DataEndure TECH talks

Latest Episodes
December 2024 Tech Talk – Top 3 Technology Strategies
From AI-driven automation to faster, localized data processing, and the growing emphasis on sustainability, we explore the top trends shaping the year ahead.
Why Network Security Must Be Your First Priority
The network is the central hub of your businessconnecting people, devices, and data across multiple environments. Yet, every connection point is also a potential entry point for hackers. Today, the [
Digital Ghosts: The Cybersecurity Risks of Abandoned Data
Is your organization haunted by forgotten data? Abandoned data can quickly become a prime target for cybercriminals lurking in the shadows, waiting to cause data breaches and compliance nightmares. We
The Backup Fallacy: Why Data Protection Alone Won’t Stop Ransomware
Is data protection enough to stop ransomware in its tracks? Not quite. In this TECH Talk, DataEndures CTO Shahin Pirooz and CMO Kirstin Burke explain why air-gapped backups, immutability, and []
Prevent Cloud Costs from Crushing Your AI Initiatives Podcast
AI and High-Performance Computing (HPC) workloads are notorious for their demand on cloud resources, often resulting in unexpected, skyrocketing costs. In this TECH Talk, we share proactive measures t
Human and AI Synergy in Modern Security
While cutting-edge augmented intelligence (AI) technologies are becoming increasingly adept defending against cyber threats, the human factor remains indispensable. Listen to gain a deeper understandi
Scale Smart: Modern Storage for AI Workloads
Investing in scalable storage for AI workloads isnt just an operational decisionits a strategic one. In this TECH Talk, special guest Bjorn Kolbeck, CEO at Quobyte, shares practical insights to []
Breach, Repeat: Understanding Recurrent Cyberattacks
When it comes to cybersecurity, the adage lightning never strikes the same place twice doesnt apply. The reality is 80% of ransomware victims get targeted again. With a second attack []
Prepare to be Hacked: A Strategic Cybersecurity Planning Session
Traditional security tools only spring into action after a breach, highlighting a critical gap in many organizations defenses. This oversight emphasizes the need for a dual approach, one that not []
Feb. TECH Talk podcast—Ensuring Network Resilience & Cybersecurity in a Digital Era
In a world of distributed workers, data, and devices, networks are under more strain than ever. The need for robust network resilience and cybersecurity is critical. Network expert Ross Rehart []