Bots now make up 51% of internet traffic. And malicious bots? They account for 37% of all web traffic. AI is helping bots slip past defenses—making them smarter, faster, and harder to spot. The result? Account takeovers, scraping, and API abuse. David Holmes, CTO of Application Security at Imperva, joins DataEndure’s CTO Shahin Pirooz to explore the rise of bots and how to defend against them. 0:00 Rise of Bots… Read More
When Compliance Isn’t About You: External Pressures Reshaping Security
Compliance doesn’t end at your walls—it extends to every partner, customer, and supplier you touch. In this talk, our hosts explore how shifting regulations, supply chain pressures, and opportunistic adversaries are reshaping governance, storage, and security strategy—and how compliance can become a foundation for resilience. 0:00 Introduction 0:35 The Compliance Ripple Effect 2:04 Federal Mandates & CMMC Pressure 7:44 Shared Risk & Responsibility 9:55 Three Areas to Focus On 13:36… Read More
Unlocking AI Productivity with Microsoft Copilot
The real value of AI is what you can put to work today. In this TECH Talk, discover how Microsoft Copilot is already transforming IT and business workflows. We explore Copilot’s most impactful use cases and share strategies to navigate Microsoft’s expansive AI ecosystem—so you know where and how it best serves your business. Whether you want to boost efficiency or streamline operations, see how Copilot helps teams work smarter,… Read More
Backup ≠ Recovery: The Costly Ransomware Myth
When ransomware hits, your ability to recover depends on more than just backups—it hinges on your storage architecture. In this TECH Talk, we unpack the often-overlooked role that storage plays in both data loss and recovery—and why many recovery efforts fail when the architecture is fragmented, outdated, or siloed. Join our hosts Shahin Pirooz, DataEndure CTO and Kirstin Burke, DataEndure CMO.
No Framework, No Foundation: Why Cyber Resilience Starts Here
A little planning today can prevent a lot of trouble tomorrow. Network and cybersecurity expert Ross Rehart, MSc. shares how the right framework brings order to the chaos, aligns security with business goals, and sets the stage for long-term success.
The Next Evolution of AI: Generative vs Agentic AI Explained
AI isn’t just generating text and images anymore—it’s making decisions, taking action, and reshaping entire industries. Agentic AI is here, and it’s changing the way businesses operate. In this TECH Talk episode, DataEndure’s CTO Shahin Pirooz and CMO Kirstin Burke break down the difference between generative and agentic AI, share real-world examples, and give business leaders a preview of what’s coming next.
AI Gold Rush: How to Build a Winning On-Prem Strategy
AI is transforming industries, and on-prem solutions are emerging as a strategic advantage. Businesses are shifting AI workloads in-house to gain speed, efficiency, and full data control—while sidestepping the escalating costs of cloud services. In this TECH Talk episode, DataEndure’s CTO Shahin Pirooz and CMO Kirstin Burke discuss how organizations can harness AI appliances and private cloud systems to enhance productivity, ensure compliance, and maximize performance. 00:00 Introduction 00:52 AI’s… Read More
December 2024 TECH Talk – Top 3 Technology Strategies
From AI-driven automation to faster, localized data processing, and the growing emphasis on sustainability, we explore the top trends shaping the year ahead.
Why Network Security Must Be Your First Priority
The network is the central hub of your business—connecting people, devices, and data across multiple environments. Yet, every connection point is also a potential entry point for hackers. Today, the network and threats have changed. In this TECH Talk, networking expert Ross Rehart, MSc. explains why your thinking must change, too. 0:00 Introduction 0:17 Traditional Network Topologies 0:56 Impact of Cloud Computing 1:46 The Role of Wireless and 5G 2:32… Read More
Digital Ghosts: The Cybersecurity Risks of Abandoned Data
Is your organization haunted by forgotten data? Abandoned data can quickly become a prime target for cybercriminals lurking in the shadows, waiting to cause data breaches and compliance nightmares. We share practical strategies to mitigate risk. 0:00 Introduction 0:23 The Scale of Data Growth 2:00 Understanding ROT (Redundant, Obsolete, Trivial) Data 9:00 Steps to Manage Abandoned Data 13:30 Setting Data Retention Policies 19:00 Best Practices for Data Hygiene 26:00 The… Read More
- 1
- 2
- 3
- …
- 7
- Next Page »