In this episode, Darren discusses the four superpowers of digital transformation with Intel’s Greg Ernst, Corporate VP of Sales, Americas. Ubiquitous computing, Pervasive Connectivity, Cloud to Edge, Artificial Intelligence.More
Category Archives: Security
As edge and cloud have pushed compute and data beyond the secure walls of the data center, security models have to change to adapt to new cyber-threats and a vastly increased attack service.
#92 Protecting the Outer Walls of your Castle with Vulnerability Scans
On this episode, Darren talks to Matt Lembright, Director of Federal Applications, Censys, about how Censys assesses the attack surface for internet-connected devices, allowing organizations to eliminate vulnerabilities.More
#91 Fighting the Cyber Adversary by Securing your Software Supply Chain
Darren Pulsipher, Chief Solutions Architect, Intel, and Eric Greenwald, General Counsel of Finite State, discuss securing the software supply chain. Check out the blog for the episode.More
#89 Future of BigMemory and CXL
In this episode, Darren discusses advances in-memory architecture with Charles Fan, CEO of MemVerge, winner of the 2022 Bio-IT World Best in Show and People’s Choice Award. More
#88 Collaborative DevSecOps
In this episode, Darren Pulsipher, Chief Solutions Architect, Intel, talks with Sophos’ Callen Sapien, Director of Product Management, Sophos Factory, and Mike Fraser, VP of DevSecOps, about their product allows for truly collaborative DevSecOps.More
#87 Confidential Computing in the DevSecOps
Recent cyberattacks have focused on the build process vulnerabilities. Find out how to secure the DevOps pipeline to protect from these attacks with Confidential Computing.More
#85 Artificial Intelligence and Security
In this episode, Darren Pulsipher, Chief Solution Architect, Public Sector, Intel, discusses the data aspects of artificial intelligence and the importance of securing that data.More
#84 Securing Your Castle with Zero-Trust
The old model of security could be compared to a castle, with guards along the road and a moat surrounding the castle. All of the crown jewels, in this case, data, would be centrally located and managed inside the castle. The emergence of zero-trust has created a new framework.More
#83 IDC Directions 2022
Intel’s Solution Architects Darren Pulsipher and David Richard reflect on the trends and idea from the 2022 IDC Directions conference. More
#78 Understanding the Shared Responsibility Security Model
Most people understand the responsibility of security on-prem, but the responsibility becomes murkier in the cloud. If data is protected in the cloud, how is it protected? Who is responsible for that security? What about patching machines?More