Powered by RND

Tech Transformed

EM360Tech
Tech Transformed
Último episodio

Episodios disponibles

5 de 310
  • Beyond the Hyperscalers: Building Cyber Resilience on Independent Infrastructure
    “Cyber resilience isn’t just about protection, it’s about preparation.”Every business in this day and age lives in the cloud. Our operations, data, and collaboration tools are powered by servers located invisibly around the world. But here’s the question we often overlook: what happens when the cloud falters?In this episode of Tech Transformed, Trisha Pillay sits down with Jan Ursi, Vice President of Global Channels at Keepit, to uncover the real meaning of cyber resilience in a cloud-first world. Are you putting all your trust in hyperscale cloud providers? Think again. Trisha and Jan explore why relying solely on giants like Microsoft or Amazon can put your data at risk and how independent infrastructure gives organisations control, faster recovery, and true digital sovereignty.Takeaways:The importance of cyber resilience in a cloud-first worldHow independent cloud infrastructure protects your SaaS applicationsCommon shared responsibility misconceptions that can cost organisations dataStrategies for quick recovery from ransomware and cyberattacksWhy digital sovereignty ensures control and complianceChapters:00:00 – Introduction to Cyber Resilience and Cloud Strategy05:00 – The Importance of Independent Infrastructure10:00 – Shared Responsibility and Misconceptions15:00 – Digital Sovereignty and Compliance20:00 – Practical Tips for CISOs and CIOs22:00 – ConclusionAbout Jan Ursi:Jan Ursi leads Keepit’s global partnerships, helping organisations embrace the AI-powered cyber resilience era. Keepit is the world’s only independent cloud dedicated to SaaS data protection, security, and recovery. Jan has previously built and scaled businesses at Rubrik, UiPath, Nutanix, Infoblox, and Juniper, shaping the future of enterprise cloud, hyper-automation, and data protection.Follow EM360Tech for more insights:Website: www.em360tech.comX: @EM360TechLinkedIn: EM360TechYouTube: EM360Tech
    --------  
    23:05
  • Are Your Keys Safe? Why HSMs Are Now Essential for Cloud, Quantum, and AI Security
    "You have to think about how the online world really operates and how we make sure that data is secure. How can we trust each other in the digital world?" Robert Rogenmoser, the CEO of Securosys, asks. The answer is "encryption and digital signature."According to Robert Rogenmoser, the CEO of Securosys, storing keys insecurely creates immediate risk. This makes it crucial to maintain strong key security. "If it's just in a software system, you can easily get hacked. If I have your encryption key, I can read your data. If I have your Bitcoin keys, I can spend your money,” says Rogenmoser.In the recent episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Robert Rogenmoser, the CEO of Securosys, about safeguarding the digital world with cryptographic keys. Rogenmoser puts up a case to rally Hardware Security Modules (HSMs) as the best solution for this critical challenge.In addition to discussing how hardware security modules (HSMs) protect encryption keys, they also talk about the evolution of HSMs, their applications in financial services, the implications of post-quantum cryptography, and the integration of AI in security practices. Are Hardware Security Modules (HSMs) the Ultimate Solution?The conversation stresses the importance of key management and the need for organisations to adapt to emerging technologies while ensuring data security.In order to mitigate the cybersecurity risks, the priority is to securely store the keys, control access, and generate impenetrable keys that cannot be easily guessed by cyber criminals. HSMs are the ultimate solution to the key issue, believes Rogenmoser. Firms tend to shift their data to the cloud, making it even more essential to secure keys. The main challenge arises when both the data and the keys are managed by the same cloud provider, as this setup can compromise the integrity of key control and raise concerns about data sovereignty. However, Securosys approaches this challenge differently. Rogenmoser explains that organisations can keep their data encrypted in the cloud. At the same time, they keep the key somewhere else, where only they have control over it.Multi-Authorisation System for High-Stakes TransactionsRogenmoser pointed out the company's patented system for multi-authorisation of Bitcoin keys. This system is essential because blockchain transactions are high-stakes and irreversible."Crypto custody for bitcoins or any cryptocurrency is a major business for our HSM," he said. Banks that hold large amounts of customer crypto cannot afford a single point of failure. "A blockchain operation is a one-way thing. You sign a transaction, and the money is gone."The multi-authorisation system addresses this issue by requiring a "quorum" of people to approve each transaction. Rogenmoser explained, "You can say this transaction can only be signed and sent to the blockchain if one out of three compliance officers signs this, plus two out of five traders." This approach creates a "more secure system" because "the HSM then checks, do we have a quorum? Did everyone actually sign the same transaction?"...
    --------  
    19:19
  • How are 5G and Edge Computing Powering the Future of Private Networks?
    "5G is becoming a great enabler for industries, enterprises, in-building connectivity and a variety of use cases, because now we can provide both the lowest latency and the highest bandwidth possible,” states Ganesh Shenbagaraman, Radisys Head of Standards, Regulatory Affairs & Ecosystems.In the recent episode of the Tech Transformed podcast, Shubhangi Dua, Podcast Host, Producer, and Tech Journalist at EM360Tech, speaks to Shenbagaraman about 5G and edge computing and how they power private networks for various industries, from manufacturing, national security to space.The Radisys’ Head of Standards believes in the idea of combining 5G with edge computing for transformative enterprise connectivity. If you’re a CEO, CIO, CTO, or CISO facing challenges of keeping up the pace with capacity, security and quality, this episode is for you. The speakers provide a guide on how to achieve next-gen private networks and prepare for the 6G future.Real-Time ControlThe growing need for real-time applications, such as high-quality live video streams and small industrial sensors with instant responses, demands data processing to occur closer to the source than ever before. Alluding to the technical solution that provides near-zero latency and ensures data security, Shenbagaraman says:"By placing the 5G User Plane Function (UPF) next to local radios, we achieve near-zero latency between wireless and application processing. This keeps sensitive data secure within the enterprise network."Such a strategy has now become imperative in handling both high-volume and mission-critical low-latency data all at the same time. Radisys addresses key compliance and confidentiality issues by storing the data within a private network. Essentially, they create a safe security framework that yields near-zero latency to guarantee utmost data security.Powering Edge Computing ApplicationsThe real-world benefit of this zero-latency setup is the power it gives to edge computing applications. As the user plane function is the network's final data exit point, positioning the processing application near it assures prompt perspicuity and action."The devices could be sending very domain-specific data,” said Shenbagaraman. “The user plane function immediately transfers it to the application, the edge application, where it can be processed in real time."It reduces errors and improves the efficiency of tasks through the Radisys platform, with the results meeting all essential requirements, including compliance needs.One such successful use case spotlighted in the podcast is the Radisys work with Lockheed Martin’s defence applications. "We enabled sophisticated use cases for Lockheed Martin by leveraging the underlying flexibility of 5G,” the Radisys speaker exemplified.Radisys team customised 5G connectivity for the US defence sector. It incorporated temporary, ad-hoc networks in challenging terrains using Internet Access Backhaul. It also covered isolated, permanent private networks for locations such as maintenance hangars.Intelligence comes from the RAN Intelligent...
    --------  
    25:02
  • How Do You Make AI Agents Reliable at Scale?
    Now that companies have begun leaping into AI applications and adopting agentic automation, new architectural challenges are bound to emerge. With every new technology comes high responsibility, consequences and challenges. To help face and overcome some of these challenges, Temporal introduced the concept of “durable execution.” This concept has quickly become an integral part of building AI systems that are not just scalable but also reliable, observable and manageable.In this episode of the Tech Transformed podcast, host Kevin Petrie, VP of Research at BARC, sits down with Samar Abbas, Co-founder and CEO of Temporal Technologies. They talk about durable execution and its critical role in driving AI innovation within enterprises. They discuss Abbas’s extensive background in software resilience, the development of application architectures, and the importance of managing state and reliability in AI workflows. The conversation also touches on the collaboration between developers, data teams, and data scientists, emphasising how durable execution can enhance productivity and governance in AI initiatives.Also Watch: Developer Productivity 5X to 10X: Is Durable Execution the Answer to AI Orchestration Challenges?Chatbots to Autonomous Agents“AI agents are going to get more and more mission critical, more and more longer lived, and more asynchronous," Abbas tells Petrie. “They’ll require more human interaction, and you need a very stable foundation to build these kinds of application architectures.”AI not just fuels chatbots today. Enterprises are increasingly experimenting with agentic workflows—autonomous AI agents that carry out complex background tasks independently. For example, agents can assign, solve, and submit software issues using GitHub pull requests. Such a setup isn’t just a distant vision; the Temporal co-founder pointed to OpenAI’s Codex as a real-world case. With this approach, AI becomes a system that can handle hundreds of tasks at once, potentially achieving "100x orders of magnitude velocity," as Abbas described.However, there are some architectural difficulties to stay mindful of. The AI agents are non-deterministic by nature and often depend on large language models (LLMs) like OpenAI’s GPT, Anthropic’s Claude, or Google’s Gemini. They reason based on probabilities, and they improvise. They often make decisions that are hard to trace or manage.AI workflows as simple codeThis is where Temporal comes in. It becomes the executioner that keeps the system cohesive and in alignment. “What we are trying to solve with Temporal and durable execution more generally is that we tackle challenging distributed systems problems," said Abbas.Rather than developers stressing over queues, retries, or building their own reliability layers, Temporal allows them to write their AI workflows as simple code. Temporal takes care of everything else—reliable state management, retrying failed tasks, orchestrating asynchronous services, and ensuring uptime regardless of what fails below the surface.As agent-based architectures become more common, the demand for this kind of system-level orchestration will only increase.Listen to the full conversation on the Tech...
    --------  
    25:41
  • How To Maintain Human Connection in an AI World
    For CISOs and technology leaders, AI is reshaping business process management and daily operations. It can automate routine tasks and analyse data, but the human element remains critical for workforce oversight, customer interactions, and strategic decision-making.In this episode of Tech Transformed, Trisha Pillay talks with Anshuman Singh, CEO of HGS UK, about AI in the workplace. They discuss how AI can support employees, improve customer service, and require careful oversight. Singh also shares insights on preparing organisations for AI integration and trends leaders should watch in the coming years.Questions or comments? Email [email protected] or follow us on YouTube, Instagram, and Twitter @EM360Tech.TakeawaysAI is reshaping workforce needs, not just replacing jobs.Routine tasks are increasingly being automated by AI.AI can free up capacity for more meaningful work.The narrative around productivity is changing with AI.AI will create new job opportunities, often better-paying.Human oversight is crucial in AI decision-making.AI can assist in customer service, enhancing empathy.Organisations should not wait for perfect AI solutions.Training and hands-on experience with AI are essential.A psychological safety net is necessary for AI experimentation.Chapters00:00 Introduction to AI and Human Element03:03 AI's Impact on Workforce Dynamics08:29 The Role of Human Oversight in AI10:46 AI Innovations in Customer Service16:34 Positioning for Growth in Business Process Management20:01 Preparing the Workforce for AI Integration25:35 Emerging Trends in AI and Workforce29:19 Final Thoughts on AI and Ethics
    --------  
    23:48

Más podcasts de Economía y empresa

Acerca de Tech Transformed

Expert-driven insights and practical strategies for navigating the future of AI and emerging technologies in business. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make informed decisions for your enterprise.
Sitio web del podcast

Escucha Tech Transformed, Cracks Podcast con Oso Trava y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app

Tech Transformed: Podcasts del grupo

Aplicaciones
Redes sociales
v7.23.11 | © 2007-2025 radio.de GmbH
Generated: 11/5/2025 - 4:48:07 PM