DataEndure TECH talks

Managed Cybersecurity. It's about time.

Beyond Awareness: Why IT and Security Must Evolve Together

Cybersecurity isn’t just an IT issue anymore—it’s the foundation of business resilience. Join DataEndure CTO Shahin Pirooz and CMO Kirstin Burke as they discuss how IT and security need to evolve together in an era shaped by AI, automation, and rapid change. 0:00 Introduction 01:42 AWS outage example 02:28 Convergence of cyber & operational resilience 05:02 AI & automation: the leap reshaping risk and ops 10:04 Outages and cascading business impact 15:06 Designing for resilience 20:09 Tool sprawl and why convergence matters 25:11 Reliability expectations: staying operational The post Beyond Awareness: Why IT and Security Must Evolve Together appeared first on DataEndure | Managed Cybersecurity. It's about time..

10-23
30:31

Are You Ready for a Bot-Dominated Internet?

Bots now make up 51% of internet traffic. And malicious bots? They account for 37% of all web traffic. AI is helping bots slip past defenses—making them smarter, faster, and harder to spot. The result? Account takeovers, scraping, and API abuse. David Holmes, CTO of Application Security at Imperva, joins DataEndure’s CTO Shahin Pirooz to explore the rise of bots and how to defend against them. 0:00 Rise of Bots 3:29 Good vs. Bad Bots 13:20 Defense Strategies 21:45 Digital Trust & APIs 27:00 Closing Takeaways The post Are You Ready for a Bot-Dominated Internet? appeared first on DataEndure | Managed Cybersecurity. It's about time..

09-26
27:40

When Compliance Isn’t About You: External Pressures Reshaping Security

Compliance doesn’t end at your walls—it extends to every partner, customer, and supplier you touch. In this talk, our hosts explore how shifting regulations, supply chain pressures, and opportunistic adversaries are reshaping governance, storage, and security strategy—and how compliance can become a foundation for resilience. 0:00 Introduction 0:35 The Compliance Ripple Effect 2:04 Federal Mandates & CMMC Pressure 7:44 Shared Risk & Responsibility 9:55 Three Areas to Focus On 13:36 Foundation for Resilience 16:02 Subject Matter Experts 20:00 The Manual Steps 23:54 Next Steps Hosts: Shahin Pirooz, DataEndure CTO and Kirstin Burke, DataEndure CMO. The post When Compliance Isn’t About You: External Pressures Reshaping Security appeared first on DataEndure | Managed Cybersecurity. It's about time..

08-28
28:03

Unlocking AI Productivity with Microsoft Copilot

The real value of AI is what you can put to work today. In this TECH Talk, discover how Microsoft Copilot is already transforming IT and business workflows. We explore Copilot’s most impactful use cases and share strategies to navigate Microsoft’s expansive AI ecosystem—so you know where and how it best serves your business. Whether you want to boost efficiency or streamline operations, see how Copilot helps teams work smarter, not harder. Join our hosts Shahin Pirooz, DataEndure CTO and Kirstin Burke, DataEndure CMO. The post Unlocking AI Productivity with Microsoft Copilot appeared first on DataEndure | Managed Cybersecurity. It's about time..

07-24
38:08

Backup ≠ Recovery: The Costly Ransomware Myth

When ransomware hits, your ability to recover depends on more than just backups—it hinges on your storage architecture. In this TECH Talk, we unpack the often-overlooked role that storage plays in both data loss and recovery—and why many recovery efforts fail when the architecture is fragmented, outdated, or siloed. Join our hosts Shahin Pirooz, DataEndure CTO and Kirstin Burke, DataEndure CMO. The post Backup ≠ Recovery: The Costly Ransomware Myth appeared first on DataEndure | Managed Cybersecurity. It's about time..

05-23
--:--

No Framework, No Foundation: Why Cyber Resilience Starts Here

A little planning today can prevent a lot of trouble tomorrow. Network and cybersecurity expert Ross Rehart, MSc. shares how the right framework brings order to the chaos, aligns security with business goals, and sets the stage for long-term success. The post No Framework, No Foundation: Why Cyber Resilience Starts Here appeared first on DataEndure | Managed Cybersecurity. It's about time..

05-01
41:38

The Next Evolution of AI: Generative vs Agentic AI Explained

AI isn’t just generating text and images anymore—it’s making decisions, taking action, and reshaping entire industries. Agentic AI is here, and it’s changing the way businesses operate. In this TECH Talk episode, DataEndure’s CTO Shahin Pirooz and CMO Kirstin Burke break down the difference between generative and agentic AI, share real-world examples, and give business leaders a preview of what’s coming next. The post The Next Evolution of AI: Generative vs Agentic AI Explained appeared first on DataEndure | Managed Cybersecurity. It's about time..

03-27
--:--

AI Gold Rush: How to Build a Winning On-Prem Strategy

AI is transforming industries, and on-prem solutions are emerging as a strategic advantage. Businesses are shifting AI workloads in-house to gain speed, efficiency, and full data control—while sidestepping the escalating costs of cloud services. In this TECH Talk episode, DataEndure’s CTO Shahin Pirooz and CMO Kirstin Burke discuss how organizations can harness AI appliances and private cloud systems to enhance productivity, ensure compliance, and maximize performance. 00:00 Introduction 00:52 AI’s Market Boom: The Numbers Speak 01:46 The Shift to On-Prem AI: Cost Concerns & Practicality 03:38 Making the Right AI Infrastructure Choice 05:00 Four Pillars of AI Deployment Strategy 07:01 Workload Characteristics: Training vs. Inference 08:54 The Infrastructure Cost Equation 10:10 The Hidden Costs: Operations & Maintenance 12:23 The Personnel Challenge 14:43 AI Security & Compliance 16:45 The Cloud vs. On-Prem Tradeoff 20:12 AI Adoption Roadmap 22:53 Avoiding Common AI Deployment Pitfalls 24:50 AI as an Equalizer The post AI Gold Rush: How to Build a Winning On-Prem Strategy appeared first on DataEndure | Managed Cybersecurity. It's about time..

02-27
30:50

December 2024 TECH Talk – Top 3 Technology Strategies

From AI-driven automation to faster, localized data processing, and the growing emphasis on sustainability, we explore the top trends shaping the year ahead. The post December 2024 TECH Talk – Top 3 Technology Strategies appeared first on DataEndure | Managed Cybersecurity. It's about time..

12-19
16:27

Why Network Security Must Be Your First Priority

The network is the central hub of your business—connecting people, devices, and data across multiple environments. Yet, every connection point is also a potential entry point for hackers. Today, the network and threats have changed. In this TECH Talk, networking expert Ross Rehart, MSc. explains why your thinking must change, too. 0:00 Introduction 0:17 Traditional Network Topologies 0:56 Impact of Cloud Computing 1:46 The Role of Wireless and 5G 2:32 Security Challenges in Modern Networks 4:49 Transition to SSE and Zero Trust 6:09 Micro-segmentation Analogy 9:23 Start with Business Requirements 11:32 Security First Approach in Network Design 14:15 XDR and Comprehensive Defense 17:20 Assessing Network Health 22:01 Complimentary Network Health Check The post Why Network Security Must Be Your First Priority appeared first on DataEndure | Managed Cybersecurity. It's about time..

11-21
23:07

Digital Ghosts: The Cybersecurity Risks of Abandoned Data

Is your organization haunted by forgotten data? Abandoned data can quickly become a prime target for cybercriminals lurking in the shadows, waiting to cause data breaches and compliance nightmares. We share practical strategies to mitigate risk. 0:00 Introduction 0:23 The Scale of Data Growth 2:00 Understanding ROT (Redundant, Obsolete, Trivial) Data 9:00 Steps to Manage Abandoned Data 13:30 Setting Data Retention Policies 19:00 Best Practices for Data Hygiene 26:00 The Importance of Data Risk Assessments The post Digital Ghosts: The Cybersecurity Risks of Abandoned Data appeared first on DataEndure | Managed Cybersecurity. It's about time..

10-31
31:56

The Backup Fallacy: Why Data Protection Alone Won’t Stop Ransomware

Is data protection enough to stop ransomware in its tracks? Not quite. In this TECH Talk, DataEndure’s CTO Shahin Pirooz and CMO Kirstin Burke explain why air-gapped backups, immutability, and access controls are key to recovery. 0:00 Introduction 0:11 Data Protection Alone Won’t Stop Ransomware 7:19 Collaboration Between IT and Security Teams 10:10 Disaster Recovery Strategy 12:02 Ensure Backups are Clean from Malware 14:38 How IT and Security Teams Can Join Forces 18:02 Performing a Resiliency Assessment 21:32 Two Common Mistakes 23:35 How DataEndure can Help The post The Backup Fallacy: Why Data Protection Alone Won’t Stop Ransomware appeared first on DataEndure | Managed Cybersecurity. It's about time..

09-26
24:19

Prevent Cloud Costs from Crushing Your AI Initiatives Podcast

AI and High-Performance Computing (HPC) workloads are notorious for their demand on cloud resources, often resulting in unexpected, skyrocketing costs. In this TECH Talk, we share proactive measures to control cloud expenses while scaling your AI and big data capabilities. 0:00 Introduction 1:30 Evolution of Cloud and AI 4:00 Impact of AI Workloads on Data Consumption 5:08 Data Security 10:00 Optimizing Performance 16:00 Managing Cloud Costs 21:30 Cloud vs On-Prem Solutions 26:00 Importance of Hybrid Flexibility 29:00 Key Takeaways: Planning and Strategy The post Prevent Cloud Costs from Crushing Your AI Initiatives Podcast appeared first on DataEndure | Managed Cybersecurity. It's about time..

08-29
31:06

Human and AI Synergy in Modern Security

While cutting-edge augmented intelligence (AI) technologies are becoming increasingly adept defending against cyber threats, the human factor remains indispensable. Listen to gain a deeper understanding of how to effectively combine human expertise and advanced technologies to fortify your cybersecurity posture. 0:00 Introduction 0:22 Augmented Intelligence Explained 1:58 Enhancing Human Capabilities 3:31 AI in Cybersecurity 5:49 Role of Human Analysts 9:01 Practical Tips and Challenges 20:00 Summary and Final Thoughts The post Human and AI Synergy in Modern Security  appeared first on DataEndure | Managed Cybersecurity. It's about time..

06-27
--:--

Scale Smart: Modern Storage for AI Workloads

Investing in scalable storage for AI workloads isn’t just an operational decision—it’s a strategic one. In this TECH Talk, special guest Bjorn Kolbeck, CEO at Quobyte, shares practical insights to ensure the infrastructure that fuels your AI initiatives is set up for success. 0:00 Introduction 0:24 Quobyte Overview 1:28 The AI Infrastructure Journey 2:56 Data Growth Across Industries 8:07 Scaling Storage as You Grow 10:01 Scalable Storage as a Service 14:34 How to Evaluate Quobtye 15:30 DataEndure Storage and Dark Data Assessments 15:58 Security Considerations 18:00 Conclusion The post Scale Smart: Modern Storage for AI Workloads appeared first on DataEndure | Managed Cybersecurity. It's about time..

05-30
--:--

Breach, Repeat: Understanding Recurrent Cyberattacks

When it comes to cybersecurity, the adage “lightning never strikes the same place twice” doesn’t apply. The reality is 80% of ransomware victims get targeted again. With a second attack on Change Healthcare making the news, we unpack why businesses that suffer an initial cyberattack are frequently targeted again, regardless of company size or industry. And, more importantly, what you can do to protect your business. 0:00 Introduction 0:31 Airplane Incident Comparison 1:57 Why a Company Gets Hit Again 4:41 Hackers Publish to the Dark Web 6:42 Ransomware Gangs are Basically Conglomerates 7:33 Adversary Techniques, Tactics, and Procedures (TTPs) 10:07 Cyber Insurance and Forensics Teams 15:03 The Need for Cybersecurity Expertise 20:14 Managed Services vs Staffing In-house 23:24 The Build It Yourself Challenges 27:04 Adversaries Target Every Size Company 29:39 Complimentary Security Health Check The post Breach, Repeat: Understanding Recurrent Cyberattacks appeared first on DataEndure | Managed Cybersecurity. It's about time..

04-25
32:10

Prepare to be Hacked: A Strategic Cybersecurity Planning Session

Traditional security tools only spring into action after a breach, highlighting a critical gap in many organizations’ defenses. This oversight emphasizes the need for a dual approach, one that not only responds to incidents but also anticipates them. In this TECH Talk, we delve into how to craft a balanced cybersecurity framework that delivers both proactive and reactive defenses. Our goal is to equip business executives with the knowledge to ask the right questions and make informed decisions that significantly reduce their risk perimeter and diminish the severity of any potential breaches. 0:00 Introduction 0:17 Preparing for a Likely Cyberattack 1:26 The Harsh Reality: Cyberattack Stats 4:42 Building a Robust Cybersecurity Framework 7:39 GRC Isn’t a Tool, It’s a Concept 9:27 Security Frameworks Aren’t Set in Stone 11:17 Even a Good Security Stance Drifts Over Time 14:20 Understanding the ‘Boom’ in the Threat Landscape 17:16 Recovery and Business Continuity 21:28 Defense Across All Threat Vectors 25:36 What Size Company Needs Layers of Defense? 31:42 DataEndure Managed Security: Consumable, Evergreen, Cost-Effective 34:50 Taking Action: Help for Your Business The post Prepare to be Hacked: A Strategic Cybersecurity Planning Session appeared first on DataEndure | Managed Cybersecurity. It's about time..

03-29
37:38

Feb. TECH Talk podcast—Ensuring Network Resilience & Cybersecurity in a Digital Era

In a world of distributed workers, data, and devices, networks are under more strain than ever. The need for robust network resilience and cybersecurity is critical. Network expert Ross Rehart shares insights into the challenges businesses face in securing their digital assets amidst the rapid pace of technological change. The post Feb. TECH Talk podcast—Ensuring Network Resilience & Cybersecurity in a Digital Era appeared first on DataEndure | Managed Cybersecurity. It's about time..

02-29
33:15

Jan. 2024 TECH Talk – Cybersecurity in the Fast Lane

A year ago, generative AI caught most businesses by surprise. Listen for a heads up on the cybersecurity trends you can expect in 2024. Topics include: Generative AI Convergence of IT and Security Zero Trust Social Engineering Quantum Cryptography The post Jan. 2024 TECH Talk – Cybersecurity in the Fast Lane appeared first on DataEndure | Managed Cybersecurity. It's about time..

01-25
36:45

2023 Cybersecurity Highlights – TECH Talk Year in Review

In 2023, organizations worldwide faced increasing sophistication of cyber-attacks…With generative AI as a powerful catalyst, the story of the year is not just change, but the acceleration of change. In a threat environment where getting breached isn’t a matter of if, but when, DataEndure’s monthly TECH Talks cover cybersecurity hot topics and insights to help businesses remain on secure footing. In this compilation podcast, we feature key year-end takeaways to strengthen your security posture. Segments include: It only takes 1-click to create a ransomware situation (0:02) ChatGPT is an infant that’s been given the Internet (0:47) What does “good” cybersecurity look like? (2:55) Traditional gateway-based email security falls short (7:39) Preparing for the inevitable (17:36) It isn’t about the tools, it’s about layers of defense (22:20) Getting to security maturity (26:19) Phishing, deepfakes, and more are in the wild, breaching the confines of the inbox and exploiting the information people share across social platforms. Given the convergence of work and personal digital spaces, what once might have locked up a home computer can now bring down a corporate network. In a shifting threat landscape, waiting to react to the threats of tomorrow isn’t an option. In 2024, join us on the last Thursday of the month for actionable intelligence to fortify your cybersecurity posture. The post 2023 Cybersecurity Highlights – TECH Talk Year in Review appeared first on DataEndure | Managed Cybersecurity. It's about time..

12-21
29:54

Recommend Channels