not only demystifies the challenges of managing SaaS environments but also offers actionable insights for enterprises striving to secure their digital ecosystems without compromising innovation.<br/><br/>We hope you enjoy the episode as much as we enjoyed hosting Ofer!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/16614952-episode-49-securing-saas-reco-s-ai-driven-end-to-end-sspm-solution.mp3" length="22493185" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5r1ls7iwr4h6bmogcoq0pc8vulvl?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16614952</guid>
    <pubDate>Thu, 13 Feb 2025 06:00:00 -0800</pubDate>
    <itunes:duration>1871</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>49</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #48 - Navigating the Future of AI with Ahead</itunes:title>
    <title>Episode #48 - Navigating the Future of AI with Ahead</title>
    <itunes:summary><![CDATA[In this episode of the Incubator Podcast, co-hosts Darren Boyd and Satbir Sran welcome Ethan Rasa, an AI Sales Specialist at Ahead, to explore the evolving landscape of artificial intelligence and how enterprises can harness its potential. Key Highlights: Introducing Ahead: Discover how Ahead—a Chicago-based, multi-billion-dollar company with a nationwide footprint—is driving innovation with a robust portfolio that spans AI strategy, engineering, data science, security, and more. With 3,000 e...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the Incubator Podcast, co-hosts Darren Boyd and Satbir Sran welcome Ethan Rasa, an AI Sales Specialist at Ahead, to explore the evolving landscape of artificial intelligence and how enterprises can harness its potential.</p><p><b>Key Highlights:</b></p><ul><li><b>Introducing Ahead:</b><br/>Discover how Ahead—a Chicago-based, multi-billion-dollar company with a nationwide footprint—is driving innovation with a robust portfolio that spans AI strategy, engineering, data science, security, and more. With 3,000 employees (including 2,500 engineers) and a strong presence among Fortune 2000 clients, Ahead is at the forefront of integrating cutting-edge solutions into complex enterprise environments.</li><li><b>Enterprise AI Strategy:</b><br/>The discussion dives into the importance of a comprehensive data strategy, including data collection, engineering, and governance. Ethan emphasizes that the foundation of successful AI initiatives lies in how companies manage and operationalize their data—whether on-premise, in the cloud, or via hybrid solutions.</li><li><b>Security, Governance, and Ethical AI:</b><br/>With AI’s rapid adoption come new challenges in data security and ethical considerations. The podcast highlights the necessity of integrating security teams early in the AI development process to safeguard sensitive information and comply with evolving regulatory standards. Ethan also touches on practical approaches to responsible AI deployment, such as private AI models and rigorous data governance frameworks.</li><li><b>Industry Applications and Value Creation:</b><br/>From healthcare and financial services to manufacturing and aerospace, the conversation explores how tailored AI strategies can unlock significant business value. Whether it’s reducing product lifecycle times, enhancing predictive analytics, or revolutionizing patient care, Ahead’s multi-practice approach is designed to help organizations at every stage of their AI journey.</li></ul><p><b>Connect with Ahead:</b><br/>For companies ready to explore innovative AI solutions, Ahead offers comprehensive support—from initial strategy sessions and pilot projects to full-scale deployments. Reach out to your local Ahead contact to start transforming your data into a competitive advantage.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the Incubator Podcast, co-hosts Darren Boyd and Satbir Sran welcome Ethan Rasa, an AI Sales Specialist at Ahead, to explore the evolving landscape of artificial intelligence and how enterprises can harness its potential.</p><p><b>Key Highlights:</b></p><ul><li><b>Introducing Ahead:</b><br/>Discover how Ahead—a Chicago-based, multi-billion-dollar company with a nationwide footprint—is driving innovation with a robust portfolio that spans AI strategy, engineering, data science, security, and more. With 3,000 employees (including 2,500 engineers) and a strong presence among Fortune 2000 clients, Ahead is at the forefront of integrating cutting-edge solutions into complex enterprise environments.</li><li><b>Enterprise AI Strategy:</b><br/>The discussion dives into the importance of a comprehensive data strategy, including data collection, engineering, and governance. Ethan emphasizes that the foundation of successful AI initiatives lies in how companies manage and operationalize their data—whether on-premise, in the cloud, or via hybrid solutions.</li><li><b>Security, Governance, and Ethical AI:</b><br/>With AI’s rapid adoption come new challenges in data security and ethical considerations. The podcast highlights the necessity of integrating security teams early in the AI development process to safeguard sensitive information and comply with evolving regulatory standards. Ethan also touches on practical approaches to responsible AI deployment, such as private AI models and rigorous data governance frameworks.</li><li><b>Industry Applications and Value Creation:</b><br/>From healthcare and financial services to manufacturing and aerospace, the conversation explores how tailored AI strategies can unlock significant business value. Whether it’s reducing product lifecycle times, enhancing predictive analytics, or revolutionizing patient care, Ahead’s multi-practice approach is designed to help organizations at every stage of their AI journey.</li></ul><p><b>Connect with Ahead:</b><br/>For companies ready to explore innovative AI solutions, Ahead offers comprehensive support—from initial strategy sessions and pilot projects to full-scale deployments. Reach out to your local Ahead contact to start transforming your data into a competitive advantage.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/16550133-episode-48-navigating-the-future-of-ai-with-ahead.mp3" length="20339761" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gyb6c1kqsdumjopbppju4uppdjq1?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16550133</guid>
    <pubDate>Sun, 02 Feb 2025 17:00:00 -0800</pubDate>
    <itunes:duration>1691</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>48</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #47 - Exploring the future of APIs and how to secure them</itunes:title>
    <title>Episode #47 - Exploring the future of APIs and how to secure them</title>
    <itunes:summary><![CDATA[In this exciting episode of The Incubator Podcast, co-hosts Satbir Sran and Darren Boyd sit down with Reza Shafii, Senior Vice President of Product at Kong Inc., to discuss the ever-evolving landscape of API management, service mesh technologies, and the future of developer platforms.   A key focus of the conversation is the convergence of API management and platform engineering, and how this integration is changing the way enterprises approach infrastructure, developer productivity, and...]]></itunes:summary>
    <description><![CDATA[<p>In this exciting episode of The Incubator Podcast, co-hosts Satbir Sran and Darren Boyd sit down with Reza Shafii, Senior Vice President of Product at Kong Inc., to discuss the ever-evolving landscape of API management, service mesh technologies, and the future of developer platforms. <br/><br/>A key focus of the conversation is the convergence of API management and platform engineering, and how this integration is changing the way enterprises approach infrastructure, developer productivity, and system reliability. Reza explains how Kong is building innovative tools such as Kong Mesh and Insomnia to simplify the API development process, enhance security, and deliver exceptional performance for high-demand use cases. He also touches on the challenges and opportunities of adopting service mesh technology and how Kong’s approach differs from other platforms, focusing on making deployment easier and less intrusive for operators.<br/><br/>Another exciting topic is the rise of AI-driven APIs, where Reza emphasizes how the rapid advancement of AI technologies, such as large language models (LLMs), is being enabled by APIs. He highlights how Kong is positioning itself to support developers working with AI and machine learning models, introducing features like Kong AI Gateway to streamline the integration and management of AI-based APIs.<br/><br/>Looking ahead, Reza gives a glimpse into Kong’s future direction.  With its Kong Connect platform, the company is building a robust ecosystem that enables customers to access API gateways, observability tools, API portals, and more — all through an incremental, self-service approach. Kong’s focus remains on providing flexible solutions that meet the diverse needs of its users, from individual developers to large enterprises.<br/><br/>Don’t miss this in-depth conversation about the future of APIs, platform engineering, service mesh, and Kong’s role in shaping the API-driven future of enterprise technology.</p>]]></description>
    <content:encoded><![CDATA[<p>In this exciting episode of The Incubator Podcast, co-hosts Satbir Sran and Darren Boyd sit down with Reza Shafii, Senior Vice President of Product at Kong Inc., to discuss the ever-evolving landscape of API management, service mesh technologies, and the future of developer platforms. <br/><br/>A key focus of the conversation is the convergence of API management and platform engineering, and how this integration is changing the way enterprises approach infrastructure, developer productivity, and system reliability. Reza explains how Kong is building innovative tools such as Kong Mesh and Insomnia to simplify the API development process, enhance security, and deliver exceptional performance for high-demand use cases. He also touches on the challenges and opportunities of adopting service mesh technology and how Kong’s approach differs from other platforms, focusing on making deployment easier and less intrusive for operators.<br/><br/>Another exciting topic is the rise of AI-driven APIs, where Reza emphasizes how the rapid advancement of AI technologies, such as large language models (LLMs), is being enabled by APIs. He highlights how Kong is positioning itself to support developers working with AI and machine learning models, introducing features like Kong AI Gateway to streamline the integration and management of AI-based APIs.<br/><br/>Looking ahead, Reza gives a glimpse into Kong’s future direction.  With its Kong Connect platform, the company is building a robust ecosystem that enables customers to access API gateways, observability tools, API portals, and more — all through an incremental, self-service approach. Kong’s focus remains on providing flexible solutions that meet the diverse needs of its users, from individual developers to large enterprises.<br/><br/>Don’t miss this in-depth conversation about the future of APIs, platform engineering, service mesh, and Kong’s role in shaping the API-driven future of enterprise technology.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/15878795-episode-47-exploring-the-future-of-apis-and-how-to-secure-them.mp3" length="24292105" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/00jw18eh02iccf1epbx1zh81jonj?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15878795</guid>
    <pubDate>Sun, 06 Oct 2024 19:00:00 -0700</pubDate>
    <itunes:duration>2021</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>47</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #46 - ‘Space Container’: Creative IT Solutions, Without Limits</itunes:title>
    <title>Episode #46 - ‘Space Container’: Creative IT Solutions, Without Limits</title>
    <itunes:summary><![CDATA[In this insightful episode of the Incubator podcast, hosts Satbir Sran and Darren Boyd are joined by Craig Martin, VP at Ahead and leader of the Digital Solutions Group.   In this episode, Craig, a devout Grateful Dead fan, shares the transformative strategies his team uses to help organizations unlock the full potential of technology through modernization. Just as Jerry Garcia's 'space container' crafted a unique, boundary-pushing soundscape in music, Craig's team is redefining the norm...]]></itunes:summary>
    <description><![CDATA[<p>In this insightful episode of the Incubator podcast, hosts Satbir Sran and Darren Boyd are joined by Craig Martin, VP at Ahead and leader of the Digital Solutions Group. <br/><br/>In this episode, Craig, a devout Grateful Dead fan, shares the transformative strategies his team uses to help organizations unlock the full potential of technology through modernization. Just as Jerry Garcia&apos;s &apos;space container&apos; crafted a unique, boundary-pushing soundscape in music, Craig&apos;s team is redefining the norms in IT, challenging conventional approaches to deliver innovative solutions.<br/><br/>With a rich background in engineering and a knack for pioneering solutions, Craig discusses the shift towards microservices architecture and cloud transformation, emphasizing the necessity of a holistic strategy that marries engineering prowess with keen business acumen. <br/><br/>The discussion pivots to hybrid cloud environments, where Craig outlines the concept of a unified control plane that allows businesses the flexibility to run workloads more efficiently across various platforms, thereby optimizing operational performance without bogging down engineering teams with infrastructure concerns.<br/><br/>Have a listen to understand how hybrid cloud can be the &quot;space container&quot; of tech, offering the freedom to innovate without limits, much like Jerry Garcia&apos;s vision of boundless creativity.</p>]]></description>
    <content:encoded><![CDATA[<p>In this insightful episode of the Incubator podcast, hosts Satbir Sran and Darren Boyd are joined by Craig Martin, VP at Ahead and leader of the Digital Solutions Group. <br/><br/>In this episode, Craig, a devout Grateful Dead fan, shares the transformative strategies his team uses to help organizations unlock the full potential of technology through modernization. Just as Jerry Garcia&apos;s &apos;space container&apos; crafted a unique, boundary-pushing soundscape in music, Craig&apos;s team is redefining the norms in IT, challenging conventional approaches to deliver innovative solutions.<br/><br/>With a rich background in engineering and a knack for pioneering solutions, Craig discusses the shift towards microservices architecture and cloud transformation, emphasizing the necessity of a holistic strategy that marries engineering prowess with keen business acumen. <br/><br/>The discussion pivots to hybrid cloud environments, where Craig outlines the concept of a unified control plane that allows businesses the flexibility to run workloads more efficiently across various platforms, thereby optimizing operational performance without bogging down engineering teams with infrastructure concerns.<br/><br/>Have a listen to understand how hybrid cloud can be the &quot;space container&quot; of tech, offering the freedom to innovate without limits, much like Jerry Garcia&apos;s vision of boundless creativity.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/15024971-episode-46-space-container-creative-it-solutions-without-limits.mp3" length="13606689" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hn28z2jjho1fnbbzetn8saaijm2x?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15024971</guid>
    <pubDate>Mon, 02 Sep 2024 20:00:00 -0700</pubDate>
    <itunes:duration>1128</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>46</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #45 - Observability Pipelines Reimagined with Observo.ai</itunes:title>
    <title>Episode #45 - Observability Pipelines Reimagined with Observo.ai</title>
    <itunes:summary><![CDATA[Join us in this exciting episode of the Incubator podcast as co-hosts Darren Boyd and Satbir Sran sit down with Ricky Arora, the co-founder and COO of Observo.ai. Dive into the cutting-edge world of AI-powered observability pipelines and discover how Observo.ai is transforming the landscape of data observability and security.   Key Differentiators: Learn about the unique features of Observo.ai, including its ML-driven insights, efficient data processing, and seamless integration with existing...]]></itunes:summary>
    <description><![CDATA[<p>Join us in this exciting episode of the Incubator podcast as co-hosts <a href='http://linkedin.com/in/darrenaboyd'>Darren Boyd</a> and <a href='https://linkedin.com/in/satbirsran'>Satbir Sran</a> sit down with <a href='https://linkedin.com/in/rickyarora'>Ricky Arora</a>, the co-founder and COO of <a href='https://www.observo.ai/'>Observo.ai</a>. Dive into the cutting-edge world of AI-powered observability pipelines and discover how Observo.ai is transforming the landscape of data observability and security.<br/><br/></p><ul><li>Key Differentiators: Learn about the unique features of Observo.ai, including its ML-driven insights, efficient data processing, and seamless integration with existing tools like Splunk, Datadog, and Elastic.</li><li>Customer Success: Hear stories on how Observo.ai helps enterprises optimize their telemetry data, resulting in significant cost savings and improved operational efficiency.</li><li>Future Roadmap: Get a sneak peek into the future developments at Observo.ai, including advancements in anomaly detection, sentiment analysis, and development of GenAI capabilities.</li><li>Industry Impact: Understand the broader impact of Observo.ai on the cybersecurity ecosystem, highlighted by its recognition at the GISEC conference as one of the most innovative startups (out of over 130 participants).</li></ul><p><br/></p><p>This episode is packed with insights for anyone interested in the future of observability and data security. Don&apos;t miss out on this enlightening conversation with one of the leading minds in the industry.</p><p><br/></p><p>Stay tuned for more exciting episodes of <a href='https://www.incubatorpodcast.com/'>the Incubator podcast</a>, where we bring you the latest innovations and thought leaders from the tech world.</p>]]></description>
    <content:encoded><![CDATA[<p>Join us in this exciting episode of the Incubator podcast as co-hosts <a href='http://linkedin.com/in/darrenaboyd'>Darren Boyd</a> and <a href='https://linkedin.com/in/satbirsran'>Satbir Sran</a> sit down with <a href='https://linkedin.com/in/rickyarora'>Ricky Arora</a>, the co-founder and COO of <a href='https://www.observo.ai/'>Observo.ai</a>. Dive into the cutting-edge world of AI-powered observability pipelines and discover how Observo.ai is transforming the landscape of data observability and security.<br/><br/></p><ul><li>Key Differentiators: Learn about the unique features of Observo.ai, including its ML-driven insights, efficient data processing, and seamless integration with existing tools like Splunk, Datadog, and Elastic.</li><li>Customer Success: Hear stories on how Observo.ai helps enterprises optimize their telemetry data, resulting in significant cost savings and improved operational efficiency.</li><li>Future Roadmap: Get a sneak peek into the future developments at Observo.ai, including advancements in anomaly detection, sentiment analysis, and development of GenAI capabilities.</li><li>Industry Impact: Understand the broader impact of Observo.ai on the cybersecurity ecosystem, highlighted by its recognition at the GISEC conference as one of the most innovative startups (out of over 130 participants).</li></ul><p><br/></p><p>This episode is packed with insights for anyone interested in the future of observability and data security. Don&apos;t miss out on this enlightening conversation with one of the leading minds in the industry.</p><p><br/></p><p>Stay tuned for more exciting episodes of <a href='https://www.incubatorpodcast.com/'>the Incubator podcast</a>, where we bring you the latest innovations and thought leaders from the tech world.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/15500626-episode-45-observability-pipelines-reimagined-with-observo-ai.mp3" length="25898135" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2rxmxq28iv8rp2vxh71ekmpaoyjc?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15500626</guid>
    <pubDate>Tue, 30 Jul 2024 10:00:00 -0700</pubDate>
    <itunes:duration>2154</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>45</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #44 - Operating at the Cyber Frontier with Zscaler</itunes:title>
    <title>Episode #44 - Operating at the Cyber Frontier with Zscaler</title>
    <itunes:summary><![CDATA[In this episode of the Incubator Podcast, co-hosts Satbir Sran and Darren Boyd welcome Brian Deitch, Chief Technology Evangelist at Zscaler. With an impressive 30% of Forbes Global 2000 companies as clients, Zscaler is making significant strides in connecting people to resources and enhancing cybersecurity measures.  Brian shares his journey from joining Zscaler seven years ago to becoming a key figure in their technology evangelism. The discussion delves into Zscaler's evolution, focusing on...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the Incubator Podcast, co-hosts Satbir Sran and Darren Boyd welcome Brian Deitch, Chief Technology Evangelist at Zscaler. With an impressive 30% of Forbes Global 2000 companies as clients, Zscaler is making significant strides in connecting people to resources and enhancing cybersecurity measures.<br/><br/>Brian shares his journey from joining Zscaler seven years ago to becoming a key figure in their technology evangelism. The discussion delves into Zscaler&apos;s evolution, focusing on their Zero Trust Exchange strategy, data protection, DLP, and innovative approaches to data classification. Brian highlights the importance of user experience and the impact of AI and ML in simplifying data protection.<br/><br/>The conversation also explores the integration of new technologies, such as GenAI and the acquisition of Avalor for unified vulnerability management. Brian emphasizes Zscaler&apos;s commitment to operational simplicity and effective partnerships, making complex cybersecurity challenges more manageable for organizations.<br/><br/>Join us as we unpack Zscaler&apos;s journey, innovations, and vision for the future of cybersecurity. This episode is packed with insights on how Zscaler is transforming the way companies approach data protection and security.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the Incubator Podcast, co-hosts Satbir Sran and Darren Boyd welcome Brian Deitch, Chief Technology Evangelist at Zscaler. With an impressive 30% of Forbes Global 2000 companies as clients, Zscaler is making significant strides in connecting people to resources and enhancing cybersecurity measures.<br/><br/>Brian shares his journey from joining Zscaler seven years ago to becoming a key figure in their technology evangelism. The discussion delves into Zscaler&apos;s evolution, focusing on their Zero Trust Exchange strategy, data protection, DLP, and innovative approaches to data classification. Brian highlights the importance of user experience and the impact of AI and ML in simplifying data protection.<br/><br/>The conversation also explores the integration of new technologies, such as GenAI and the acquisition of Avalor for unified vulnerability management. Brian emphasizes Zscaler&apos;s commitment to operational simplicity and effective partnerships, making complex cybersecurity challenges more manageable for organizations.<br/><br/>Join us as we unpack Zscaler&apos;s journey, innovations, and vision for the future of cybersecurity. This episode is packed with insights on how Zscaler is transforming the way companies approach data protection and security.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/15427506-episode-44-operating-at-the-cyber-frontier-with-zscaler.mp3" length="25500840" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/oxii18jnwdenjb5xf0yroadhvf07?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15427506</guid>
    <pubDate>Wed, 17 Jul 2024 07:00:00 -0700</pubDate>
    <itunes:duration>2121</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>44</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #43 - Cultivating Resilience and Innovation in Cybersecurity with Mel Reyes</itunes:title>
    <title>Episode #43 - Cultivating Resilience and Innovation in Cybersecurity with Mel Reyes</title>
    <itunes:summary><![CDATA[In this episode of the Incubator Podcast, hosts Darren Boyd and Satbir Sran welcome Mel Reyes, a distinguished figure in the tech industry known for his roles as a global CIO and CISO, founder of Digital Guardians, and an active community contributor.    Mel shares his extensive experience in IT and security, discussing the evolving challenges in cyber threats, compliance, and the importance of leadership in security operations.  He emphasizes the significant impact of management su...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the Incubator Podcast, hosts Darren Boyd and Satbir Sran welcome Mel Reyes, a distinguished figure in the tech industry known for his roles as a global CIO and CISO, founder of Digital Guardians, and an active community contributor.  <br/><br/>Mel shares his extensive experience in IT and security, discussing the evolving challenges in cyber threats, compliance, and the importance of leadership in security operations.  He emphasizes the significant impact of management support on cultural change within organizations and highlights the necessity of building trust and collaboration among teams. <br/><br/>Mel also dives into the importance of addressing employee burnout and the critical role of establishing a robust security mindset across all levels of a company. Throughout the conversation, Mel advocates for a people-focused approach, underscoring that effective security and technological advancement rely heavily on nurturing and empowering personnel.<br/><br/>Tune in and enjoy insights from a cybersecurity leader!</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the Incubator Podcast, hosts Darren Boyd and Satbir Sran welcome Mel Reyes, a distinguished figure in the tech industry known for his roles as a global CIO and CISO, founder of Digital Guardians, and an active community contributor.  <br/><br/>Mel shares his extensive experience in IT and security, discussing the evolving challenges in cyber threats, compliance, and the importance of leadership in security operations.  He emphasizes the significant impact of management support on cultural change within organizations and highlights the necessity of building trust and collaboration among teams. <br/><br/>Mel also dives into the importance of addressing employee burnout and the critical role of establishing a robust security mindset across all levels of a company. Throughout the conversation, Mel advocates for a people-focused approach, underscoring that effective security and technological advancement rely heavily on nurturing and empowering personnel.<br/><br/>Tune in and enjoy insights from a cybersecurity leader!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/15021312-episode-43-cultivating-resilience-and-innovation-in-cybersecurity-with-mel-reyes.mp3" length="28789072" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a1wt1hj2zforxbu55tlouk45rprj?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15021312</guid>
    <pubDate>Mon, 06 May 2024 17:00:00 -0700</pubDate>
    <itunes:duration>2395</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>43</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #42 - Unpacking the Future of Hybrid Clouds with Dell’s PowerFlex</itunes:title>
    <title>Episode #42 - Unpacking the Future of Hybrid Clouds with Dell’s PowerFlex</title>
    <itunes:summary><![CDATA[In this episode of the Incubator Podcast, hosts Darren Boyd and Satbir Sran delve into the transformative world of hybrid cloud with guest Steve Bisnett, Global Field CTO for PowerFlex at Dell Technologies. Steve shares insights into his extensive background in the tech industry, especially his experiences transitioning from customer-focused roles to influencing product innovation at Dell.  The episode centers around PowerFlex, a pioneering software-defined storage solution. This technology, ...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the Incubator Podcast, hosts Darren Boyd and Satbir Sran delve into the transformative world of hybrid cloud with guest Steve Bisnett, Global Field CTO for PowerFlex at Dell Technologies. Steve shares insights into his extensive background in the tech industry, especially his experiences transitioning from customer-focused roles to influencing product innovation at Dell.<br/><br/>The episode centers around PowerFlex, a pioneering software-defined storage solution. This technology, initially acquired and evolved over time by Dell, addresses the burgeoning needs of modern data centers characterized by high scalability and the flexibility to adapt to various workloads and configurations.<br/><br/>Steve explains the evolution of PowerFlex, highlighting its role in revolutionizing Dell&apos;s approach to storage solutions by integrating aspects of traditional three-tier architectures and hyper-converged infrastructures. This integration allows for separate scaling of storage and compute resources, crucial for handling the diverse needs of enterprise environments.<br/><br/>The discussion also covers the challenges organizations face, such as infrastructure complexity, cost management, and lifecycle management. PowerFlex addresses these through consolidation and a high degree of automation, which significantly simplifies operations and reduces the need for extensive human intervention.<br/><br/>Moreover, Steve elaborates on the strategic applications of PowerFlex in enterprise settings, particularly its capability to support a variety of workloads and operational models, whether on-premise or in the cloud. This flexibility is essential for enterprises looking to optimize performance and cost, especially those transitioning between cloud and on-premise environments.<br/><br/>The podcast provides a comprehensive view of how PowerFlex fits into the broader Dell ecosystem, capable of meeting specialized needs such as high-performance computing or extensive data storage through seamless integration with other Dell products.<br/><br/>This episode underscores the importance of adaptive technologies like PowerFlex in managing and transforming large-scale IT environments, reflecting Dell&apos;s commitment to innovation and customer-centric solutions in the evolving landscape of enterprise technology.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the Incubator Podcast, hosts Darren Boyd and Satbir Sran delve into the transformative world of hybrid cloud with guest Steve Bisnett, Global Field CTO for PowerFlex at Dell Technologies. Steve shares insights into his extensive background in the tech industry, especially his experiences transitioning from customer-focused roles to influencing product innovation at Dell.<br/><br/>The episode centers around PowerFlex, a pioneering software-defined storage solution. This technology, initially acquired and evolved over time by Dell, addresses the burgeoning needs of modern data centers characterized by high scalability and the flexibility to adapt to various workloads and configurations.<br/><br/>Steve explains the evolution of PowerFlex, highlighting its role in revolutionizing Dell&apos;s approach to storage solutions by integrating aspects of traditional three-tier architectures and hyper-converged infrastructures. This integration allows for separate scaling of storage and compute resources, crucial for handling the diverse needs of enterprise environments.<br/><br/>The discussion also covers the challenges organizations face, such as infrastructure complexity, cost management, and lifecycle management. PowerFlex addresses these through consolidation and a high degree of automation, which significantly simplifies operations and reduces the need for extensive human intervention.<br/><br/>Moreover, Steve elaborates on the strategic applications of PowerFlex in enterprise settings, particularly its capability to support a variety of workloads and operational models, whether on-premise or in the cloud. This flexibility is essential for enterprises looking to optimize performance and cost, especially those transitioning between cloud and on-premise environments.<br/><br/>The podcast provides a comprehensive view of how PowerFlex fits into the broader Dell ecosystem, capable of meeting specialized needs such as high-performance computing or extensive data storage through seamless integration with other Dell products.<br/><br/>This episode underscores the importance of adaptive technologies like PowerFlex in managing and transforming large-scale IT environments, reflecting Dell&apos;s commitment to innovation and customer-centric solutions in the evolving landscape of enterprise technology.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/14884164-episode-42-unpacking-the-future-of-hybrid-clouds-with-dell-s-powerflex.mp3" length="24582405" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fbjqt21u28mwe69xc5b2kgha6saz?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14884164</guid>
    <pubDate>Sun, 14 Apr 2024 10:00:00 -0700</pubDate>
    <itunes:duration>2045</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>42</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #39 - Consumption Economics: A neoclassical view of cloud</itunes:title>
    <title>Episode #39 - Consumption Economics: A neoclassical view of cloud</title>
    <itunes:summary><![CDATA[In this podcast episode, we delve into the neoclassical economic view of cloud computing with Sarbjeet Johal, analyst, evangelist, and founder. The discussion begins by exploring the relevance of cloud in modern digital transformation.  We then explore principles rooted in neoclassical economics, focusing on concepts such as consumption economics, utility maximization, institutional/transactional costs implications, and how these apply to the cloud computing market.   Key points inc...]]></itunes:summary>
    <description><![CDATA[<p>In this podcast episode, we delve into the neoclassical economic view of cloud computing with Sarbjeet Johal, analyst, evangelist, and founder. The discussion begins by exploring the relevance of cloud in modern digital transformation.  We then explore principles rooted in neoclassical economics, focusing on concepts such as consumption economics, utility maximization, institutional/transactional costs implications, and how these apply to the cloud computing market. <br/><br/>Key points include an analysis of supply and demand dynamics in cloud services, cost-benefit considerations for businesses transitioning to the cloud, and the role of competition among major cloud providers in shaping prices and service quality.<br/><br/>This episode is a must-listen for anyone interested in the intersection of economics and cloud computing, offering a view of cloud computing through the lens of neoclassical economics.</p>]]></description>
    <content:encoded><![CDATA[<p>In this podcast episode, we delve into the neoclassical economic view of cloud computing with Sarbjeet Johal, analyst, evangelist, and founder. The discussion begins by exploring the relevance of cloud in modern digital transformation.  We then explore principles rooted in neoclassical economics, focusing on concepts such as consumption economics, utility maximization, institutional/transactional costs implications, and how these apply to the cloud computing market. <br/><br/>Key points include an analysis of supply and demand dynamics in cloud services, cost-benefit considerations for businesses transitioning to the cloud, and the role of competition among major cloud providers in shaping prices and service quality.<br/><br/>This episode is a must-listen for anyone interested in the intersection of economics and cloud computing, offering a view of cloud computing through the lens of neoclassical economics.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/14433929-episode-39-consumption-economics-a-neoclassical-view-of-cloud.mp3" length="15682175" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1i0r1hh1bhl12pzm8h4gxkk4wrui?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14433929</guid>
    <pubDate>Sat, 03 Feb 2024 16:00:00 -0800</pubDate>
    <itunes:duration>1303</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>39</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #40 - Anonymisation through pseudonymisation</itunes:title>
    <title>Episode #40 - Anonymisation through pseudonymisation</title>
    <itunes:summary><![CDATA[In this podcast episode, we delve into data masking, data privacy, test data management, test environment management, the role of synthetic data, and the value of establishing a data fabric.  Quite a bit of ground to cover!  K2View is a leader in data fabric and Customer 360, creating a comprehensive view of the customer journey which aids businesses in understanding customer behavior, preferences, and needs, leading to better service and personalized experiences.  This of course natural...]]></itunes:summary>
    <description><![CDATA[<p>In this podcast episode, we delve into data masking, data privacy, test data management, test environment management, the role of synthetic data, and the value of establishing a data fabric.  Quite a bit of ground to cover!<br/><br/>K2View is a leader in data fabric and Customer 360, creating a comprehensive view of the customer journey which aids businesses in understanding customer behavior, preferences, and needs, leading to better service and personalized experiences.<br/><br/>This of course naturally leads to the topic of data privacy. Hod Rotem emphasizes the increasing importance of safeguarding consumer data by sharing strategies and best practices for maintaining data privacy through concepts such as synthetic data and data subsetting via the domain of test data management.  This ultimately leads to more agile, accurate, and cost-effective testing processes overall.<br/><br/>Have a listen and enjoy real-world examples and perspectives regarding future trends in data management and privacy.</p>]]></description>
    <content:encoded><![CDATA[<p>In this podcast episode, we delve into data masking, data privacy, test data management, test environment management, the role of synthetic data, and the value of establishing a data fabric.  Quite a bit of ground to cover!<br/><br/>K2View is a leader in data fabric and Customer 360, creating a comprehensive view of the customer journey which aids businesses in understanding customer behavior, preferences, and needs, leading to better service and personalized experiences.<br/><br/>This of course naturally leads to the topic of data privacy. Hod Rotem emphasizes the increasing importance of safeguarding consumer data by sharing strategies and best practices for maintaining data privacy through concepts such as synthetic data and data subsetting via the domain of test data management.  This ultimately leads to more agile, accurate, and cost-effective testing processes overall.<br/><br/>Have a listen and enjoy real-world examples and perspectives regarding future trends in data management and privacy.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/14423539-episode-40-anonymisation-through-pseudonymisation.mp3" length="27805573" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jknythrj7zdvx5o3z5e4fvhib8vt?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14423539</guid>
    <pubDate>Thu, 01 Feb 2024 13:00:00 -0800</pubDate>
    <itunes:duration>2313</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>40</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #38 - Practicality in Protection: Implementing an AppSec Program</itunes:title>
    <title>Episode #38 - Practicality in Protection: Implementing an AppSec Program</title>
    <itunes:summary><![CDATA[In this episode of our podcast, we sit down with Jeevan Singh, a distinguished leader in the field of Application Security (AppSec), to delve into the intricate world of securing software applications. The discussion highlights the perils and challenges faced by organizations in today’s digital landscape, emphasizing the growing sophistication of cyber threats and the vital importance of robust AppSec programs.  Jeevan articulates how he approaches implementing AppSec programs through a crawl...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of our podcast, we sit down with Jeevan Singh, a distinguished leader in the field of Application Security (AppSec), to delve into the intricate world of securing software applications. The discussion highlights the perils and challenges faced by organizations in today’s digital landscape, emphasizing the growing sophistication of cyber threats and the vital importance of robust AppSec programs.<br/><br/>Jeevan articulates how he approaches implementing AppSec programs through a crawl, walk, run progression, which helps to address cultural gaps that may exist between security teams and developers. He stresses the need for a paradigm shift from viewing security as a mere checkpoint, to integrating AppSec as a fundamental aspect of the development process. Jeevan shares insightful anecdotes and experiences to illustrate how this shift can lead to more secure and efficient development workflows.<br/><br/>Jeevan is active in the community, being Co-Chapter lead for OWASP Vancouver, as well as teaching threat hunting/modeling techniques to his local community.  <br/><br/>https://www.owasp.org/index.php/Vancouver<br/><br/>Ever insightful, Jeevan offers advice to organizations just starting their AppSec journey and provides insights into the future trends in application security. This podcast is a must for anyone looking to make meaningful progress in their AppSec journey.  We are confident our listeners will come away with a comprehensive understanding of the challenges and solutions in Application Security, enriched by Jeevan Singh’s expertise and practical insights.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of our podcast, we sit down with Jeevan Singh, a distinguished leader in the field of Application Security (AppSec), to delve into the intricate world of securing software applications. The discussion highlights the perils and challenges faced by organizations in today’s digital landscape, emphasizing the growing sophistication of cyber threats and the vital importance of robust AppSec programs.<br/><br/>Jeevan articulates how he approaches implementing AppSec programs through a crawl, walk, run progression, which helps to address cultural gaps that may exist between security teams and developers. He stresses the need for a paradigm shift from viewing security as a mere checkpoint, to integrating AppSec as a fundamental aspect of the development process. Jeevan shares insightful anecdotes and experiences to illustrate how this shift can lead to more secure and efficient development workflows.<br/><br/>Jeevan is active in the community, being Co-Chapter lead for OWASP Vancouver, as well as teaching threat hunting/modeling techniques to his local community.  <br/><br/>https://www.owasp.org/index.php/Vancouver<br/><br/>Ever insightful, Jeevan offers advice to organizations just starting their AppSec journey and provides insights into the future trends in application security. This podcast is a must for anyone looking to make meaningful progress in their AppSec journey.  We are confident our listeners will come away with a comprehensive understanding of the challenges and solutions in Application Security, enriched by Jeevan Singh’s expertise and practical insights.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/14249178-episode-38-practicality-in-protection-implementing-an-appsec-program.mp3" length="31354351" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/s1psm5wn8xl80jmziukrogcuwp5e?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14249178</guid>
    <pubDate>Thu, 04 Jan 2024 12:00:00 -0800</pubDate>
    <itunes:duration>2609</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #37 - CISO Perspectives on Cybersecurity Programs, Risks, and Priorities</itunes:title>
    <title>Episode #37 - CISO Perspectives on Cybersecurity Programs, Risks, and Priorities</title>
    <itunes:summary><![CDATA[Join Satbir and Darren as they interview Nemi George, a seasoned Chief Information Security Officer (CISO) of Pacific Dental Services, as they cover a complex tapestry of modern cybersecurity concerns.  The discussion covers diverse topics including the evolving threat landscape, the rise of sophisticated cyber attacks, evolving insider threats, risk management, supply chain complexity, and the value of preventive action.   As the conversation unfolds, Nemi highlights the importance of a...]]></itunes:summary>
    <description><![CDATA[<p>Join Satbir and Darren as they interview Nemi George, a seasoned Chief Information Security Officer (CISO) of Pacific Dental Services, as they cover a complex tapestry of modern cybersecurity concerns.<br/><br/>The discussion covers diverse topics including the evolving threat landscape, the rise of sophisticated cyber attacks, evolving insider threats, risk management, supply chain complexity, and the value of preventive action. <br/><br/>As the conversation unfolds, Nemi highlights the importance of a robust security culture within an organization, articulating that while technology is a critical line of defense, the human element remains the most unpredictable.  Initiatives to enhance security awareness, continual education programs, and behavioral analytics to detect insider threats are discussed as key strategies.<br/><br/>A portion of the conversation is dedicated to the impact of regulatory compliance with Nemi discussing the challenges in navigating complex international laws such as the GDPR, CCPA, and industry/state-specific regulations.  Amidst the discussion, Nemi emphasizes the importance of privacy by design and the role of the CISO in ensuring that compliance enhances, rather than hinders, business operations.<br/><br/>As the conversation nears its conclusion, Nemi speaks candidly about the future, including the advent of artificial intelligence as a technology that both enhances security measures while also inevitability being used by adversaries as well.  <br/><br/>This important podcast ultimately touches on the intersection of business acumen, technical expertise, and strategic thinking required for modern CISOs to thrive and protect their organizations in an age where cybersecurity is a key pillar of business continuity.<br/><br/>We hope you enjoy!</p>]]></description>
    <content:encoded><![CDATA[<p>Join Satbir and Darren as they interview Nemi George, a seasoned Chief Information Security Officer (CISO) of Pacific Dental Services, as they cover a complex tapestry of modern cybersecurity concerns.<br/><br/>The discussion covers diverse topics including the evolving threat landscape, the rise of sophisticated cyber attacks, evolving insider threats, risk management, supply chain complexity, and the value of preventive action. <br/><br/>As the conversation unfolds, Nemi highlights the importance of a robust security culture within an organization, articulating that while technology is a critical line of defense, the human element remains the most unpredictable.  Initiatives to enhance security awareness, continual education programs, and behavioral analytics to detect insider threats are discussed as key strategies.<br/><br/>A portion of the conversation is dedicated to the impact of regulatory compliance with Nemi discussing the challenges in navigating complex international laws such as the GDPR, CCPA, and industry/state-specific regulations.  Amidst the discussion, Nemi emphasizes the importance of privacy by design and the role of the CISO in ensuring that compliance enhances, rather than hinders, business operations.<br/><br/>As the conversation nears its conclusion, Nemi speaks candidly about the future, including the advent of artificial intelligence as a technology that both enhances security measures while also inevitability being used by adversaries as well.  <br/><br/>This important podcast ultimately touches on the intersection of business acumen, technical expertise, and strategic thinking required for modern CISOs to thrive and protect their organizations in an age where cybersecurity is a key pillar of business continuity.<br/><br/>We hope you enjoy!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/13913309-episode-37-ciso-perspectives-on-cybersecurity-programs-risks-and-priorities.mp3" length="22629130" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fjfzxs8nq1bh5pgjvlw5x56w2vaw?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13913309</guid>
    <pubDate>Sun, 05 Nov 2023 13:00:00 -0800</pubDate>
    <itunes:duration>1882</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>37</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #35 - Using Aviatrix to simplify multi-cloud networking</itunes:title>
    <title>Episode #35 - Using Aviatrix to simplify multi-cloud networking</title>
    <itunes:summary><![CDATA[Enterprises are not confined to the boundaries of a single cloud environment.  But as many adopters have discovered, navigating multi-cloud isn't without its challenges from a networking perspective.  The once-promised flexibility and scalability of the multi-cloud model are often overshadowed by daunting complexities, diminished visibility, and fragmented control mechanisms.  The disparate networking and security paradigms of each CSP have all but eroded the notion of a seamle...]]></itunes:summary>
    <description><![CDATA[<p>Enterprises are not confined to the boundaries of a single cloud environment.  But as many adopters have discovered, navigating multi-cloud isn&apos;t without its challenges from a networking perspective.  The once-promised flexibility and scalability of the multi-cloud model are often overshadowed by daunting complexities, diminished visibility, and fragmented control mechanisms.  The disparate networking and security paradigms of each CSP have all but eroded the notion of a seamless integration experience, ushering in the need for an overlay capability.<br/><br/>Aviatrix&apos;s answer is both innovative and intuitive. The company sought to reimagine the entire multi-cloud networking paradigm. By developing a platform that provided a unified control plane, Aviatrix ensured that businesses could have a singular, centralized view of their entire network topology, irrespective of the cloud provider. This was complemented by advanced networking and security features that addressed the individual quirks and requirements of each cloud environment, ensuring seamless operation across the board.<br/><br/>Join  Satbir and Darren as they speak with Chris McHenry, Head of Product Management, about what makes Aviatrix unique in the space of multi-cloud networking.</p>]]></description>
    <content:encoded><![CDATA[<p>Enterprises are not confined to the boundaries of a single cloud environment.  But as many adopters have discovered, navigating multi-cloud isn&apos;t without its challenges from a networking perspective.  The once-promised flexibility and scalability of the multi-cloud model are often overshadowed by daunting complexities, diminished visibility, and fragmented control mechanisms.  The disparate networking and security paradigms of each CSP have all but eroded the notion of a seamless integration experience, ushering in the need for an overlay capability.<br/><br/>Aviatrix&apos;s answer is both innovative and intuitive. The company sought to reimagine the entire multi-cloud networking paradigm. By developing a platform that provided a unified control plane, Aviatrix ensured that businesses could have a singular, centralized view of their entire network topology, irrespective of the cloud provider. This was complemented by advanced networking and security features that addressed the individual quirks and requirements of each cloud environment, ensuring seamless operation across the board.<br/><br/>Join  Satbir and Darren as they speak with Chris McHenry, Head of Product Management, about what makes Aviatrix unique in the space of multi-cloud networking.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/13737734-episode-35-using-aviatrix-to-simplify-multi-cloud-networking.mp3" length="34068259" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4xkvxcc7pfzxktxc0hailyi6zazb?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13737734</guid>
    <pubDate>Sun, 08 Oct 2023 10:00:00 -0700</pubDate>
    <itunes:duration>2834</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #36 - Leveraging Deep Learning for Deep Defense</itunes:title>
    <title>Episode #36 - Leveraging Deep Learning for Deep Defense</title>
    <itunes:summary><![CDATA[Traditional cybersecurity approaches, often retrospective in nature, race to detect and respond to threats only after they've manifested. This reactive paradigm, although necessary, leaves a window of vulnerability—a time-lapse during which systems are exposed, data is compromised, and infrastructures are at risk.  Deep Instinct represents a seismic shift in the way we approach cybersecurity.  What makes Deep Instinct stand out in the vast sea of cybersecurity firms lies in their use of ...]]></itunes:summary>
    <description><![CDATA[<p>Traditional cybersecurity approaches, often retrospective in nature, race to detect and respond to threats only after they&apos;ve manifested. This reactive paradigm, although necessary, leaves a window of vulnerability—a time-lapse during which systems are exposed, data is compromised, and infrastructures are at risk.<br/><br/>Deep Instinct represents a seismic shift in the way we approach cybersecurity.  What makes Deep Instinct stand out in the vast sea of cybersecurity firms lies in their use of deep learning.  Inspired by the structure of the human brain, deep learning enables computers to learn from vast datasets and make independent decisions when distinguishing benign from malicious activity. This exhaustive training equips the system to recognize and thwart even the most novel threats, those that conventional systems might overlook.<br/><br/>While many companies leverage machine learning for post-breach detection, Deep Instinct&apos;s platform is designed for zero-time prevention. Its deep learning models, once trained, can instantaneously analyze data, making split-second decisions to halt threats in their tracks. This preemptive approach narrows the vulnerability window, fortifying systems against both known and unknown cyber adversaries.<br/><br/>Join  Satbir and Darren as they speak with Carl Froggett, CIO &amp; CISO, about what makes Deep Instinct unique in how they approach cyber-defense.</p>]]></description>
    <content:encoded><![CDATA[<p>Traditional cybersecurity approaches, often retrospective in nature, race to detect and respond to threats only after they&apos;ve manifested. This reactive paradigm, although necessary, leaves a window of vulnerability—a time-lapse during which systems are exposed, data is compromised, and infrastructures are at risk.<br/><br/>Deep Instinct represents a seismic shift in the way we approach cybersecurity.  What makes Deep Instinct stand out in the vast sea of cybersecurity firms lies in their use of deep learning.  Inspired by the structure of the human brain, deep learning enables computers to learn from vast datasets and make independent decisions when distinguishing benign from malicious activity. This exhaustive training equips the system to recognize and thwart even the most novel threats, those that conventional systems might overlook.<br/><br/>While many companies leverage machine learning for post-breach detection, Deep Instinct&apos;s platform is designed for zero-time prevention. Its deep learning models, once trained, can instantaneously analyze data, making split-second decisions to halt threats in their tracks. This preemptive approach narrows the vulnerability window, fortifying systems against both known and unknown cyber adversaries.<br/><br/>Join  Satbir and Darren as they speak with Carl Froggett, CIO &amp; CISO, about what makes Deep Instinct unique in how they approach cyber-defense.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/13737357-episode-36-leveraging-deep-learning-for-deep-defense.mp3" length="22851737" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/r88siibj2q14s6d4xx31czcql0om?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13737357</guid>
    <pubDate>Sun, 08 Oct 2023 09:00:00 -0700</pubDate>
    <itunes:duration>1901</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #41 - Using synthetic data for ultimate privacy</itunes:title>
    <title>Episode #41 - Using synthetic data for ultimate privacy</title>
    <itunes:summary><![CDATA[Data security is heavily dependent on context, and as organizations contemplate Test Data Management (TDM) they must consider not only de-identification strategies but re-identification probabilities as well.    Data privacy regulations are becoming more stringent, with some regulations having an ‘extraterritorial scoping clause’ that stipulates that organizations must comply with regulations regardless of where the data resides, if collecting data on their constituents (e.g., GDPR and P...]]></itunes:summary>
    <description><![CDATA[<p>Data security is heavily dependent on context, and as organizations contemplate Test Data Management (TDM) they must consider not only de-identification strategies but re-identification probabilities as well.  <br/><br/>Data privacy regulations are becoming more stringent, with some regulations having an ‘<b>extraterritorial scoping clause’</b> that stipulates that organizations must comply with regulations <b><em>regardless of where the data resides</em></b>, if collecting data on their constituents (e.g., GDPR and PIPL).  Further, even if all direct identifiers are stripped out of a data set, the data will still be considered personal data if it is possible to <b><em>link</em></b> any data subjects to information in the data set relating to them (as per Recital 26 GDPR).  In other words, according to GDPR, a person does <b><em>not have to be named to be identifiable</em></b>. If there is other information enabling an individual to be simply <b><em>connected</em></b> to data about them, they may still be considered ‘identified’.<br/><br/>An organization, using proper techniques combined with re-identification risk management procedures, remains among the strongest and most important tools in protecting privacy.   Tonic is one such vendor that applies advanced concepts to de-identify aggregate datasets.  They specialize in synthetic data, which by definition is differentially private, though they can also selectively de-identify identifiers and quasi-identifiers in complex schemas (e.g., structured and semi-structured data).  <br/><br/>Join  <a href='https://www.linkedin.com/in/satbirsran/'>Satbir</a> and <a href='https://www.linkedin.com/in/darrenaboyd/'>Darren</a> as they speak with Adam Kamor, Tonic Co-Founder and Head of Engineering, about what makes Tonic unique in the space of data de-identification.</p>]]></description>
    <content:encoded><![CDATA[<p>Data security is heavily dependent on context, and as organizations contemplate Test Data Management (TDM) they must consider not only de-identification strategies but re-identification probabilities as well.  <br/><br/>Data privacy regulations are becoming more stringent, with some regulations having an ‘<b>extraterritorial scoping clause’</b> that stipulates that organizations must comply with regulations <b><em>regardless of where the data resides</em></b>, if collecting data on their constituents (e.g., GDPR and PIPL).  Further, even if all direct identifiers are stripped out of a data set, the data will still be considered personal data if it is possible to <b><em>link</em></b> any data subjects to information in the data set relating to them (as per Recital 26 GDPR).  In other words, according to GDPR, a person does <b><em>not have to be named to be identifiable</em></b>. If there is other information enabling an individual to be simply <b><em>connected</em></b> to data about them, they may still be considered ‘identified’.<br/><br/>An organization, using proper techniques combined with re-identification risk management procedures, remains among the strongest and most important tools in protecting privacy.   Tonic is one such vendor that applies advanced concepts to de-identify aggregate datasets.  They specialize in synthetic data, which by definition is differentially private, though they can also selectively de-identify identifiers and quasi-identifiers in complex schemas (e.g., structured and semi-structured data).  <br/><br/>Join  <a href='https://www.linkedin.com/in/satbirsran/'>Satbir</a> and <a href='https://www.linkedin.com/in/darrenaboyd/'>Darren</a> as they speak with Adam Kamor, Tonic Co-Founder and Head of Engineering, about what makes Tonic unique in the space of data de-identification.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/13607919-episode-41-using-synthetic-data-for-ultimate-privacy.mp3" length="22326819" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ufl60h7qh9wejyih7udq1q59gfa4?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13607919</guid>
    <pubDate>Sun, 17 Sep 2023 17:00:00 -0700</pubDate>
    <itunes:duration>1855</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #34 - A trace-based approach to runtime security</itunes:title>
    <title>Episode #34 - A trace-based approach to runtime security</title>
    <itunes:summary><![CDATA[Spyderbat continuously records ALL runtime context in an environment (from Kernel to Cloud) while providing causal linkage (recording both good &amp; bad events alike). Alerts can then be traced along the resultant causal chain that's created. Normal behaviors can then be safely ignored, allowing practitioners to focus on more toxic combinations ONLY (i.e., Alerts-to-Traces).   Practitioners can then group behaviors for another order of magnitude reduction in alerts.   To do this, S...]]></itunes:summary>
    <description><![CDATA[<p>Spyderbat continuously records ALL runtime context in an environment (from Kernel to Cloud) while providing causal linkage (recording both good &amp; bad events alike). Alerts can then be <em>traced</em> along the resultant causal chain that&apos;s created. Normal behaviors can then be safely ignored, allowing practitioners to focus on more toxic combinations ONLY (i.e., Alerts-to-Traces).<br/> <br/>Practitioners can then group behaviors for another order of magnitude reduction in alerts.<br/> <br/>To do this, Spyderbat has developed the following algorithms:</p><ol><li><b>Guardian</b> - Records context to determine and visualize aggregate event significance in the environment. Guardian is the backbone that surfaces risk while addressing drift by comparing running applications against prior versions </li><li><b>Flashback</b> - Replays the sequence of activities within/across containers at the earliest warning signs of trouble</li><li><b>Scout</b> - Maps to <em>Mitre Attack Matrix</em> and <em>Kubernetes Threat Matrix</em> and identifies attacks based on suspicious behaviors. </li><li><b>Interceptor</b> - Acts as automatic guardrails to protect known-good processes, extracts attackers, and rolls back misconfigurations. </li></ol><p><br/>Collectively this delivers on the value chain from <em>causality through enforcement.</em></p>]]></description>
    <content:encoded><![CDATA[<p>Spyderbat continuously records ALL runtime context in an environment (from Kernel to Cloud) while providing causal linkage (recording both good &amp; bad events alike). Alerts can then be <em>traced</em> along the resultant causal chain that&apos;s created. Normal behaviors can then be safely ignored, allowing practitioners to focus on more toxic combinations ONLY (i.e., Alerts-to-Traces).<br/> <br/>Practitioners can then group behaviors for another order of magnitude reduction in alerts.<br/> <br/>To do this, Spyderbat has developed the following algorithms:</p><ol><li><b>Guardian</b> - Records context to determine and visualize aggregate event significance in the environment. Guardian is the backbone that surfaces risk while addressing drift by comparing running applications against prior versions </li><li><b>Flashback</b> - Replays the sequence of activities within/across containers at the earliest warning signs of trouble</li><li><b>Scout</b> - Maps to <em>Mitre Attack Matrix</em> and <em>Kubernetes Threat Matrix</em> and identifies attacks based on suspicious behaviors. </li><li><b>Interceptor</b> - Acts as automatic guardrails to protect known-good processes, extracts attackers, and rolls back misconfigurations. </li></ol><p><br/>Collectively this delivers on the value chain from <em>causality through enforcement.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/13351617-episode-34-a-trace-based-approach-to-runtime-security.mp3" length="30919709" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kjn1avoqxyp8v1v9y099m3wsa4tj?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13351617</guid>
    <pubDate>Fri, 04 Aug 2023 15:00:00 -0700</pubDate>
    <itunes:duration>2573</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #33 - A discussion with Sounil Yu, author of the Cyber Defense Matrix</itunes:title>
    <title>Episode #33 - A discussion with Sounil Yu, author of the Cyber Defense Matrix</title>
    <itunes:summary><![CDATA[Sounil Yu is an author, cybersecurity visionary/strategist, advisor, security scientist, and leader.  In his capacity of Chief Security Scientist at BoA he was in part responsible for developing and optimizing their cybersecurity portfolio.  With an ever-expanding set of entrants in cybersecurity, he recognized the need to develop a framework that would provide a consistent mechanism to describe and organize solutions.  Over the last several years this framework, the Cyber Defe...]]></itunes:summary>
    <description><![CDATA[<p>Sounil Yu is an author, cybersecurity visionary/strategist, advisor, security scientist, and leader.  In his capacity of Chief Security Scientist at BoA he was in part responsible for developing and optimizing their cybersecurity portfolio.  With an ever-expanding set of entrants in cybersecurity, he recognized the need to develop a framework that would provide a consistent mechanism to describe and organize solutions.  Over the last several years this framework, the Cyber Defense Matrix, has evolved into a very robust matrix that can apply to an expanding set of use cases.  <br/><br/>At The Incubator Podcast, we are using the matrix to not only map out vendors in the cybersecurity domain, but to also anticipate vendor movement between adjacent capabilities to assist clients with deliberate rationalization and optimization exercises.  Our customers tire of the &apos;expense in depth&apos; that accompanies market narratives in the domain of cybersecurity and we aim to provide purposeful and defensible portfolio strategies.</p>]]></description>
    <content:encoded><![CDATA[<p>Sounil Yu is an author, cybersecurity visionary/strategist, advisor, security scientist, and leader.  In his capacity of Chief Security Scientist at BoA he was in part responsible for developing and optimizing their cybersecurity portfolio.  With an ever-expanding set of entrants in cybersecurity, he recognized the need to develop a framework that would provide a consistent mechanism to describe and organize solutions.  Over the last several years this framework, the Cyber Defense Matrix, has evolved into a very robust matrix that can apply to an expanding set of use cases.  <br/><br/>At The Incubator Podcast, we are using the matrix to not only map out vendors in the cybersecurity domain, but to also anticipate vendor movement between adjacent capabilities to assist clients with deliberate rationalization and optimization exercises.  Our customers tire of the &apos;expense in depth&apos; that accompanies market narratives in the domain of cybersecurity and we aim to provide purposeful and defensible portfolio strategies.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/13344743-episode-33-a-discussion-with-sounil-yu-author-of-the-cyber-defense-matrix.mp3" length="26318309" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qwczdjbd3w2uwxfsg3moj34gwlyk?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13344743</guid>
    <pubDate>Thu, 03 Aug 2023 10:00:00 -0700</pubDate>
    <itunes:duration>2187</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #32 - OSS LIbrary-Level Analysis and Least Privilege Enforcement</itunes:title>
    <title>Episode #32 - OSS LIbrary-Level Analysis and Least Privilege Enforcement</title>
    <itunes:summary><![CDATA[Oligo Security provides OSS library-level analysis and creates a profile of behavior on runtime.  By evaluating what the OSS packages need from the operating system, they can detect malicious activity for each and every component in runtime.  Through continuous monitoring, they can alert on deviations from baseline behavior and even block those deviations if desired.  They apply a least privilege approach when assessing OSS libraries which reduces alerts by upwards of 85%.&nbsp...]]></itunes:summary>
    <description><![CDATA[<p>Oligo Security provides OSS library-level analysis and creates a profile of behavior on runtime.  By evaluating what the OSS packages need from the operating system, they can detect malicious activity for each and every component in runtime.  Through continuous monitoring, they can alert on deviations from baseline behavior and even block those deviations if desired.  They apply a least privilege approach when assessing OSS libraries which reduces alerts by upwards of 85%.  Given approximately 80% of deployed code contains OSS, Oligo&apos;s least-privilege approach is a true differentiator.   <br/><br/>Join  Satbir and Darren as they speak with Gal Elbaz, Co-Founder and CTO of Oligo Security, about their views on how to practically manage OSS vulnerabilities.</p>]]></description>
    <content:encoded><![CDATA[<p>Oligo Security provides OSS library-level analysis and creates a profile of behavior on runtime.  By evaluating what the OSS packages need from the operating system, they can detect malicious activity for each and every component in runtime.  Through continuous monitoring, they can alert on deviations from baseline behavior and even block those deviations if desired.  They apply a least privilege approach when assessing OSS libraries which reduces alerts by upwards of 85%.  Given approximately 80% of deployed code contains OSS, Oligo&apos;s least-privilege approach is a true differentiator.   <br/><br/>Join  Satbir and Darren as they speak with Gal Elbaz, Co-Founder and CTO of Oligo Security, about their views on how to practically manage OSS vulnerabilities.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/13242449-episode-32-oss-library-level-analysis-and-least-privilege-enforcement.mp3" length="26982008" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6fnvqg3zjmxbs0trjgove8jho4ey?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13242449</guid>
    <pubDate>Mon, 17 Jul 2023 20:00:00 -0700</pubDate>
    <itunes:duration>2246</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #31 - Establishing Enterprise Encryption Supremacy</itunes:title>
    <title>Episode #31 - Establishing Enterprise Encryption Supremacy</title>
    <itunes:summary><![CDATA[Primarily known as a pioneer in Confidential Computing, Fortanix has created a unified data security platform that delivers a suite of services, including multi-cloud key management, tokenization/encryption, Transparent Data Encryption (TDE), and specializes in secure enclaves.  With 30+ granted and pending patents, and a host of awards such as Gartner Cool Vendor and RSA Innovation Sandbox - Fortanix has achieved absolute encryption supremacy for the enterprise.    In this episode,...]]></itunes:summary>
    <description><![CDATA[<p>Primarily known as a pioneer in Confidential Computing, Fortanix has created a unified data security platform that delivers a suite of services, including multi-cloud key management, tokenization/encryption, Transparent Data Encryption (TDE), and specializes in secure enclaves.  With 30+ granted and pending patents, and a host of awards such as Gartner Cool Vendor and RSA Innovation Sandbox - Fortanix has achieved absolute encryption supremacy for the enterprise.  <br/><br/>In this episode, we speak with Faiyaz Shahpurwala, Chief Product and Strategy Officer, as we explore a broad set of use cases to secure enterprise data, wherever it is. <br/><br/>Please listen and contact Satbir and Darren to explore this and other observability-related domains.</p>]]></description>
    <content:encoded><![CDATA[<p>Primarily known as a pioneer in Confidential Computing, Fortanix has created a unified data security platform that delivers a suite of services, including multi-cloud key management, tokenization/encryption, Transparent Data Encryption (TDE), and specializes in secure enclaves.  With 30+ granted and pending patents, and a host of awards such as Gartner Cool Vendor and RSA Innovation Sandbox - Fortanix has achieved absolute encryption supremacy for the enterprise.  <br/><br/>In this episode, we speak with Faiyaz Shahpurwala, Chief Product and Strategy Officer, as we explore a broad set of use cases to secure enterprise data, wherever it is. <br/><br/>Please listen and contact Satbir and Darren to explore this and other observability-related domains.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/13240228-episode-31-establishing-enterprise-encryption-supremacy.mp3" length="23703207" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/p0x38147uzxghpi6edz930j2zfb3?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13240228</guid>
    <pubDate>Mon, 17 Jul 2023 13:00:00 -0700</pubDate>
    <itunes:duration>1972</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #30 - How to build a sustainable AppSec program</itunes:title>
    <title>Episode #30 - How to build a sustainable AppSec program</title>
    <itunes:summary><![CDATA[Apiiro has built its Code Risk Platform to address risks inherent in material changes to application logic/code ... long before those change ship to prod.  Given the imbalance in the ratio of developer to security practitioner, Apiiro's solution is crucial if we are to deliver sustainable security programs that meet the demands of new product introduction.  They are the winner of RSA's Innovation Sandbox and are recognized by Gartner as a Cool Vendor in DevSecOps.     Apii...]]></itunes:summary>
    <description><![CDATA[<p>Apiiro has built its Code Risk Platform to address risks inherent in material changes to application logic/code ... long before those change ship to prod.  Given the imbalance in the ratio of developer to security practitioner, Apiiro&apos;s solution is crucial if we are to deliver sustainable security programs that meet the demands of new product introduction.  They are the winner of RSA&apos;s Innovation Sandbox and are recognized by Gartner as a Cool Vendor in DevSecOps.   <br/><br/>Apiiro establishes an ongoing understanding of the ins and outs of applications and software supply chains, and how the attack surface changes over time.  Their Risk Graph represents all code modules, dependencies, user stories, APIs, data models, development environments, container images, pipelines, technologies, frameworks, contributors, and other application components.  Taking signal logic such as developer behaviors and various security inputs, they can trigger engagement models to allow developers and security practitioners to co-create software changes.  This is a must-have for every security program!<br/><br/>Please listen and contact Satbir and Darren to explore this and other cybersecurity and risk-related domains.</p>]]></description>
    <content:encoded><![CDATA[<p>Apiiro has built its Code Risk Platform to address risks inherent in material changes to application logic/code ... long before those change ship to prod.  Given the imbalance in the ratio of developer to security practitioner, Apiiro&apos;s solution is crucial if we are to deliver sustainable security programs that meet the demands of new product introduction.  They are the winner of RSA&apos;s Innovation Sandbox and are recognized by Gartner as a Cool Vendor in DevSecOps.   <br/><br/>Apiiro establishes an ongoing understanding of the ins and outs of applications and software supply chains, and how the attack surface changes over time.  Their Risk Graph represents all code modules, dependencies, user stories, APIs, data models, development environments, container images, pipelines, technologies, frameworks, contributors, and other application components.  Taking signal logic such as developer behaviors and various security inputs, they can trigger engagement models to allow developers and security practitioners to co-create software changes.  This is a must-have for every security program!<br/><br/>Please listen and contact Satbir and Darren to explore this and other cybersecurity and risk-related domains.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/12867984-episode-30-how-to-build-a-sustainable-appsec-program.mp3" length="22826850" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kfeehjphjkly5l5lccn4ke18wpbc?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12867984</guid>
    <pubDate>Wed, 17 May 2023 09:00:00 -0700</pubDate>
    <itunes:duration>1899</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #29 - Tackling the biggest problem affecting code … dependency lifecycle management</itunes:title>
    <title>Episode #29 - Tackling the biggest problem affecting code … dependency lifecycle management</title>
    <itunes:summary><![CDATA[As it turns out, managing Open Source Software (OSS) dependencies is extremely difficult.  Not all vulnerabilities are in runtime and/or reachable, not all exploits focus on high/critical CVSS, there is a time delay with patches when they are made available, and Semantic Versioning (SerVer) can make prioritization challenging when thinking through backward compatibility, upgrade paths, version pinning in supply chain, etc.  Though estimates vary based on source, some 80% of deployed code...]]></itunes:summary>
    <description><![CDATA[<p>As it turns out, managing Open Source Software (OSS) dependencies is extremely difficult.  Not all vulnerabilities are in runtime and/or reachable, not all exploits focus on high/critical CVSS, there is a time delay with patches when they are made available, and Semantic Versioning (SerVer) can make prioritization challenging when thinking through backward compatibility, upgrade paths, version pinning in supply chain, etc.<br/><br/>Though estimates vary based on source, some 80% of deployed code is now OSS with 95% of vulnerabilities taking place in transitive dependencies.  What’s more, when looking at the Census II report () approximately 50% of all packages tracked did NOT have a release in 2022.  This is an intractable problem and a reason why Endor Labs started development back in 2021.  <br/><br/>As they so eloquently state, “Software ages like milk, not like wine”.  <br/><br/>In this podcast episode, <a href='https://www.linkedin.com/in/satbirsran/'>Satbir</a> and <a href='https://www.linkedin.com/in/darrenaboyd/'>Darren</a> explore the Software Composition Analysis (SCA) domain with Varun Badhwar, CEO/Founder of Endor Labs, regarding how to focus teams on the most relevant vulnerabilities associated with their OSS code and how many AppSec programs are starting to focus efforts in this area.</p>]]></description>
    <content:encoded><![CDATA[<p>As it turns out, managing Open Source Software (OSS) dependencies is extremely difficult.  Not all vulnerabilities are in runtime and/or reachable, not all exploits focus on high/critical CVSS, there is a time delay with patches when they are made available, and Semantic Versioning (SerVer) can make prioritization challenging when thinking through backward compatibility, upgrade paths, version pinning in supply chain, etc.<br/><br/>Though estimates vary based on source, some 80% of deployed code is now OSS with 95% of vulnerabilities taking place in transitive dependencies.  What’s more, when looking at the Census II report () approximately 50% of all packages tracked did NOT have a release in 2022.  This is an intractable problem and a reason why Endor Labs started development back in 2021.  <br/><br/>As they so eloquently state, “Software ages like milk, not like wine”.  <br/><br/>In this podcast episode, <a href='https://www.linkedin.com/in/satbirsran/'>Satbir</a> and <a href='https://www.linkedin.com/in/darrenaboyd/'>Darren</a> explore the Software Composition Analysis (SCA) domain with Varun Badhwar, CEO/Founder of Endor Labs, regarding how to focus teams on the most relevant vulnerabilities associated with their OSS code and how many AppSec programs are starting to focus efforts in this area.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/12764520-episode-29-tackling-the-biggest-problem-affecting-code-dependency-lifecycle-management.mp3" length="19737606" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/h1sym0vhzxyzeafzuyomdu5w5k86?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12764520</guid>
    <pubDate>Mon, 01 May 2023 19:00:00 -0700</pubDate>
    <itunes:duration>1640</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #28 - A discussion of data cloud economies and security, with Navindra Yadav</itunes:title>
    <title>Episode #28 - A discussion of data cloud economies and security, with Navindra Yadav</title>
    <itunes:summary><![CDATA[Data platforms are evolving, allowing data clouds to connect with consumers and producers of data that may be external or internal to your organization.  Sharing with upstream/downstream partners in this data economy presents significant challenges to protecting data.    Join us as we discuss this economy and the security implications, with Navindra Yadav, CEO &amp; Co-Founder of Theom. ]]></itunes:summary>
    <description><![CDATA[<p>Data platforms are evolving, allowing data clouds to connect with consumers and producers of data that may be external or internal to your organization.  Sharing with upstream/downstream partners in this data economy presents significant challenges to protecting data.  <br/><br/>Join us as we discuss this economy and the security implications, with Navindra Yadav, CEO &amp; Co-Founder of Theom.</p>]]></description>
    <content:encoded><![CDATA[<p>Data platforms are evolving, allowing data clouds to connect with consumers and producers of data that may be external or internal to your organization.  Sharing with upstream/downstream partners in this data economy presents significant challenges to protecting data.  <br/><br/>Join us as we discuss this economy and the security implications, with Navindra Yadav, CEO &amp; Co-Founder of Theom.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/12708885-episode-28-a-discussion-of-data-cloud-economies-and-security-with-navindra-yadav.mp3" length="19367234" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cf3uamsysp84hwck8nc1qrf7ddck?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12708885</guid>
    <pubDate>Sun, 23 Apr 2023 19:00:00 -0700</pubDate>
    <itunes:duration>1609</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #27 - Promoting Open Standards Observability at a massive scale</itunes:title>
    <title>Episode #27 - Promoting Open Standards Observability at a massive scale</title>
    <itunes:summary><![CDATA[Nobody understands observability at scale quite like Chronosphere co-founders Martin Mao (CEO) and Rob Skillington (CTO).  While at Uber they created, and open-sourced, the M3 metrics engine, which was capable of handling billions of data points that describe the most complex environments.  Then, in 2019, they founded Chronosphere which is now valued at over a billion dollars.  Chronosphere focuses on capabilities that help Product Teams work more efficiently to manage their applica...]]></itunes:summary>
    <description><![CDATA[<p>Nobody understands observability at scale quite like Chronosphere co-founders Martin Mao (CEO) and Rob Skillington (CTO).  While at Uber they created, and open-sourced, the M3 metrics engine, which was capable of handling billions of data points that describe the most complex environments.  Then, in 2019, they founded Chronosphere which is now valued at over a billion dollars.<br/><br/>Chronosphere focuses on capabilities that help Product Teams work more efficiently to manage their applications.  The company’s trace metrics help developers and SREs create a single metric that represents all or part of their business logic call flow, such that visibility and alerting can focus on the things that matter.  They also provide the ability to set data quotas on teams so Product Teams can better manage their costs against centrally managed quotas.  <br/><br/>Chronosphere is committed to open source, having donated PromLens (a query builder for Prometheus) to Prometheus, as well as providing complete support to OpenTelemetry (a Cloud Native Computing Foundation (CNCF) project set to soon overtake Kubernetes in terms of contributions.  For any company that desires to support open standards with its observability strategy, Chronosphere is a must-have platform!<br/><br/>Please listen and contact Satbir and Darren to explore this and other observability-related domains.</p>]]></description>
    <content:encoded><![CDATA[<p>Nobody understands observability at scale quite like Chronosphere co-founders Martin Mao (CEO) and Rob Skillington (CTO).  While at Uber they created, and open-sourced, the M3 metrics engine, which was capable of handling billions of data points that describe the most complex environments.  Then, in 2019, they founded Chronosphere which is now valued at over a billion dollars.<br/><br/>Chronosphere focuses on capabilities that help Product Teams work more efficiently to manage their applications.  The company’s trace metrics help developers and SREs create a single metric that represents all or part of their business logic call flow, such that visibility and alerting can focus on the things that matter.  They also provide the ability to set data quotas on teams so Product Teams can better manage their costs against centrally managed quotas.  <br/><br/>Chronosphere is committed to open source, having donated PromLens (a query builder for Prometheus) to Prometheus, as well as providing complete support to OpenTelemetry (a Cloud Native Computing Foundation (CNCF) project set to soon overtake Kubernetes in terms of contributions.  For any company that desires to support open standards with its observability strategy, Chronosphere is a must-have platform!<br/><br/>Please listen and contact Satbir and Darren to explore this and other observability-related domains.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/12578241-episode-27-promoting-open-standards-observability-at-a-massive-scale.mp3" length="27775901" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gje8zj5p7vtu98j0ryhi1rszored?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12578241</guid>
    <pubDate>Mon, 03 Apr 2023 08:00:00 -0700</pubDate>
    <itunes:duration>2310</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #26 - An Insider Threat Platform that Protects Individual Privacy</itunes:title>
    <title>Episode #26 - An Insider Threat Platform that Protects Individual Privacy</title>
    <itunes:summary><![CDATA[When considering an Insider Risk Management (IRM) program a confluence of events complicates effective execution, including a general increase in financial hardship due to the current economic climate, an increasingly remote corporate workforce, steady growth in the gig economy, privacy concerns regarding individual liberties, and negative perceptions of organizations developing a 'surveilling’ presence.    Insider threat is inherently a human challenge that must look beyond the traditio...]]></itunes:summary>
    <description><![CDATA[<p>When considering an Insider Risk Management (IRM) program a confluence of events complicates effective execution, including a general increase in financial hardship due to the current economic climate, an increasingly remote corporate workforce, steady growth in the gig economy, privacy concerns regarding individual liberties, and negative perceptions of organizations developing a &apos;surveilling’ presence.  <br/><br/>Insider threat is inherently a human challenge that must look beyond the traditional focus on cyber-only components - to also include human, organizational, and physical approaches &amp; sensors.  DTEX Systems operates in this space, providing significant thought leadership and even forming a Public-Private Partnership (PPP) with MITRE as they jointly develop an Insider Risk Management Framework (coming soon).   <br/><br/>Through their patented privacy-compliant metadata collection, they can surface abhorrent and abnormal behavioral patterns as ‘indicators of intent’ to mitigate malicious, complacent, or unintentional acts that negatively affect the triad of confidentiality, integrity, and availability for an organization, its data, personnel, and/or facilities.  <br/><br/>In this episode, we speak with Brian Stoner, Vice President of Worldwide Channels and Alliances, to uncover DTEX’s approach to balancing the needs of the individual while empowering organizations to act on contextual intelligence to stop insider threats.</p>]]></description>
    <content:encoded><![CDATA[<p>When considering an Insider Risk Management (IRM) program a confluence of events complicates effective execution, including a general increase in financial hardship due to the current economic climate, an increasingly remote corporate workforce, steady growth in the gig economy, privacy concerns regarding individual liberties, and negative perceptions of organizations developing a &apos;surveilling’ presence.  <br/><br/>Insider threat is inherently a human challenge that must look beyond the traditional focus on cyber-only components - to also include human, organizational, and physical approaches &amp; sensors.  DTEX Systems operates in this space, providing significant thought leadership and even forming a Public-Private Partnership (PPP) with MITRE as they jointly develop an Insider Risk Management Framework (coming soon).   <br/><br/>Through their patented privacy-compliant metadata collection, they can surface abhorrent and abnormal behavioral patterns as ‘indicators of intent’ to mitigate malicious, complacent, or unintentional acts that negatively affect the triad of confidentiality, integrity, and availability for an organization, its data, personnel, and/or facilities.  <br/><br/>In this episode, we speak with Brian Stoner, Vice President of Worldwide Channels and Alliances, to uncover DTEX’s approach to balancing the needs of the individual while empowering organizations to act on contextual intelligence to stop insider threats.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/12521489-episode-26-an-insider-threat-platform-that-protects-individual-privacy.mp3" length="24906529" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/efae9zazc8gl1ggcy8h6wua389ji?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12521489</guid>
    <pubDate>Sun, 26 Mar 2023 23:00:00 -0700</pubDate>
    <itunes:duration>2071</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #25 - Helping Defenders focus on exceptions by offloading day-to-day, with StrikeReady</itunes:title>
    <title>Episode #25 - Helping Defenders focus on exceptions by offloading day-to-day, with StrikeReady</title>
    <itunes:summary><![CDATA[The annual Cybersecurity Workforce Study conducted by (ISC)² modeled the existing talent shortage as 3.4 million professionals in 2022, up 26% from their 2021 study.   The purchasing of a multitude of security products to offset skill gaps can fall short as operators struggle to adapt processes and extract value from toolchains that may or may not be flexible in handling an evolving threat landscape.    Many available security automation products require an operator to construct, de...]]></itunes:summary>
    <description><![CDATA[<p>The annual Cybersecurity Workforce Study conducted by (ISC)² modeled the existing talent shortage as 3.4 million professionals in 2022, up 26% from their 2021 study.   The purchasing of a multitude of security products to offset skill gaps can fall short as operators struggle to adapt processes and extract value from toolchains that may or may not be flexible in handling an evolving threat landscape.  <br/><br/>Many available security automation products require an operator to construct, deconstruct, and reconstruct a set of playbooks that include a number of static decision blocks, which are clearly not optimized for ad-hoc or potentially ex-ante scenarios.   <br/><br/>In this episode we have a conversation with Salim Scafuto, Global VP of Customer Success and Sales Engineering, of StrikeReady, about their platform and how its logic layers (attack harvesting, knowledge harvesting, action invocation, analysis &amp; context) combined with their machine learning capabilities (e.g., deep neural networks, convolutional deep neural networks, deep belief networks,   recurrent neural networks) can allow an operator to reason with their environment to thwart attacks.  <br/><br/>The platform allows operators to engage in knowledge-seeking questions that invoke a security-centric conversation with their reasoning engine (e.g., such as asking, “what is ransomware?”, or, “who is APTXXX?”), a contextual awareness question  to obtain a degree of business insight (e.g., such as asking “am I currently at risk for ransomware?”), or even an automation-based command for incident response and proactive operation (e.g., such as issuing the command, “check this email for phishing”, or, “assess my risk against mummyspider”).<br/><br/>With a host of integrations and a TAXII client to ingest a set of threat feeds, the platform is enabling a broad range of responses that mimic a security professional, offsetting much of the day-to-day load and allowing practitioners to focus more on the exceptions.  <br/><br/>Please listen and contact Satbir and Darren to explore this and other cybersecurity-related domains.</p>]]></description>
    <content:encoded><![CDATA[<p>The annual Cybersecurity Workforce Study conducted by (ISC)² modeled the existing talent shortage as 3.4 million professionals in 2022, up 26% from their 2021 study.   The purchasing of a multitude of security products to offset skill gaps can fall short as operators struggle to adapt processes and extract value from toolchains that may or may not be flexible in handling an evolving threat landscape.  <br/><br/>Many available security automation products require an operator to construct, deconstruct, and reconstruct a set of playbooks that include a number of static decision blocks, which are clearly not optimized for ad-hoc or potentially ex-ante scenarios.   <br/><br/>In this episode we have a conversation with Salim Scafuto, Global VP of Customer Success and Sales Engineering, of StrikeReady, about their platform and how its logic layers (attack harvesting, knowledge harvesting, action invocation, analysis &amp; context) combined with their machine learning capabilities (e.g., deep neural networks, convolutional deep neural networks, deep belief networks,   recurrent neural networks) can allow an operator to reason with their environment to thwart attacks.  <br/><br/>The platform allows operators to engage in knowledge-seeking questions that invoke a security-centric conversation with their reasoning engine (e.g., such as asking, “what is ransomware?”, or, “who is APTXXX?”), a contextual awareness question  to obtain a degree of business insight (e.g., such as asking “am I currently at risk for ransomware?”), or even an automation-based command for incident response and proactive operation (e.g., such as issuing the command, “check this email for phishing”, or, “assess my risk against mummyspider”).<br/><br/>With a host of integrations and a TAXII client to ingest a set of threat feeds, the platform is enabling a broad range of responses that mimic a security professional, offsetting much of the day-to-day load and allowing practitioners to focus more on the exceptions.  <br/><br/>Please listen and contact Satbir and Darren to explore this and other cybersecurity-related domains.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/12518155-episode-25-helping-defenders-focus-on-exceptions-by-offloading-day-to-day-with-strikeready.mp3" length="29447021" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8tcu7iwihbifiekwtu9ftb3iza1a?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12518155</guid>
    <pubDate>Sun, 26 Mar 2023 12:00:00 -0700</pubDate>
    <itunes:duration>2450</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #24 - Unifying Security Technology and Human Intelligence with Synack</itunes:title>
    <title>Episode #24 - Unifying Security Technology and Human Intelligence with Synack</title>
    <itunes:summary><![CDATA[Disrupting traditional security testing approaches is where Synack specializes. They have long recognized that to thwart attacks in modern adversarial campaigns requires a maximal combined talent of human and AI-powered intelligence.  Through the gamification and use of crowdsourced expertise across verifiable exercises, Synack leverages its Synack Red Team (SRT), a global network of ethical hackers, to identify and address vulnerabilities across an ever-evolving attack surface.    ...]]></itunes:summary>
    <description><![CDATA[<p>Disrupting traditional security testing approaches is where Synack specializes. They have long recognized that to thwart attacks in modern adversarial campaigns requires a maximal combined talent of human and AI-powered intelligence.  Through the gamification and use of crowdsourced expertise across verifiable exercises, Synack leverages its Synack Red Team (SRT), a global network of ethical hackers, to identify and address vulnerabilities across an ever-evolving attack surface.  <br/><br/></p><p>This crowdsourced team of highly skilled and heavily vetted ethical hackers represents one of Synack&apos;s key differentiators.  Traditional security assessments and audits provide point-in-time insights into an enterprise&apos;s security posture which does little to illuminate an organization&apos;s cyber defense capabilities, processes, or controls.  Synack instead opts to use an incentive-driven model that allows their security practitioners to employ any Tactics, Techniques, and Procedures (TTPs) they deem appropriate, encouraging behavior that more readily models exploitation hunting as an adversary would.  Sessions are recorded and exploits are verified via other members, providing a capture into how the vulnerabilities are found, along with how long it took, what the relative effort was to identify, and what remediation steps are recommended.  Re-test is part of the service for closed-loop verification.  </p><p><br/></p><p>Join us in this episode as we speak with Tim Lawrence, Solution Architect as we go into greater depth into how Synack can provide resilience to any organization.  In a market where security practitioners are hard to come by, this is a firm to engage with. <br/><br/> </p><p>Please reach out to us to discover how we develop closed-loop resilience patterns in a modern SSDLC!</p>]]></description>
    <content:encoded><![CDATA[<p>Disrupting traditional security testing approaches is where Synack specializes. They have long recognized that to thwart attacks in modern adversarial campaigns requires a maximal combined talent of human and AI-powered intelligence.  Through the gamification and use of crowdsourced expertise across verifiable exercises, Synack leverages its Synack Red Team (SRT), a global network of ethical hackers, to identify and address vulnerabilities across an ever-evolving attack surface.  <br/><br/></p><p>This crowdsourced team of highly skilled and heavily vetted ethical hackers represents one of Synack&apos;s key differentiators.  Traditional security assessments and audits provide point-in-time insights into an enterprise&apos;s security posture which does little to illuminate an organization&apos;s cyber defense capabilities, processes, or controls.  Synack instead opts to use an incentive-driven model that allows their security practitioners to employ any Tactics, Techniques, and Procedures (TTPs) they deem appropriate, encouraging behavior that more readily models exploitation hunting as an adversary would.  Sessions are recorded and exploits are verified via other members, providing a capture into how the vulnerabilities are found, along with how long it took, what the relative effort was to identify, and what remediation steps are recommended.  Re-test is part of the service for closed-loop verification.  </p><p><br/></p><p>Join us in this episode as we speak with Tim Lawrence, Solution Architect as we go into greater depth into how Synack can provide resilience to any organization.  In a market where security practitioners are hard to come by, this is a firm to engage with. <br/><br/> </p><p>Please reach out to us to discover how we develop closed-loop resilience patterns in a modern SSDLC!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/12401626-episode-24-unifying-security-technology-and-human-intelligence-with-synack.mp3" length="21533594" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/77c28o9my56wd8nccaq8h9khaims?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12401626</guid>
    <pubDate>Wed, 08 Mar 2023 10:00:00 -0800</pubDate>
    <itunes:duration>1791</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #23 - Cyber Defense Services Forged from the Front Lines</itunes:title>
    <title>Episode #23 - Cyber Defense Services Forged from the Front Lines</title>
    <itunes:summary><![CDATA[At its core, BlueVoyant offers MDR and managed SIEM services for Splunk and Microsoft Sentinel, though they also provide EDR services, 24/7 security monitoring, alert investigations &amp; incident response, forensics &amp; litigation support, attacker simulation &amp; penetration testing, supply chain defense, dark web investigations, compliance services, vulnerability assessments and remediation, and professional services.    In this episode, we are joined by Matthew Gonter, Global Tech...]]></itunes:summary>
    <description><![CDATA[<p>At its core, BlueVoyant offers MDR and managed SIEM services for Splunk and Microsoft Sentinel, though they also provide EDR services, 24/7 security monitoring, alert investigations &amp; incident response, forensics &amp; litigation support, attacker simulation &amp; penetration testing, supply chain defense, dark web investigations, compliance services, vulnerability assessments and remediation, and professional services.  <br/><br/>In this episode, we are joined by Matthew Gonter, Global Technical Solutions Architect - Splunk | Cribl where we talk about the myriad of security problems BlueVoyant sees in the industry and how they enable customers to outsource key security functions while addressing the cybersecurity skills gap to improve overall security preparedness and security outcomes.  Matt joins BlueVoyant by way of their recent acquisition of Concanon, a Splunk and Cribl professional services company, in October 2021 where Matt introduced enterprise solutions and proprietary technology to manage Sentinel and Splunk at scale while directly tackling log shipping challenges.<br/><br/>Serving as an expert in SOC services, SIEM implementation/migration, and Observability Pipeline optimization, Matt shares many insights into the security industry and we look forward to having him back on the show!</p>]]></description>
    <content:encoded><![CDATA[<p>At its core, BlueVoyant offers MDR and managed SIEM services for Splunk and Microsoft Sentinel, though they also provide EDR services, 24/7 security monitoring, alert investigations &amp; incident response, forensics &amp; litigation support, attacker simulation &amp; penetration testing, supply chain defense, dark web investigations, compliance services, vulnerability assessments and remediation, and professional services.  <br/><br/>In this episode, we are joined by Matthew Gonter, Global Technical Solutions Architect - Splunk | Cribl where we talk about the myriad of security problems BlueVoyant sees in the industry and how they enable customers to outsource key security functions while addressing the cybersecurity skills gap to improve overall security preparedness and security outcomes.  Matt joins BlueVoyant by way of their recent acquisition of Concanon, a Splunk and Cribl professional services company, in October 2021 where Matt introduced enterprise solutions and proprietary technology to manage Sentinel and Splunk at scale while directly tackling log shipping challenges.<br/><br/>Serving as an expert in SOC services, SIEM implementation/migration, and Observability Pipeline optimization, Matt shares many insights into the security industry and we look forward to having him back on the show!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/12284557-episode-23-cyber-defense-services-forged-from-the-front-lines.mp3" length="18681964" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mm5nbrh7m3gtfp4pylvo2il8nu14?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12284557</guid>
    <pubDate>Sun, 19 Feb 2023 12:00:00 -0800</pubDate>
    <itunes:duration>1552</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #22 - Operating at the nexus of Observability &amp; Security data</itunes:title>
    <title>Episode #22 - Operating at the nexus of Observability &amp; Security data</title>
    <itunes:summary><![CDATA[Cribl provides a real-time data stream management platform for MELT data that enables organizations to gain insights and take action on data in place (right at the source), data at rest (already stored in a data lake), and eventually data in motion (transitioning an observability pipeline).  Back in May 2022 Clint and the C021 team signaled that they would be turning search on its head, and in Nov '22 they did just that.  We can now say goodbye to the swivel-chair searching which ha...]]></itunes:summary>
    <description><![CDATA[<p>Cribl provides a real-time data stream management platform for MELT data that enables organizations to gain insights and take action on data in place (right at the source), data at rest (already stored in a data lake), and eventually data in motion (transitioning an observability pipeline).  Back in May 2022 Clint and the C021 team signaled that they would be turning search on its head, and in Nov &apos;22 they did just that.  We can now say goodbye to the swivel-chair searching which has become a rate limiter to value realization and start to unlock our observability and security data.  <br/><br/>In this episode, Satbir and Darren speak with Ed Bailey, Cribl&apos;s Sr. Staff Technical Evangelist, about the power of Cribl&apos;s vision for the future.  Though we cover a range of topics there is a heavy focus on Cribl Search and all that it promises.  Search is built on an enhanced version of Kusto which provides practitioners a familiar interface to start with.  This allows organizations to get a head start by performing actions such as compiling Sigma rules into Kusto for IOC/threat hunting.  This design decision goes a long way to challenge the current modus vivendi that exists between operational and security data.<br/><br/>Further, Cribl Search is a cloud-native construct, scaling elastically as queries are processed which dramatically reduces the infrastructure cost burden of search.  <br/><br/>Dispatching queries to where the data is promises to drive the convergence between observability and security operations and we are excited to continue partnering with Cribl.  This is an essential platform for organizations looking to gain insights and take action on their MELT and security data.  Long live the goat!</p>]]></description>
    <content:encoded><![CDATA[<p>Cribl provides a real-time data stream management platform for MELT data that enables organizations to gain insights and take action on data in place (right at the source), data at rest (already stored in a data lake), and eventually data in motion (transitioning an observability pipeline).  Back in May 2022 Clint and the C021 team signaled that they would be turning search on its head, and in Nov &apos;22 they did just that.  We can now say goodbye to the swivel-chair searching which has become a rate limiter to value realization and start to unlock our observability and security data.  <br/><br/>In this episode, Satbir and Darren speak with Ed Bailey, Cribl&apos;s Sr. Staff Technical Evangelist, about the power of Cribl&apos;s vision for the future.  Though we cover a range of topics there is a heavy focus on Cribl Search and all that it promises.  Search is built on an enhanced version of Kusto which provides practitioners a familiar interface to start with.  This allows organizations to get a head start by performing actions such as compiling Sigma rules into Kusto for IOC/threat hunting.  This design decision goes a long way to challenge the current modus vivendi that exists between operational and security data.<br/><br/>Further, Cribl Search is a cloud-native construct, scaling elastically as queries are processed which dramatically reduces the infrastructure cost burden of search.  <br/><br/>Dispatching queries to where the data is promises to drive the convergence between observability and security operations and we are excited to continue partnering with Cribl.  This is an essential platform for organizations looking to gain insights and take action on their MELT and security data.  Long live the goat!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/12143961-episode-22-operating-at-the-nexus-of-observability-security-data.mp3" length="22312661" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/38knm8j3lr0knxn6a43y9ubxg6n0?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12143961</guid>
    <pubDate>Sun, 29 Jan 2023 21:00:00 -0800</pubDate>
    <itunes:duration>1856</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #21 - Automating continuous Classifying, Modeling, &amp; Auditing of data actions with Theom</itunes:title>
    <title>Episode #21 - Automating continuous Classifying, Modeling, &amp; Auditing of data actions with Theom</title>
    <itunes:summary><![CDATA[We at Ink8r have long been advocates for calibrating protection against threat modeling exercises to properly align protection for assets.  When it comes to securing production resources in the cloud this often means extending beyond Cloud Security Posture Management (CSPM) and including Data Security Posture Management (DSPM), among other capabilities, to properly address threats.   With Theom we find not only a complete data security solution but also a platform that has truly tho...]]></itunes:summary>
    <description><![CDATA[<p>We at Ink8r have long been advocates for calibrating protection against threat modeling exercises to properly align protection for assets.  When it comes to securing production resources in the cloud this often means extending beyond Cloud Security Posture Management (CSPM) and including Data Security Posture Management (DSPM), among other capabilities, to properly address threats.   With Theom we find not only a complete data security solution but also a platform that has truly thought through what the enterprise practically requires.  <br/><br/>Join us as we speak with Navindra Yadav, serial entrepreneur &amp; inventor, and Co-Founder &amp; CEO of Theom as we explore their platform and how they are truly the enterprise&apos;s Data Bodyguard!<br/><br/>Theom leverages NLP classifiers to discover/classify your data in the cloud across analytical stores, object stores, and relational databases (all at a granular level) and even monitors how that data is accessed (in-flight observations).  With this approach, Theom can determine potential financial exposure by combining metadata of the entities accessing/actioning the data along and determining the sensitivity of that data.  Historically, determining Annualized Loss Expectancy has been challenging.  Organizations typically must determine an Annual Rate of Occurrence (ARO) and multiply it by the Single-Loss Expectancy (SLE) for each time a risk arises.  With Theom this becomes infinitely easier and allows for a quantitative view of risk for your critical assets.  WOW!<br/><br/>And that is just the beginning.  Theom will also determine anomalous behavior regarding entity activity to help curtail overprovisioned access and help thwart more complicated &apos;slow leak&apos; attacks.  Activity can include actions on data, as well as how the data is being accessed.  By looking at API access and comparing against Swagger specs for the API, Theom can expose discrepancies between spec and actual API configuration/exposure.  Another WOW!<br/><br/>A final note on Theom has to do with platform design and the team&apos;s foresight regarding architecture.  By leveraging Distributed Ledger Technology (DLT) Theom has placed a priority on security from several perspectives.   They immediately deliver Proof of Action for every transaction including proof that Theom doesn&apos;t manipulate any customer data (i.e., all analytics happens in the customer environment, without data movement of any kind); all data analytics incur minimal costs to the customer (e.g., we are talking under $20/day, which is incredible); and an entire world opens up for futures around concepts such as Proof of State (e.g., imagine an auditor or cyberinsurance company validating state directly - without interacting with Theom at all).</p>]]></description>
    <content:encoded><![CDATA[<p>We at Ink8r have long been advocates for calibrating protection against threat modeling exercises to properly align protection for assets.  When it comes to securing production resources in the cloud this often means extending beyond Cloud Security Posture Management (CSPM) and including Data Security Posture Management (DSPM), among other capabilities, to properly address threats.   With Theom we find not only a complete data security solution but also a platform that has truly thought through what the enterprise practically requires.  <br/><br/>Join us as we speak with Navindra Yadav, serial entrepreneur &amp; inventor, and Co-Founder &amp; CEO of Theom as we explore their platform and how they are truly the enterprise&apos;s Data Bodyguard!<br/><br/>Theom leverages NLP classifiers to discover/classify your data in the cloud across analytical stores, object stores, and relational databases (all at a granular level) and even monitors how that data is accessed (in-flight observations).  With this approach, Theom can determine potential financial exposure by combining metadata of the entities accessing/actioning the data along and determining the sensitivity of that data.  Historically, determining Annualized Loss Expectancy has been challenging.  Organizations typically must determine an Annual Rate of Occurrence (ARO) and multiply it by the Single-Loss Expectancy (SLE) for each time a risk arises.  With Theom this becomes infinitely easier and allows for a quantitative view of risk for your critical assets.  WOW!<br/><br/>And that is just the beginning.  Theom will also determine anomalous behavior regarding entity activity to help curtail overprovisioned access and help thwart more complicated &apos;slow leak&apos; attacks.  Activity can include actions on data, as well as how the data is being accessed.  By looking at API access and comparing against Swagger specs for the API, Theom can expose discrepancies between spec and actual API configuration/exposure.  Another WOW!<br/><br/>A final note on Theom has to do with platform design and the team&apos;s foresight regarding architecture.  By leveraging Distributed Ledger Technology (DLT) Theom has placed a priority on security from several perspectives.   They immediately deliver Proof of Action for every transaction including proof that Theom doesn&apos;t manipulate any customer data (i.e., all analytics happens in the customer environment, without data movement of any kind); all data analytics incur minimal costs to the customer (e.g., we are talking under $20/day, which is incredible); and an entire world opens up for futures around concepts such as Proof of State (e.g., imagine an auditor or cyberinsurance company validating state directly - without interacting with Theom at all).</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/11637322-episode-21-automating-continuous-classifying-modeling-auditing-of-data-actions-with-theom.mp3" length="26079877" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kyz2jgkgf121ffl1zo1oud71hoxx?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11637322</guid>
    <pubDate>Sat, 05 Nov 2022 18:00:00 -0700</pubDate>
    <itunes:duration>2169</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #20 - Making Connectivity to Business Resources Impossibly Simple</itunes:title>
    <title>Episode #20 - Making Connectivity to Business Resources Impossibly Simple</title>
    <itunes:summary></itunes:summary>
    <description></description>
    <content:encoded></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/11511726-episode-20-making-connectivity-to-business-resources-impossibly-simple.mp3" length="32397961" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dygg2n53yn3gdrxl7a3bpmtsvc1x?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11511726</guid>
    <pubDate>Sun, 16 Oct 2022 19:00:00 -0700</pubDate>
    <itunes:duration>2696</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #19 - Constructing a versatile SSDLC pipeline that can simply do more</itunes:title>
    <title>Episode #19 - Constructing a versatile SSDLC pipeline that can simply do more</title>
    <itunes:summary><![CDATA[How many pipelines does my organization need?  What pipeline construction patterns are most acceptable to my developers?  What intelligence should I inject into the pipeline?  Nick Durkin, Field CTO &amp; VP of Field Engineering from Harness answers these and more.  Join us in this episode as we unpack some philosophical areas of SSDLC architecture, while diving into the Harness portfolio to see how they continue to innovate in topics such as Chaos Engineering, Feature Fla...]]></itunes:summary>
    <description><![CDATA[<p>How many pipelines does my organization need?  What pipeline construction patterns are most acceptable to my developers?  What intelligence should I inject into the pipeline?  Nick Durkin, Field CTO &amp; VP of Field Engineering from Harness answers these and more.  Join us in this episode as we unpack some philosophical areas of SSDLC architecture, while diving into the Harness portfolio to see how they continue to innovate in topics such as Chaos Engineering, Feature Flag Management, Security, Intelligent Testing, Cloud Cost Management (more than just visibility), Service Reliability, and more.  <br/><br/>The pipeline underpins the SSDLC process, ensuring not only a collaborative experience between testing, development, and operations, but also as an enabler of contemporary delivery approaches such as DevSecOps, Agile, Continuous Integration, and Continuous Delivery.  Without a pipeline that can support all interested stakeholders, safe delivery of code at market expectation will be elusive at best.  </p>]]></description>
    <content:encoded><![CDATA[<p>How many pipelines does my organization need?  What pipeline construction patterns are most acceptable to my developers?  What intelligence should I inject into the pipeline?  Nick Durkin, Field CTO &amp; VP of Field Engineering from Harness answers these and more.  Join us in this episode as we unpack some philosophical areas of SSDLC architecture, while diving into the Harness portfolio to see how they continue to innovate in topics such as Chaos Engineering, Feature Flag Management, Security, Intelligent Testing, Cloud Cost Management (more than just visibility), Service Reliability, and more.  <br/><br/>The pipeline underpins the SSDLC process, ensuring not only a collaborative experience between testing, development, and operations, but also as an enabler of contemporary delivery approaches such as DevSecOps, Agile, Continuous Integration, and Continuous Delivery.  Without a pipeline that can support all interested stakeholders, safe delivery of code at market expectation will be elusive at best.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/11476965-episode-19-constructing-a-versatile-ssdlc-pipeline-that-can-simply-do-more.mp3" length="33885262" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2oy992gbmiv15wbv5s11ip53k9u9?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11476965</guid>
    <pubDate>Tue, 11 Oct 2022 06:00:00 -0700</pubDate>
    <itunes:duration>2819</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #18 - To truly understand the pervasive use of SaaS in your enterprise, turn to SSCP</itunes:title>
    <title>Episode #18 - To truly understand the pervasive use of SaaS in your enterprise, turn to SSCP</title>
    <itunes:summary><![CDATA[Enterprises rely on dozens to hundreds of Software-as-a-Service (SaaS) applications, both sanctioned and unsanctioned, for their workloads, data, and processes.  This attack surface requires SaaS Security Posture Management (SSPM) to protect the enterprise, but how do enterprises truly discover all of the SaaS apps in use (particularly those unsanctioned SaaS apps)?  Traditionally enterprises have relied on CASB solutions, API-integrated solutions, SSO-integrated solutions, and/or web pr...]]></itunes:summary>
    <description><![CDATA[<p>Enterprises rely on dozens to hundreds of Software-as-a-Service (SaaS) applications, both sanctioned and unsanctioned, for their workloads, data, and processes.  This attack surface requires SaaS Security Posture Management (SSPM) to protect the enterprise, but how do enterprises truly discover all of the SaaS apps in use (particularly those unsanctioned SaaS apps)?<br/><br/>Traditionally enterprises have relied on CASB solutions, API-integrated solutions, SSO-integrated solutions, and/or web proxies to try and discover the breadth of SaaS use, but these can be off by an order of magnitude from true usage in an environment.  This is where a SaaS Security Control Plane (SSCP) becomes invaluable, not only from a discovery perspective but also to inject enterprise security expectations into EVERY SaaS application.   <br/><br/>Join us in this episode as we speak with Lior Yaari, Co-Founder and CEO of Grip Security as we explore how their platform allows commercially-focused CISOs to partner with business line managers to rapidly determine their SaaS posture.  </p>]]></description>
    <content:encoded><![CDATA[<p>Enterprises rely on dozens to hundreds of Software-as-a-Service (SaaS) applications, both sanctioned and unsanctioned, for their workloads, data, and processes.  This attack surface requires SaaS Security Posture Management (SSPM) to protect the enterprise, but how do enterprises truly discover all of the SaaS apps in use (particularly those unsanctioned SaaS apps)?<br/><br/>Traditionally enterprises have relied on CASB solutions, API-integrated solutions, SSO-integrated solutions, and/or web proxies to try and discover the breadth of SaaS use, but these can be off by an order of magnitude from true usage in an environment.  This is where a SaaS Security Control Plane (SSCP) becomes invaluable, not only from a discovery perspective but also to inject enterprise security expectations into EVERY SaaS application.   <br/><br/>Join us in this episode as we speak with Lior Yaari, Co-Founder and CEO of Grip Security as we explore how their platform allows commercially-focused CISOs to partner with business line managers to rapidly determine their SaaS posture.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/11362702-episode-18-to-truly-understand-the-pervasive-use-of-saas-in-your-enterprise-turn-to-sscp.mp3" length="26922801" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pfrosj76w9pg6l582z7zjaxflsjv?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11362702</guid>
    <pubDate>Wed, 21 Sep 2022 14:00:00 -0700</pubDate>
    <itunes:duration>2239</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #16 - Harmonizing your AppSecOps Program</itunes:title>
    <title>Episode #16 - Harmonizing your AppSecOps Program</title>
    <itunes:summary><![CDATA[Application delivery velocity is driving a need to bolster an organization's existing software security posture.   One fundamental aspect in fortifying an AppSec strategy is to leverage the API’s of existing application portfolio management solutions, code repositories, open source code scanning, static code scanning, credential scanning, image scanning, and various dynamic application security test tools, to create a composite risk profile for each asset along with prioritization, track...]]></itunes:summary>
    <description><![CDATA[<p>Application delivery velocity is driving a need to bolster an organization&apos;s existing software security posture.   One fundamental aspect in fortifying an AppSec strategy is to leverage the API’s of existing application portfolio management solutions, code repositories, open source code scanning, static code scanning, credential scanning, image scanning, and various dynamic application security test tools, to create a composite risk profile for each asset along with prioritization, tracking, and automated SLA management across the Secure Software Development Lifecycle (S-SDLC).  This allows us to move beyond what is often construed as an obsession with defects, to achieve a degree of harmonization between developer and security professional.<br/><br/>Join us in this episode as we speak with Nikhil Gupta, Co-Founder and CEO of ArmorCode as we explore how their platform provides a single process for AppSec visibility, workflow automation, vulnerability management, and compliance, and how it allows an organization to elevate their Security Program.</p>]]></description>
    <content:encoded><![CDATA[<p>Application delivery velocity is driving a need to bolster an organization&apos;s existing software security posture.   One fundamental aspect in fortifying an AppSec strategy is to leverage the API’s of existing application portfolio management solutions, code repositories, open source code scanning, static code scanning, credential scanning, image scanning, and various dynamic application security test tools, to create a composite risk profile for each asset along with prioritization, tracking, and automated SLA management across the Secure Software Development Lifecycle (S-SDLC).  This allows us to move beyond what is often construed as an obsession with defects, to achieve a degree of harmonization between developer and security professional.<br/><br/>Join us in this episode as we speak with Nikhil Gupta, Co-Founder and CEO of ArmorCode as we explore how their platform provides a single process for AppSec visibility, workflow automation, vulnerability management, and compliance, and how it allows an organization to elevate their Security Program.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/11092432-episode-16-harmonizing-your-appsecops-program.mp3" length="34502660" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4nublvkohuiilc1xtf2q7uo5mz2u?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11092432</guid>
    <pubDate>Sat, 06 Aug 2022 19:00:00 -0700</pubDate>
    <itunes:duration>2870</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #15 - Reimagining Observability and making it viable</itunes:title>
    <title>Episode #15 - Reimagining Observability and making it viable</title>
    <itunes:summary><![CDATA[We heard a great quote at RESOLVE'22 this year which said, "customers pay for up time and companies pay for downtime".  A rather adroit quote, and one that truly captures the Sisyphean challenge of ensuring applications are performant in the way we expect.  When it comes to the Herculean task (wow - two mythological references in one opener!) of making modern observability viable, there stands Cribl, the leader in Observability Pipelines and a true disruptor of the domain.  Cri...]]></itunes:summary>
    <description><![CDATA[<p>We heard a great quote at RESOLVE&apos;22 this year which said, &quot;customers pay for up time and companies pay for downtime&quot;.  A rather adroit quote, and one that truly captures the Sisyphean challenge of ensuring applications are performant in the way we expect.  When it comes to the Herculean task (wow - two mythological references in one opener!) of making modern observability viable, there stands Cribl, the leader in Observability Pipelines and a true disruptor of the domain.  Cribl has launched several products that enable practitioners by focusing on data value at the edge, in the stream, and in a customer&apos;s Observability Lake(s).<br/><br/>Join us in this episode as we speak with Nick Heudecker, Senior Director of Market Strategy &amp; Competitive Intelligence at Cribl as we explore their product portfolio and how those products reshape how we should think about data processing in observability and security.</p>]]></description>
    <content:encoded><![CDATA[<p>We heard a great quote at RESOLVE&apos;22 this year which said, &quot;customers pay for up time and companies pay for downtime&quot;.  A rather adroit quote, and one that truly captures the Sisyphean challenge of ensuring applications are performant in the way we expect.  When it comes to the Herculean task (wow - two mythological references in one opener!) of making modern observability viable, there stands Cribl, the leader in Observability Pipelines and a true disruptor of the domain.  Cribl has launched several products that enable practitioners by focusing on data value at the edge, in the stream, and in a customer&apos;s Observability Lake(s).<br/><br/>Join us in this episode as we speak with Nick Heudecker, Senior Director of Market Strategy &amp; Competitive Intelligence at Cribl as we explore their product portfolio and how those products reshape how we should think about data processing in observability and security.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10891974-episode-15-reimagining-observability-and-making-it-viable.mp3" length="28293896" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5v7616rxq3kqm57mwcllqvtbn72z?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10891974</guid>
    <pubDate>Fri, 01 Jul 2022 19:00:00 -0700</pubDate>
    <itunes:duration>2354</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #13 - Running MELT through analytics at the edge</itunes:title>
    <title>Episode #13 - Running MELT through analytics at the edge</title>
    <itunes:summary><![CDATA[There is always tremendous value in decreasing latency in any decision-making process, particularly when we are dealing with stream processing in support of system and application observability.  By running Metrics, Events, Logs, and Trace (MELT) data through an analytics algorithm at time of creation, on the very devices emitting the signals, organizations can set parameters on what information is worth sending to an observability platform, and what information is not. In this episode, ...]]></itunes:summary>
    <description><![CDATA[<p>There is always tremendous value in decreasing latency in any decision-making process, particularly when we are dealing with stream processing in support of system and application observability.  By running Metrics, Events, Logs, and Trace (MELT) data through an analytics algorithm at time of creation, on the very devices emitting the signals, organizations can set parameters on what information is worth sending to an observability platform, and what information is not.</p><p>In this episode, we speak with Zachary Quiring, Director of Product at Edge Delta regarding how they view observability and how distributed queries are the most economical approach to scale and efficiency for modern architectures.  This is truly a novel approach and as Edge Delta puts it, the only way to achieve &quot;observability without compromise&quot;.</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>There is always tremendous value in decreasing latency in any decision-making process, particularly when we are dealing with stream processing in support of system and application observability.  By running Metrics, Events, Logs, and Trace (MELT) data through an analytics algorithm at time of creation, on the very devices emitting the signals, organizations can set parameters on what information is worth sending to an observability platform, and what information is not.</p><p>In this episode, we speak with Zachary Quiring, Director of Product at Edge Delta regarding how they view observability and how distributed queries are the most economical approach to scale and efficiency for modern architectures.  This is truly a novel approach and as Edge Delta puts it, the only way to achieve &quot;observability without compromise&quot;.</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10884099-episode-13-running-melt-through-analytics-at-the-edge.mp3" length="33166877" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ka6vl4as0jjcz89yu0a578lmzwqs?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10884099</guid>
    <pubDate>Thu, 30 Jun 2022 07:00:00 -0700</pubDate>
    <itunes:duration>2760</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #14 - Enabling Collaborative IaC with specialized CICD</itunes:title>
    <title>Episode #14 - Enabling Collaborative IaC with specialized CICD</title>
    <itunes:summary><![CDATA[Many, if not most, organizations operate as polyglots - polyglot environments, polyglot programming languages, polyglot persistence, and so on.   Infrastructure-as-Code (IaC) automation is no exception to this complexity with organizations often supporting polyglot IaC CICD tooling.  Teams introduce this variability to achieve specific ends as some frameworks are great for one task but not another, so working with multiple platforms/frameworks enables developers to use the right too...]]></itunes:summary>
    <description><![CDATA[<p>Many, if not most, organizations operate as polyglots - polyglot environments, polyglot programming languages, polyglot persistence, and so on.   Infrastructure-as-Code (IaC) automation is no exception to this complexity with organizations often supporting polyglot IaC CICD tooling.  Teams introduce this variability to achieve specific ends as some frameworks are great for one task but not another, so working with multiple platforms/frameworks enables developers to use the right tool for the job. </p><p>In this podcast episode, we speak with Co-Founder and Chief Product Officer of Spacelift, Marcin Wyszynski.  Together we discuss how Spacelift can cull the digital <em>Tower of Babel </em>that comes with deploying and managing IaC in the enterprise.  Spacelift provides a specialized IaC CICD platform with sophisticated state management and audit features for multiple frameworks such as Terraform, Pulumi, Kubernetes, CloudFormation, and soon Ansible.  Through support for complex workflows, and a robust policy framework, Spacelift allows you to declare rules around account and project access, handling push notifications, starting runs,  triggering tasks, and creating relationships between projects.  </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Many, if not most, organizations operate as polyglots - polyglot environments, polyglot programming languages, polyglot persistence, and so on.   Infrastructure-as-Code (IaC) automation is no exception to this complexity with organizations often supporting polyglot IaC CICD tooling.  Teams introduce this variability to achieve specific ends as some frameworks are great for one task but not another, so working with multiple platforms/frameworks enables developers to use the right tool for the job. </p><p>In this podcast episode, we speak with Co-Founder and Chief Product Officer of Spacelift, Marcin Wyszynski.  Together we discuss how Spacelift can cull the digital <em>Tower of Babel </em>that comes with deploying and managing IaC in the enterprise.  Spacelift provides a specialized IaC CICD platform with sophisticated state management and audit features for multiple frameworks such as Terraform, Pulumi, Kubernetes, CloudFormation, and soon Ansible.  Through support for complex workflows, and a robust policy framework, Spacelift allows you to declare rules around account and project access, handling push notifications, starting runs,  triggering tasks, and creating relationships between projects.  </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10884013-episode-14-enabling-collaborative-iac-with-specialized-cicd.mp3" length="25014376" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a139bqt212km1bkey9ubf2cfyebv?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10884013</guid>
    <pubDate>Thu, 30 Jun 2022 07:00:00 -0700</pubDate>
    <itunes:duration>2080</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #17 - An Observability breakout session from Resolve &#39;22, with the Ink8r Team</itunes:title>
    <title>Episode #17 - An Observability breakout session from Resolve &#39;22, with the Ink8r Team</title>
    <itunes:summary><![CDATA[Satbir and Darren were interviewed in a breakout session at Resolve '22, a BigPanda-organized community event.  It was a wonderful opportunity for the Ink8r team to share thoughts on the domain of Observability, as directed by Aaron Johnson (BigPanda SE).   Join us in this episode as we cover topics such as the consequences of not starting a journey, key measurements to get started, finding your guiding star and staying a path, and our thoughts on the role and importance of open sta...]]></itunes:summary>
    <description><![CDATA[<p>Satbir and Darren were interviewed in a breakout session at Resolve &apos;22, a BigPanda-organized community event.  It was a wonderful opportunity for the Ink8r team to share thoughts on the domain of Observability, as directed by Aaron Johnson (BigPanda SE).  </p><p>Join us in this episode as we cover topics such as the consequences of not starting a journey, key measurements to get started, finding your guiding star and staying a path, and our thoughts on the role and importance of open standards.</p><p>  </p>]]></description>
    <content:encoded><![CDATA[<p>Satbir and Darren were interviewed in a breakout session at Resolve &apos;22, a BigPanda-organized community event.  It was a wonderful opportunity for the Ink8r team to share thoughts on the domain of Observability, as directed by Aaron Johnson (BigPanda SE).  </p><p>Join us in this episode as we cover topics such as the consequences of not starting a journey, key measurements to get started, finding your guiding star and staying a path, and our thoughts on the role and importance of open standards.</p><p>  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10725396-episode-17-an-observability-breakout-session-from-resolve-22-with-the-ink8r-team.mp3" length="32388257" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/z1bmhn5x2a4k8obt1i8fgf5ihqe4?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10725396</guid>
    <pubDate>Thu, 02 Jun 2022 07:00:00 -0700</pubDate>
    <itunes:duration>2694</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #10 - Cloud-native security with a rules-optional intelligence platform</itunes:title>
    <title>Episode #10 - Cloud-native security with a rules-optional intelligence platform</title>
    <itunes:summary><![CDATA[Lacework has a patented platform, Polygraph Data Platform, which ingests data, analyzes behavior, and detects anomalies across an organization’s multi-cloud environment.  Lacework continuously monitors user, app, process, and network behavior, as well as continuously evaluating vulnerabilities and cloud configurations.  They use an agent and agentless approach to collect information to uncover unusual activity that could indicate compromise and prioritize responses.    Join us ...]]></itunes:summary>
    <description><![CDATA[<p>Lacework has a patented platform, Polygraph Data Platform, which ingests data, analyzes behavior, and detects anomalies across an organization’s multi-cloud environment.  Lacework continuously monitors user, app, process, and network behavior, as well as continuously evaluating vulnerabilities and cloud configurations.  They use an agent and agentless approach to collect information to uncover unusual activity that could indicate compromise and prioritize responses.  <br/><br/>Join us in this podcast as we speak with Mark Nunnikhoven, Distinguished Cloud Strategist, regarding how Lacework identifies and traces new or anomalous activity correlated across cloud accounts including regions, users, principals, CSP services, API calls, and API responses, as well as identifying workloads and containers with known active vulnerabilities.</p>]]></description>
    <content:encoded><![CDATA[<p>Lacework has a patented platform, Polygraph Data Platform, which ingests data, analyzes behavior, and detects anomalies across an organization’s multi-cloud environment.  Lacework continuously monitors user, app, process, and network behavior, as well as continuously evaluating vulnerabilities and cloud configurations.  They use an agent and agentless approach to collect information to uncover unusual activity that could indicate compromise and prioritize responses.  <br/><br/>Join us in this podcast as we speak with Mark Nunnikhoven, Distinguished Cloud Strategist, regarding how Lacework identifies and traces new or anomalous activity correlated across cloud accounts including regions, users, principals, CSP services, API calls, and API responses, as well as identifying workloads and containers with known active vulnerabilities.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10698089-episode-10-cloud-native-security-with-a-rules-optional-intelligence-platform.mp3" length="30370481" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kzqq48v8fwpjdldkulvffzczn9sw?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10698089</guid>
    <pubDate>Sat, 28 May 2022 17:00:00 -0700</pubDate>
    <itunes:duration>2526</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #12 - Using AI to baseline good behavior to block malicious email</itunes:title>
    <title>Episode #12 - Using AI to baseline good behavior to block malicious email</title>
    <itunes:summary><![CDATA[Social engineering attacks such as Business Email Compromise (BEC), supply chain fraud, executive impersonation, and ransomware, are complex vectors that readily evade solutions that rely on conventional threat intelligence and known bad indicators.  Modern attacks frequently bypass secure email gateways as they may come from trusted sources and do not contain malicious links or attachments. Abnormal Security provides a fundamentally different approach to email attacks by continuously ba...]]></itunes:summary>
    <description><![CDATA[<p>Social engineering attacks such as Business Email Compromise (BEC), supply chain fraud, executive impersonation, and ransomware, are complex vectors that readily evade solutions that rely on conventional threat intelligence and known bad indicators.  Modern attacks frequently bypass secure email gateways as they may come from trusted sources and do not contain malicious links or attachments.</p><p>Abnormal Security provides a fundamentally different approach to email attacks by continuously baselining known good behavior by leveraging identity, behavior, and content to detect and remediate anomalies.  Join us on this podcast as we speak with Abnormal Security&apos;s CISO, Mike Britton - a former customer and advocate for continuous supplier, vendor, partner, and email analysis based upon signals gathered across the entire enterprise ecosystem.</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Social engineering attacks such as Business Email Compromise (BEC), supply chain fraud, executive impersonation, and ransomware, are complex vectors that readily evade solutions that rely on conventional threat intelligence and known bad indicators.  Modern attacks frequently bypass secure email gateways as they may come from trusted sources and do not contain malicious links or attachments.</p><p>Abnormal Security provides a fundamentally different approach to email attacks by continuously baselining known good behavior by leveraging identity, behavior, and content to detect and remediate anomalies.  Join us on this podcast as we speak with Abnormal Security&apos;s CISO, Mike Britton - a former customer and advocate for continuous supplier, vendor, partner, and email analysis based upon signals gathered across the entire enterprise ecosystem.</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10698031-episode-12-using-ai-to-baseline-good-behavior-to-block-malicious-email.mp3" length="24587657" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/z7ftol9ueb98p6my37xdogmrf7df?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10698031</guid>
    <pubDate>Sat, 28 May 2022 17:00:00 -0700</pubDate>
    <itunes:duration>2044</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #11 - Building data security into DevOps infrastructure</itunes:title>
    <title>Episode #11 - Building data security into DevOps infrastructure</title>
    <itunes:summary><![CDATA[In the modern enterprise data spans multiple cloud providers, regions, databases, object stores, and data lakes.  Users, developers, supply-chain vendors, and contractors all access data via multiple roles and applications.  In a truly dynamic environment where developers instantiate instances, organizations need to be able to visualize how data flows, who is accessing that data, and how that data is being used, all in real-time.     In this episode, we speak with Martijn Loder...]]></itunes:summary>
    <description><![CDATA[<p>In the modern enterprise data spans multiple cloud providers, regions, databases, object stores, and data lakes.  Users, developers, supply-chain vendors, and contractors all access data via multiple roles and applications.  In a truly dynamic environment where developers instantiate instances, organizations need to be able to visualize how data flows, who is accessing that data, and how that data is being used, all in real-time.  </p><p><br/></p><p>In this episode, we speak with Martijn Loderus, VP of Solutions Engineering &amp; Delivery, of Symmetry Systems on how they are taking a data-centric approach to enable organizations to map, secure, and track identity, permissions, and data flows across the estate while providing unified visibility across these environments for cloud and information security teams.</p>]]></description>
    <content:encoded><![CDATA[<p>In the modern enterprise data spans multiple cloud providers, regions, databases, object stores, and data lakes.  Users, developers, supply-chain vendors, and contractors all access data via multiple roles and applications.  In a truly dynamic environment where developers instantiate instances, organizations need to be able to visualize how data flows, who is accessing that data, and how that data is being used, all in real-time.  </p><p><br/></p><p>In this episode, we speak with Martijn Loderus, VP of Solutions Engineering &amp; Delivery, of Symmetry Systems on how they are taking a data-centric approach to enable organizations to map, secure, and track identity, permissions, and data flows across the estate while providing unified visibility across these environments for cloud and information security teams.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10697920-episode-11-building-data-security-into-devops-infrastructure.mp3" length="24014811" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/035h35bqjeg4d6k4yo7jrjb5nfic?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10697920</guid>
    <pubDate>Sat, 28 May 2022 16:00:00 -0700</pubDate>
    <itunes:duration>1997</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #8 - Build trust in your software with the leader in AppSec</itunes:title>
    <title>Episode #8 - Build trust in your software with the leader in AppSec</title>
    <itunes:summary><![CDATA[Synopsys is a leader in Gartner’s Magic Quadrant for Application Security Testing (AST) for the 6th straight year.  Their portfolio is among the most comprehensive in the market, supplementing the foundational aspects of AST with an acquired portfolio of award-winning products including SAST, DAST, IAST, and SCA - with advanced capabilities such as protocol fuzzing and API protection.   Join us as we speak with Tim Mackay, Principal Security Strategist with Synopsys’ Cybersecurity R...]]></itunes:summary>
    <description><![CDATA[<p>Synopsys is a leader in Gartner’s Magic Quadrant for Application Security Testing (AST) for the 6th straight year.  Their portfolio is among the most comprehensive in the market, supplementing the foundational aspects of AST with an acquired portfolio of award-winning products including SAST, DAST, IAST, and SCA - with advanced capabilities such as protocol fuzzing and API protection.  </p><p>Join us as we speak with Tim Mackay, Principal Security Strategist with Synopsys’ Cybersecurity Research Center, as we discuss how Synopsys represents an evolution of traditional application security, through integration of capabilities in risk management that automates and accelerates the aggregation, correlation, deduplication, and prioritization of software vulnerabilities, while orchestrating the right tests, at the right time, with the right focus.  </p>]]></description>
    <content:encoded><![CDATA[<p>Synopsys is a leader in Gartner’s Magic Quadrant for Application Security Testing (AST) for the 6th straight year.  Their portfolio is among the most comprehensive in the market, supplementing the foundational aspects of AST with an acquired portfolio of award-winning products including SAST, DAST, IAST, and SCA - with advanced capabilities such as protocol fuzzing and API protection.  </p><p>Join us as we speak with Tim Mackay, Principal Security Strategist with Synopsys’ Cybersecurity Research Center, as we discuss how Synopsys represents an evolution of traditional application security, through integration of capabilities in risk management that automates and accelerates the aggregation, correlation, deduplication, and prioritization of software vulnerabilities, while orchestrating the right tests, at the right time, with the right focus.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10620338-episode-8-build-trust-in-your-software-with-the-leader-in-appsec.mp3" length="33933811" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lpis731jsvdlqaby30rsd2erzk6y?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10620338</guid>
    <pubDate>Sun, 15 May 2022 11:00:00 -0700</pubDate>
    <itunes:duration>2824</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #7 - Protecting API business logic &amp; vulnerabilities with Cequence Security</itunes:title>
    <title>Episode #7 - Protecting API business logic &amp; vulnerabilities with Cequence Security</title>
    <itunes:summary><![CDATA[Cequence Security understands API attack surfaces, protecting upwards of 6 billion API transactions on any given day.  In this podcast episode, we speak with Vince Bryant, Senior Director of Business Development of Cequence Security.  In an age characterized by velocity in execution, Cequence will be the first to state that, "digital transformation from the inside looks pretty messy".  In assessments, Cequence frequently discovers that the API attack surface is usually 2x what ...]]></itunes:summary>
    <description><![CDATA[<p>Cequence Security understands API attack surfaces, protecting upwards of 6 billion API transactions on any given day.  In this podcast episode, we speak with Vince Bryant, Senior Director of Business Development of Cequence Security.  In an age characterized by velocity in execution, Cequence will be the first to state that, &quot;digital transformation from the inside looks pretty messy&quot;.  In assessments, Cequence frequently discovers that the API attack surface is usually 2x what an organization believes is in use.  From inventory discovery and risk assessment to behavior analysis with sensitive data exposure protection and business logic abuse protection - Cequence&apos;s single-pass architecture emphasizes intent when creating an in-depth profile of applications. </p>]]></description>
    <content:encoded><![CDATA[<p>Cequence Security understands API attack surfaces, protecting upwards of 6 billion API transactions on any given day.  In this podcast episode, we speak with Vince Bryant, Senior Director of Business Development of Cequence Security.  In an age characterized by velocity in execution, Cequence will be the first to state that, &quot;digital transformation from the inside looks pretty messy&quot;.  In assessments, Cequence frequently discovers that the API attack surface is usually 2x what an organization believes is in use.  From inventory discovery and risk assessment to behavior analysis with sensitive data exposure protection and business logic abuse protection - Cequence&apos;s single-pass architecture emphasizes intent when creating an in-depth profile of applications. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10620216-episode-7-protecting-api-business-logic-vulnerabilities-with-cequence-security.mp3" length="27611329" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/aow0kxvo05w1khhh8ztoriecjwg6?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10620216</guid>
    <pubDate>Sun, 15 May 2022 08:00:00 -0700</pubDate>
    <itunes:duration>2297</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #6 - Moving Beyond Observability with Aaron Johnson</itunes:title>
    <title>Episode #6 - Moving Beyond Observability with Aaron Johnson</title>
    <itunes:summary><![CDATA[As we begin emitting more signals from more endpoints in servitude of more complex transactions, it becomes clear that being observable isn't enough.  Join us as we talk with Aaron Johnson (AJ), BigPanda as we explore the nature of correlation as a key component to ensuring services perform as intended.   AJ has deep practitioner/leadership experience at companies performing correlation at scale and we thoroughly enjoyed his pragmatic views.  We hope you enjoy it as well! ]]></itunes:summary>
    <description><![CDATA[<p>As we begin emitting more signals from more endpoints in servitude of more complex transactions, it becomes clear that being observable isn&apos;t enough.  Join us as we talk with Aaron Johnson (AJ), BigPanda as we explore the nature of correlation as a key component to ensuring services perform as intended.   AJ has deep practitioner/leadership experience at companies performing correlation at scale and we thoroughly enjoyed his pragmatic views.  We hope you enjoy it as well!</p>]]></description>
    <content:encoded><![CDATA[<p>As we begin emitting more signals from more endpoints in servitude of more complex transactions, it becomes clear that being observable isn&apos;t enough.  Join us as we talk with Aaron Johnson (AJ), BigPanda as we explore the nature of correlation as a key component to ensuring services perform as intended.   AJ has deep practitioner/leadership experience at companies performing correlation at scale and we thoroughly enjoyed his pragmatic views.  We hope you enjoy it as well!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10609170-episode-6-moving-beyond-observability-with-aaron-johnson.mp3" length="34368639" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i05j5o3gqntjrkq86s7e42wsl7ha?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10609170</guid>
    <pubDate>Thu, 12 May 2022 16:00:00 -0700</pubDate>
    <itunes:duration>2859</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #5 - At the intersection of Observability and Security</itunes:title>
    <title>Episode #5 - At the intersection of Observability and Security</title>
    <itunes:summary><![CDATA[It’s in their DNA - sysdig (lower case ’s’) started as an open source troubleshooting tool, and the company has maintained that commitment to community.  They donated Falco to CNCF as an incubating project with contributors that include AWS, Google, Microsoft, Cisco, and VMware, they leverage projects such as CloudCustodian in their cloud posture capability, and provide PromQL support for deep analysis.    In this episode, we validate Sysdig’s tagline of ‘dig deeper’ with Alex Lawre...]]></itunes:summary>
    <description><![CDATA[<p>It’s in their DNA - sysdig (lower case ’s’) started as an open source troubleshooting tool, and the company has maintained that commitment to community.  They donated Falco to CNCF as an incubating project with contributors that include AWS, Google, Microsoft, Cisco, and VMware, they leverage projects such as CloudCustodian in their cloud posture capability, and provide PromQL support for deep analysis.  <br/><br/>In this episode, we validate Sysdig’s tagline of ‘dig deeper’ with Alex Lawrence, Principal Security Architect. Please enjoy as Alex discusses Sysdig’s product portfolio, which allows practitioners to manage IaC, and vulnerabilities in CI/CD and registries and ultimately into runtime with powerful remediate and forensic capabilities.</p>]]></description>
    <content:encoded><![CDATA[<p>It’s in their DNA - sysdig (lower case ’s’) started as an open source troubleshooting tool, and the company has maintained that commitment to community.  They donated Falco to CNCF as an incubating project with contributors that include AWS, Google, Microsoft, Cisco, and VMware, they leverage projects such as CloudCustodian in their cloud posture capability, and provide PromQL support for deep analysis.  <br/><br/>In this episode, we validate Sysdig’s tagline of ‘dig deeper’ with Alex Lawrence, Principal Security Architect. Please enjoy as Alex discusses Sysdig’s product portfolio, which allows practitioners to manage IaC, and vulnerabilities in CI/CD and registries and ultimately into runtime with powerful remediate and forensic capabilities.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10531138-episode-5-at-the-intersection-of-observability-and-security.mp3" length="31874487" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/57pjk31eldmfni3ebwon0h8nikaf?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10531138</guid>
    <pubDate>Sat, 30 Apr 2022 13:00:00 -0700</pubDate>
    <itunes:duration>2651</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #4 - Why Proactive API Security is Today&#39;s Imperative</itunes:title>
    <title>Episode #4 - Why Proactive API Security is Today&#39;s Imperative</title>
    <itunes:summary><![CDATA[APIs have become the largest abuse vector with even the most sophisticated development organizations falling prey to exposure.   This episode of the podcast discusses the landscape and where organizations can begin securing their interfaces with Matt Tesauro, Distinguished Engineer at Noname Security providing pragmatic advice. ]]></itunes:summary>
    <description><![CDATA[<p>APIs have become the largest abuse vector with even the most sophisticated development organizations falling prey to exposure.   This episode of the podcast discusses the landscape and where organizations can begin securing their interfaces with Matt Tesauro, Distinguished Engineer at Noname Security providing pragmatic advice.</p>]]></description>
    <content:encoded><![CDATA[<p>APIs have become the largest abuse vector with even the most sophisticated development organizations falling prey to exposure.   This episode of the podcast discusses the landscape and where organizations can begin securing their interfaces with Matt Tesauro, Distinguished Engineer at Noname Security providing pragmatic advice.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10407821-episode-4-why-proactive-api-security-is-today-s-imperative.mp3" length="32639294" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7orrtz8t1gpxgxcosoy14aq7gwut?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10407821</guid>
    <pubDate>Sun, 10 Apr 2022 20:00:00 -0700</pubDate>
    <itunes:duration>2716</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode #2 - Observability with Datadog</itunes:title>
    <title>Episode #2 - Observability with Datadog</title>
    <itunes:summary><![CDATA[In this episode, we speak with Marc Weisman, VP of Product Management, Platform at Datadog.  Marc has spent the last 6+ years with Datadog, defining and expanding their platform at a pace of almost one feature per day.   Marc provides a perspective on observability, how it fits in the enterprise, and some practical implementation guidance. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we speak with Marc Weisman, VP of Product Management, Platform at Datadog.  Marc has spent the last 6+ years with Datadog, defining and expanding their platform at a pace of almost one feature per day.   Marc provides a perspective on observability, how it fits in the enterprise, and some practical implementation guidance.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we speak with Marc Weisman, VP of Product Management, Platform at Datadog.  Marc has spent the last 6+ years with Datadog, defining and expanding their platform at a pace of almost one feature per day.   Marc provides a perspective on observability, how it fits in the enterprise, and some practical implementation guidance.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/10001705-episode-2-observability-with-datadog.mp3" length="30962406" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ymyfrohtr5by3l2nom57q5pcsa0i?.jpg" />
    <itunes:author>ink8r</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10001705</guid>
    <pubDate>Wed, 02 Feb 2022 14:00:00 -0800</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/1910572/10001705/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Episode #2 - Observability with Datadog" />
  <psc:chapter start="2:12" title="Observability Definition" />
  <psc:chapter start="9:14" title="Datadog Innovation" />
  <psc:chapter start="14:19" title="Customer Adoption" />
  <psc:chapter start="17:52" title="Implementation Guidance" />
  <psc:chapter start="37:27" title="Trends - Open Source &amp; Standards" />
</psc:chapters>
    <itunes:duration>2576</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode#1 - Trailer</itunes:title>
    <title>Episode#1 - Trailer</title>
    <itunes:summary><![CDATA[A brief introduction to the Ink8r Podcast intention and scope ]]></itunes:summary>
    <description><![CDATA[<p>A brief introduction to the Ink8r Podcast intention and scope</p>]]></description>
    <content:encoded><![CDATA[<p>A brief introduction to the Ink8r Podcast intention and scope</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1910572/episodes/9806598-episode-1-trailer.mp3" length="693372" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/56vptkt8quukn74tckxa8x6e2fjp?.jpg" />
    <itunes:author>Darren</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9806598</guid>
    <pubDate>Thu, 30 Dec 2021 05:00:00 -0800</pubDate>
    <itunes:duration>54</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>trailer</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
