Discover
DataEndure TECH talks
63 Episodes
Reverse
Cybersecurity isn’t just an IT issue anymore—it’s the foundation of business resilience. Join DataEndure CTO Shahin Pirooz and CMO Kirstin Burke as they discuss how IT and security need to evolve together in an era shaped by AI, automation, and rapid change.
0:00 Introduction
01:42 AWS outage example
02:28 Convergence of cyber & operational resilience
05:02 AI & automation: the leap reshaping risk and ops
10:04 Outages and cascading business impact
15:06 Designing for resilience
20:09 Tool sprawl and why convergence matters
25:11 Reliability expectations: staying operational
The post Beyond Awareness: Why IT and Security Must Evolve Together appeared first on DataEndure | Managed Cybersecurity. It's about time..
Bots now make up 51% of internet traffic. And malicious bots? They account for 37% of all web traffic. AI is helping bots slip past defenses—making them smarter, faster, and harder to spot. The result? Account takeovers, scraping, and API abuse.
David Holmes, CTO of Application Security at Imperva, joins DataEndure’s CTO Shahin Pirooz to explore the rise of bots and how to defend against them.
0:00 Rise of Bots
3:29 Good vs. Bad Bots
13:20 Defense Strategies
21:45 Digital Trust & APIs
27:00 Closing Takeaways
The post Are You Ready for a Bot-Dominated Internet? appeared first on DataEndure | Managed Cybersecurity. It's about time..
Compliance doesn’t end at your walls—it extends to every partner, customer, and supplier you touch. In this talk, our hosts explore how shifting regulations, supply chain pressures, and opportunistic adversaries are reshaping governance, storage, and security strategy—and how compliance can become a foundation for resilience.
0:00 Introduction
0:35 The Compliance Ripple Effect
2:04 Federal Mandates & CMMC Pressure
7:44 Shared Risk & Responsibility
9:55 Three Areas to Focus On
13:36 Foundation for Resilience
16:02 Subject Matter Experts
20:00 The Manual Steps
23:54 Next Steps
Hosts: Shahin Pirooz, DataEndure CTO and Kirstin Burke, DataEndure CMO.
The post When Compliance Isn’t About You: External Pressures Reshaping Security appeared first on DataEndure | Managed Cybersecurity. It's about time..
The real value of AI is what you can put to work today.
In this TECH Talk, discover how Microsoft Copilot is already transforming IT and business workflows. We explore Copilot’s most impactful use cases and share strategies to navigate Microsoft’s expansive AI ecosystem—so you know where and how it best serves your business.
Whether you want to boost efficiency or streamline operations, see how Copilot helps teams work smarter, not harder.
Join our hosts Shahin Pirooz, DataEndure CTO and Kirstin Burke, DataEndure CMO.
The post Unlocking AI Productivity with Microsoft Copilot appeared first on DataEndure | Managed Cybersecurity. It's about time..
When ransomware hits, your ability to recover depends on more than just backups—it hinges on your storage architecture.
In this TECH Talk, we unpack the often-overlooked role that storage plays in both data loss and recovery—and why many recovery efforts fail when the architecture is fragmented, outdated, or siloed.
Join our hosts Shahin Pirooz, DataEndure CTO and Kirstin Burke, DataEndure CMO.
The post Backup ≠ Recovery: The Costly Ransomware Myth appeared first on DataEndure | Managed Cybersecurity. It's about time..
A little planning today can prevent a lot of trouble tomorrow. Network and cybersecurity expert Ross Rehart, MSc. shares how the right framework brings order to the chaos, aligns security with business goals, and sets the stage for long-term success.
The post No Framework, No Foundation: Why Cyber Resilience Starts Here appeared first on DataEndure | Managed Cybersecurity. It's about time..
AI isn’t just generating text and images anymore—it’s making decisions, taking action, and reshaping entire industries. Agentic AI is here, and it’s changing the way businesses operate.
In this TECH Talk episode, DataEndure’s CTO Shahin Pirooz and CMO Kirstin Burke break down the difference between generative and agentic AI, share real-world examples, and give business leaders a preview of what’s coming next.
The post The Next Evolution of AI: Generative vs Agentic AI Explained appeared first on DataEndure | Managed Cybersecurity. It's about time..
AI is transforming industries, and on-prem solutions are emerging as a strategic advantage. Businesses are shifting AI workloads in-house to gain speed, efficiency, and full data control—while sidestepping the escalating costs of cloud services.
In this TECH Talk episode, DataEndure’s CTO Shahin Pirooz and CMO Kirstin Burke discuss how organizations can harness AI appliances and private cloud systems to enhance productivity, ensure compliance, and maximize performance.
00:00 Introduction
00:52 AI’s Market Boom: The Numbers Speak
01:46 The Shift to On-Prem AI: Cost Concerns & Practicality
03:38 Making the Right AI Infrastructure Choice
05:00 Four Pillars of AI Deployment Strategy
07:01 Workload Characteristics: Training vs. Inference
08:54 The Infrastructure Cost Equation
10:10 The Hidden Costs: Operations & Maintenance
12:23 The Personnel Challenge
14:43 AI Security & Compliance
16:45 The Cloud vs. On-Prem Tradeoff
20:12 AI Adoption Roadmap
22:53 Avoiding Common AI Deployment Pitfalls
24:50 AI as an Equalizer
The post AI Gold Rush: How to Build a Winning On-Prem Strategy appeared first on DataEndure | Managed Cybersecurity. It's about time..
From AI-driven automation to faster, localized data processing, and the growing emphasis on sustainability, we explore the top trends shaping the year ahead.
The post December 2024 TECH Talk – Top 3 Technology Strategies appeared first on DataEndure | Managed Cybersecurity. It's about time..
The network is the central hub of your business—connecting people, devices, and data across multiple environments. Yet, every connection point is also a potential entry point for hackers.
Today, the network and threats have changed. In this TECH Talk, networking expert Ross Rehart, MSc. explains why your thinking must change, too.
0:00 Introduction
0:17 Traditional Network Topologies
0:56 Impact of Cloud Computing
1:46 The Role of Wireless and 5G
2:32 Security Challenges in Modern Networks
4:49 Transition to SSE and Zero Trust
6:09 Micro-segmentation Analogy
9:23 Start with Business Requirements
11:32 Security First Approach in Network Design
14:15 XDR and Comprehensive Defense
17:20 Assessing Network Health
22:01 Complimentary Network Health Check
The post Why Network Security Must Be Your First Priority appeared first on DataEndure | Managed Cybersecurity. It's about time..
Is your organization haunted by forgotten data? Abandoned data can quickly become a prime target for cybercriminals lurking in the shadows, waiting to cause data breaches and compliance nightmares. We share practical strategies to mitigate risk.
0:00 Introduction
0:23 The Scale of Data Growth
2:00 Understanding ROT (Redundant, Obsolete, Trivial) Data
9:00 Steps to Manage Abandoned Data
13:30 Setting Data Retention Policies
19:00 Best Practices for Data Hygiene
26:00 The Importance of Data Risk Assessments
The post Digital Ghosts: The Cybersecurity Risks of Abandoned Data appeared first on DataEndure | Managed Cybersecurity. It's about time..
Is data protection enough to stop ransomware in its tracks? Not quite. In this TECH Talk, DataEndure’s CTO Shahin Pirooz and CMO Kirstin Burke explain why air-gapped backups, immutability, and access controls are key to recovery.
0:00 Introduction
0:11 Data Protection Alone Won’t Stop Ransomware
7:19 Collaboration Between IT and Security Teams
10:10 Disaster Recovery Strategy
12:02 Ensure Backups are Clean from Malware
14:38 How IT and Security Teams Can Join Forces
18:02 Performing a Resiliency Assessment
21:32 Two Common Mistakes
23:35 How DataEndure can Help
The post The Backup Fallacy: Why Data Protection Alone Won’t Stop Ransomware appeared first on DataEndure | Managed Cybersecurity. It's about time..
AI and High-Performance Computing (HPC) workloads are notorious for their demand on cloud resources, often resulting in unexpected, skyrocketing costs. In this TECH Talk, we share proactive measures to control cloud expenses while scaling your AI and big data capabilities.
0:00 Introduction
1:30 Evolution of Cloud and AI
4:00 Impact of AI Workloads on Data Consumption
5:08 Data Security
10:00 Optimizing Performance
16:00 Managing Cloud Costs
21:30 Cloud vs On-Prem Solutions
26:00 Importance of Hybrid Flexibility
29:00 Key Takeaways: Planning and Strategy
The post Prevent Cloud Costs from Crushing Your AI Initiatives Podcast appeared first on DataEndure | Managed Cybersecurity. It's about time..
While cutting-edge augmented intelligence (AI) technologies are becoming increasingly adept defending against cyber threats, the human factor remains indispensable. Listen to gain a deeper understanding of how to effectively combine human expertise and advanced technologies to fortify your cybersecurity posture.
0:00 Introduction
0:22 Augmented Intelligence Explained
1:58 Enhancing Human Capabilities
3:31 AI in Cybersecurity
5:49 Role of Human Analysts
9:01 Practical Tips and Challenges
20:00 Summary and Final Thoughts
The post Human and AI Synergy in Modern Security appeared first on DataEndure | Managed Cybersecurity. It's about time..
Investing in scalable storage for AI workloads isn’t just an operational decision—it’s a strategic one. In this TECH Talk, special guest Bjorn Kolbeck, CEO at Quobyte, shares practical insights to ensure the infrastructure that fuels your AI initiatives is set up for success.
0:00 Introduction
0:24 Quobyte Overview
1:28 The AI Infrastructure Journey
2:56 Data Growth Across Industries
8:07 Scaling Storage as You Grow
10:01 Scalable Storage as a Service
14:34 How to Evaluate Quobtye
15:30 DataEndure Storage and Dark Data Assessments
15:58 Security Considerations
18:00 Conclusion
The post Scale Smart: Modern Storage for AI Workloads appeared first on DataEndure | Managed Cybersecurity. It's about time..
When it comes to cybersecurity, the adage “lightning never strikes the same place twice” doesn’t apply. The reality is 80% of ransomware victims get targeted again.
With a second attack on Change Healthcare making the news, we unpack why businesses that suffer an initial cyberattack are frequently targeted again, regardless of company size or industry. And, more importantly, what you can do to protect your business.
0:00 Introduction
0:31 Airplane Incident Comparison
1:57 Why a Company Gets Hit Again
4:41 Hackers Publish to the Dark Web
6:42 Ransomware Gangs are Basically Conglomerates
7:33 Adversary Techniques, Tactics, and Procedures (TTPs)
10:07 Cyber Insurance and Forensics Teams
15:03 The Need for Cybersecurity Expertise
20:14 Managed Services vs Staffing In-house
23:24 The Build It Yourself Challenges
27:04 Adversaries Target Every Size Company
29:39 Complimentary Security Health Check
The post Breach, Repeat: Understanding Recurrent Cyberattacks appeared first on DataEndure | Managed Cybersecurity. It's about time..
Traditional security tools only spring into action after a breach, highlighting a critical gap in many organizations’ defenses. This oversight emphasizes the need for a dual approach, one that not only responds to incidents but also anticipates them.
In this TECH Talk, we delve into how to craft a balanced cybersecurity framework that delivers both proactive and reactive defenses. Our goal is to equip business executives with the knowledge to ask the right questions and make informed decisions that significantly reduce their risk perimeter and diminish the severity of any potential breaches.
0:00 Introduction
0:17 Preparing for a Likely Cyberattack
1:26 The Harsh Reality: Cyberattack Stats
4:42 Building a Robust Cybersecurity Framework
7:39 GRC Isn’t a Tool, It’s a Concept
9:27 Security Frameworks Aren’t Set in Stone
11:17 Even a Good Security Stance Drifts Over Time
14:20 Understanding the ‘Boom’ in the Threat Landscape
17:16 Recovery and Business Continuity
21:28 Defense Across All Threat Vectors
25:36 What Size Company Needs Layers of Defense?
31:42 DataEndure Managed Security: Consumable, Evergreen, Cost-Effective
34:50 Taking Action: Help for Your Business
The post Prepare to be Hacked: A Strategic Cybersecurity Planning Session appeared first on DataEndure | Managed Cybersecurity. It's about time..
In a world of distributed workers, data, and devices, networks are under more strain than ever. The need for robust network resilience and cybersecurity is critical. Network expert Ross Rehart shares insights into the challenges businesses face in securing their digital assets amidst the rapid pace of technological change.
The post Feb. TECH Talk podcast—Ensuring Network Resilience & Cybersecurity in a Digital Era appeared first on DataEndure | Managed Cybersecurity. It's about time..
A year ago, generative AI caught most businesses by surprise. Listen for a heads up on the cybersecurity trends you can expect in 2024.
Topics include:
Generative AI
Convergence of IT and Security
Zero Trust
Social Engineering
Quantum Cryptography
The post Jan. 2024 TECH Talk – Cybersecurity in the Fast Lane appeared first on DataEndure | Managed Cybersecurity. It's about time..
In 2023, organizations worldwide faced increasing sophistication of cyber-attacks…With generative AI as a powerful catalyst, the story of the year is not just change, but the acceleration of change.
In a threat environment where getting breached isn’t a matter of if, but when, DataEndure’s monthly TECH Talks cover cybersecurity hot topics and insights to help businesses remain on secure footing.
In this compilation podcast, we feature key year-end takeaways to strengthen your security posture. Segments include:
It only takes 1-click to create a ransomware situation (0:02)
ChatGPT is an infant that’s been given the Internet (0:47)
What does “good” cybersecurity look like? (2:55)
Traditional gateway-based email security falls short (7:39)
Preparing for the inevitable (17:36)
It isn’t about the tools, it’s about layers of defense (22:20)
Getting to security maturity (26:19)
Phishing, deepfakes, and more are in the wild, breaching the confines of the inbox and exploiting the information people share across social platforms. Given the convergence of work and personal digital spaces, what once might have locked up a home computer can now bring down a corporate network.
In a shifting threat landscape, waiting to react to the threats of tomorrow isn’t an option. In 2024, join us on the last Thursday of the month for actionable intelligence to fortify your cybersecurity posture.
The post 2023 Cybersecurity Highlights – TECH Talk Year in Review appeared first on DataEndure | Managed Cybersecurity. It's about time..



