<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 13 Mar 2026 15:22:26 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>DataCentric - Episodes Tagged with “Cybersecurity”</title>
    <link>https://www.datacentricpodcast.com/tags/cybersecurity</link>
    <pubDate>Fri, 03 Jun 2022 15:00:00 -0400</pubDate>
    <description>Welcome to the DataCentric podcast, where we delve into the latest developments in information technology, offering insights into its intricate workings and broader implications.
Hosted by Steve McDowell, Senior Analyst at NAND Research, our podcast explores new technologies, influential trends, and provides expert commentary on the forward trajectory of the technology industry.
Join us as we navigate the complex landscape of IT. Whether you're an industry professional or simply curious about the future of technology, DataCentric is your trusted source for informed discourse and forward-thinking analysis.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Enterprise IT Trends and Technologies</itunes:subtitle>
    <itunes:author>NAND Research </itunes:author>
    <itunes:summary>Welcome to the DataCentric podcast, where we delve into the latest developments in information technology, offering insights into its intricate workings and broader implications.
Hosted by Steve McDowell, Senior Analyst at NAND Research, our podcast explores new technologies, influential trends, and provides expert commentary on the forward trajectory of the technology industry.
Join us as we navigate the complex landscape of IT. Whether you're an industry professional or simply curious about the future of technology, DataCentric is your trusted source for informed discourse and forward-thinking analysis.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/4/49c95f4a-40c5-46ff-817f-e7236a4b5a56/cover.jpg?v=7"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>datacenter, technology, enterprise, IT, storage, servers, convergence, hyperconverged, infrastructure, HCI, composable infrastructure, enterprise compute, information technology, data, observability, cybersecurity, AI</itunes:keywords>
    <itunes:owner>
      <itunes:name>NAND Research </itunes:name>
      <itunes:email>datacentric@nand-research.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="News">
  <itunes:category text="Business News"/>
</itunes:category>
<item>
  <title>Cyber-Security at the Edge</title>
  <link>https://www.datacentricpodcast.com/412</link>
  <guid isPermaLink="false">27c9ff3a-2575-4f01-a476-89ccc91a6c96</guid>
  <pubDate>Fri, 03 Jun 2022 15:00:00 -0400</pubDate>
  <author>NAND Research </author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/49c95f4a-40c5-46ff-817f-e7236a4b5a56/27c9ff3a-2575-4f01-a476-89ccc91a6c96.mp3" length="11788665" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2022</itunes:season>
  <itunes:author>NAND Research </itunes:author>
  <itunes:subtitle>Nowhere is cybersecurity more critical than at an enterprise's edge, yet that's also an area with multiple owners. IT and OT engineers each have different responsibilities and views of this world. CFE Media senior editor Gary Cohen joins the podcast to give us his perspective. </itunes:subtitle>
  <itunes:duration>32:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/4/49c95f4a-40c5-46ff-817f-e7236a4b5a56/cover.jpg?v=7"/>
  <description>Nowhere is cybersecurity more critical than at an enterprise's edge, yet that's also an area with multiple owners and different approaches to the problem. It's a complicated environment. 
Gary Cohen, senior editor at CFE Media, joins hosts Matt Kimball and Steve McDowell to give us his perspective. CFE Media focuses heavily on tracking the trends influencing the edge. 
This is a wide-ranging conversation that touches on IT vs OT, cybersecurity, and even a little baseball &amp;amp; Morrissey.  Tune in!
00:00 Kick Off
01:02 Gary's history with the Chicago Cubs
05:00 Who is CFE Media? 
07:00 The complexities of Edge: IT and OT
12:39 Cyber-Security at the Edge
20:23 Supply Chain Concerns
24:07 How does CFE Media engage with edge-focused audiences?
27:40 Cyber-Security Commonalities between IT &amp;amp; OT
29:25 A Conversation about Morrissey
31:08 Wrapping up. 
32:44 The end.  Special Guest: Gary Cohen.
</description>
  <itunes:keywords>datacenter, technology, enterprise, information technology, IT, storage, servers, processor, convergence, HCI, composable infrastructure, data fabric, CIO</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Nowhere is cybersecurity more critical than at an enterprise&#39;s edge, yet that&#39;s also an area with multiple owners and different approaches to the problem. It&#39;s a complicated environment. </p>

<p>Gary Cohen, senior editor at CFE Media, joins hosts Matt Kimball and Steve McDowell to give us his perspective. CFE Media focuses heavily on tracking the trends influencing the edge. </p>

<p>This is a wide-ranging conversation that touches on IT vs OT, cybersecurity, and even a little baseball &amp; Morrissey.  Tune in!</p>

<p>00:00 Kick Off<br>
01:02 Gary&#39;s history with the Chicago Cubs<br>
05:00 Who is CFE Media? <br>
07:00 The complexities of Edge: IT and OT<br>
12:39 Cyber-Security at the Edge<br>
20:23 Supply Chain Concerns<br>
24:07 How does CFE Media engage with edge-focused audiences?<br>
27:40 Cyber-Security Commonalities between IT &amp; OT<br>
29:25 A Conversation about Morrissey<br>
31:08 Wrapping up. <br>
32:44 The end. </p><p>Special Guest: Gary Cohen.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Nowhere is cybersecurity more critical than at an enterprise&#39;s edge, yet that&#39;s also an area with multiple owners and different approaches to the problem. It&#39;s a complicated environment. </p>

<p>Gary Cohen, senior editor at CFE Media, joins hosts Matt Kimball and Steve McDowell to give us his perspective. CFE Media focuses heavily on tracking the trends influencing the edge. </p>

<p>This is a wide-ranging conversation that touches on IT vs OT, cybersecurity, and even a little baseball &amp; Morrissey.  Tune in!</p>

<p>00:00 Kick Off<br>
01:02 Gary&#39;s history with the Chicago Cubs<br>
05:00 Who is CFE Media? <br>
07:00 The complexities of Edge: IT and OT<br>
12:39 Cyber-Security at the Edge<br>
20:23 Supply Chain Concerns<br>
24:07 How does CFE Media engage with edge-focused audiences?<br>
27:40 Cyber-Security Commonalities between IT &amp; OT<br>
29:25 A Conversation about Morrissey<br>
31:08 Wrapping up. <br>
32:44 The end. </p><p>Special Guest: Gary Cohen.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Application Transformation with Data-Driven DevOps</title>
  <link>https://www.datacentricpodcast.com/317</link>
  <guid isPermaLink="false">a4f4d8dc-3fe1-497a-84aa-a7913a9f9b8f</guid>
  <pubDate>Thu, 19 Aug 2021 13:00:00 -0400</pubDate>
  <author>NAND Research </author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/49c95f4a-40c5-46ff-817f-e7236a4b5a56/a4f4d8dc-3fe1-497a-84aa-a7913a9f9b8f.mp3" length="8193827" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2021</itunes:season>
  <itunes:author>NAND Research </itunes:author>
  <itunes:subtitle>While DevOps offers IT organizations the tools required to deliver application transformation, it isn't until you start to incorporate an awareness of "Data" into a DevOps world that the real power to achieve digital transformation can be achieved.   Delphix CEO and founder Jedidiah Yueh joins the podcast to talk about the power of DevOps and why data is the "last automation frontier". </itunes:subtitle>
  <itunes:duration>21:45</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/4/49c95f4a-40c5-46ff-817f-e7236a4b5a56/episodes/a/a4f4d8dc-3fe1-497a-84aa-a7913a9f9b8f/cover.jpg?v=1"/>
  <description>While DevOps offers IT organizations the tools required to deliver application transformation, it isn't until you start to incorporate an awareness of "Data" into a DevOps world that the real power to achieve digital transformation can be achieved.   
Host Steve McDowell, senior technology analyst at Moor Insights &amp;amp; Strategy, has a wide-ranging conversation with Delphix CEO and founder Jedidiah Yueh about the power of DevOps and why data is the "last automation frontier".   They also talk about the intersection of DevOps, machine learning, and MLOps, as well as fostering a culture of innovation.  
00:00 Roll the tape... 
01:01 Jedidah Yueh's path from high-school teacher to Silicon Valley founder
03:30 Haven't we already solved all the hard DevOps problems? 
04:47 DevOps as part of your cyber-security strategy
07:58 DevOps and Application Transformation
10:08 The Delphix Vision
12:06 Intersection of DevOps and MLOps
14:00 ML Models are Just Another Kind of Data
15:50 What's on the horizon in the world of data-driven DevOps? 
17:20 Jed's book "Disrupt or Die" and how to foster a culture of innovation
20:20 Data is the last automation frontier
21:27 Wrapping up
21:44 .. the band plays us out
 Special Guest: Jedidiah Yueh.
</description>
  <itunes:keywords>cio, DevOps, MLOps, cybersecurity, data protection, datacenter, enterprise, information technology, IT, technology, delphix, data</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>While DevOps offers IT organizations the tools required to deliver application transformation, it isn&#39;t until you start to incorporate an awareness of &quot;Data&quot; into a DevOps world that the real power to achieve digital transformation can be achieved.   </p>

<p>Host Steve McDowell, senior technology analyst at Moor Insights &amp; Strategy, has a wide-ranging conversation with Delphix CEO and founder Jedidiah Yueh about the power of DevOps and why data is the &quot;last automation frontier&quot;.   They also talk about the intersection of DevOps, machine learning, and MLOps, as well as fostering a culture of innovation.  </p>

<p>00:00 Roll the tape... <br>
01:01 Jedidah Yueh&#39;s path from high-school teacher to Silicon Valley founder<br>
03:30 Haven&#39;t we already solved all the hard DevOps problems? <br>
04:47 DevOps as part of your cyber-security strategy<br>
07:58 DevOps and Application Transformation<br>
10:08 The Delphix Vision<br>
12:06 Intersection of DevOps and MLOps<br>
14:00 ML Models are Just Another Kind of Data<br>
15:50 What&#39;s on the horizon in the world of data-driven DevOps? <br>
17:20 Jed&#39;s book &quot;Disrupt or Die&quot; and how to foster a culture of innovation<br>
20:20 Data is the last automation frontier<br>
21:27 Wrapping up<br>
21:44 .. the band plays us out</p><p>Special Guest: Jedidiah Yueh.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>While DevOps offers IT organizations the tools required to deliver application transformation, it isn&#39;t until you start to incorporate an awareness of &quot;Data&quot; into a DevOps world that the real power to achieve digital transformation can be achieved.   </p>

<p>Host Steve McDowell, senior technology analyst at Moor Insights &amp; Strategy, has a wide-ranging conversation with Delphix CEO and founder Jedidiah Yueh about the power of DevOps and why data is the &quot;last automation frontier&quot;.   They also talk about the intersection of DevOps, machine learning, and MLOps, as well as fostering a culture of innovation.  </p>

<p>00:00 Roll the tape... <br>
01:01 Jedidah Yueh&#39;s path from high-school teacher to Silicon Valley founder<br>
03:30 Haven&#39;t we already solved all the hard DevOps problems? <br>
04:47 DevOps as part of your cyber-security strategy<br>
07:58 DevOps and Application Transformation<br>
10:08 The Delphix Vision<br>
12:06 Intersection of DevOps and MLOps<br>
14:00 ML Models are Just Another Kind of Data<br>
15:50 What&#39;s on the horizon in the world of data-driven DevOps? <br>
17:20 Jed&#39;s book &quot;Disrupt or Die&quot; and how to foster a culture of innovation<br>
20:20 Data is the last automation frontier<br>
21:27 Wrapping up<br>
21:44 .. the band plays us out</p><p>Special Guest: Jedidiah Yueh.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Thinking about Cyber-Security</title>
  <link>https://www.datacentricpodcast.com/314</link>
  <guid isPermaLink="false">fe1992ef-599c-4cde-bf6a-c1e17cb873e6</guid>
  <pubDate>Mon, 12 Jul 2021 23:00:00 -0400</pubDate>
  <author>NAND Research </author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/49c95f4a-40c5-46ff-817f-e7236a4b5a56/fe1992ef-599c-4cde-bf6a-c1e17cb873e6.mp3" length="10324449" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2021</itunes:season>
  <itunes:author>NAND Research </itunes:author>
  <itunes:subtitle>How should IT professionals think about cyber-security in a world where business-impacting ransomware and malware attacks have become a daily occurrence?  Matt &amp; Steve talk to Tim Liu, the CTO and co-founder of Hillstone Networks, a long-time player in the IT security market.  It's a wide-ranging conversation touching on current trends in data protection; thinking about security for cloud, edge, and core; and even using AI and advanced analytics to detect malware before it impacts your business.  This is a great and timely discussion.</itunes:subtitle>
  <itunes:duration>28:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/4/49c95f4a-40c5-46ff-817f-e7236a4b5a56/cover.jpg?v=7"/>
  <description>How should IT professionals think about cyber-security in a world where business-impacting ransomware and malware attacks have become a daily occurrence? 
Hosts Matt Kimball and Steve McDowell, senior technology analysts for Moor Insights &amp;amp; Strategy, have a wide-ranging conversation about the current state of cyber-security with Timothy Liu, Senior VP and CTO, as well as a co-founder of Hillstone Networks.   HIllstone Networks has been a player in the IT security market since 2006.
The group hits a broad set of related topics, including: 
Current trends in data protection: breach vs post-breach protection, ransomware, secured access services
How to think about security differently for cloud, edge, and core.
Using AI and advanced analytics to detect malware before the time of impact
What's on the horizon of security defence?  
It's a great and timely discussion.  Special Guest: Tim Liu.
</description>
  <itunes:keywords>datacenter, technology, enterprise, information technology, IT, storage, servers, processor, CIO, security, cybersecurity, ransomware</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>How should IT professionals think about cyber-security in a world where business-impacting ransomware and malware attacks have become a daily occurrence? </p>

<p>Hosts Matt Kimball and Steve McDowell, senior technology analysts for Moor Insights &amp; Strategy, have a wide-ranging conversation about the current state of cyber-security with Timothy Liu, Senior VP and CTO, as well as a co-founder of Hillstone Networks.   HIllstone Networks has been a player in the IT security market since 2006.</p>

<p>The group hits a broad set of related topics, including: </p>

<ul>
<li>Current trends in data protection: breach vs post-breach protection, ransomware, secured access services</li>
<li>How to think about security differently for cloud, edge, and core.</li>
<li>Using AI and advanced analytics to detect malware before the time of impact</li>
<li>What&#39;s on the horizon of security defence?<br></li>
</ul>

<p>It&#39;s a great and timely discussion. </p><p>Special Guest: Tim Liu.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>How should IT professionals think about cyber-security in a world where business-impacting ransomware and malware attacks have become a daily occurrence? </p>

<p>Hosts Matt Kimball and Steve McDowell, senior technology analysts for Moor Insights &amp; Strategy, have a wide-ranging conversation about the current state of cyber-security with Timothy Liu, Senior VP and CTO, as well as a co-founder of Hillstone Networks.   HIllstone Networks has been a player in the IT security market since 2006.</p>

<p>The group hits a broad set of related topics, including: </p>

<ul>
<li>Current trends in data protection: breach vs post-breach protection, ransomware, secured access services</li>
<li>How to think about security differently for cloud, edge, and core.</li>
<li>Using AI and advanced analytics to detect malware before the time of impact</li>
<li>What&#39;s on the horizon of security defence?<br></li>
</ul>

<p>It&#39;s a great and timely discussion. </p><p>Special Guest: Tim Liu.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Securing the Infrastructure Supply Chain</title>
  <link>https://www.datacentricpodcast.com/212</link>
  <guid isPermaLink="false">88df0d4a-d8ec-4c74-8229-50c7112f0cfe</guid>
  <pubDate>Tue, 02 Jun 2020 14:00:00 -0400</pubDate>
  <author>NAND Research </author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/49c95f4a-40c5-46ff-817f-e7236a4b5a56/88df0d4a-d8ec-4c74-8229-50c7112f0cfe.mp3" length="75263483" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2020</itunes:season>
  <itunes:author>NAND Research </itunes:author>
  <itunes:subtitle>You don't always think about the security of your vendor's supply chain as a part of your organization's cybersecurity and compliance efforts -- but you should.  Everything from ensuring the authenticity of components, all the way through the potential exploitation of systems &amp; subsystems in-transit can cause enterprise's damage.  This week we talk with John Grosso, Hewlett Packard Enterprise's vice president, global supply chain, about what these issues are, and how technology providers like HPE are addressing them. </itunes:subtitle>
  <itunes:duration>42:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/4/49c95f4a-40c5-46ff-817f-e7236a4b5a56/cover.jpg?v=7"/>
  <description>You don't always think about the security of your vendor's supply chain as a part of your organization's cybersecurity and compliance efforts -- but you should.  Everything from ensuring the authenticity of components, all the way through the potential exploitation of systems &amp;amp; subsystems in-transit can cause enterprise's damage.  
This episode has hosts Steve McDowell and Matt Kimball, both senior analysts at Moor Insights &amp;amp; Strategy, talking with John Grosso, Hewlett Packard Enterprise's vice president, global supply chain, about what these issues are, and how technology providers like HPE are addressing them.  Special Guest: John Grosso.
</description>
  <itunes:keywords>datacenter, technology, enterprise, information technology, IT, storage, servers, processor, convergence, HCI, composable infrastructure, data fabric, CIO</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>You don&#39;t always think about the security of your vendor&#39;s supply chain as a part of your organization&#39;s cybersecurity and compliance efforts -- but you should.  Everything from ensuring the authenticity of components, all the way through the potential exploitation of systems &amp; subsystems in-transit can cause enterprise&#39;s damage.  </p>

<p>This episode has hosts Steve McDowell and Matt Kimball, both senior analysts at Moor Insights &amp; Strategy, talking with John Grosso, Hewlett Packard Enterprise&#39;s vice president, global supply chain, about what these issues are, and how technology providers like HPE are addressing them. </p><p>Special Guest: John Grosso.</p><p>Sponsored By:</p><ul><li></li></ul><p>Links:</p><ul><li><a title="Do You Know Where Your Servers Come From? Here’s Why Securing The Supply Chain Matters" rel="nofollow" href="https://www.forbes.com/sites/moorinsights/2020/05/19/do-you-know-where-your-servers-come-from-heres-why-securing-the-supply-chain-matters/#2bdcdce4e150">Do You Know Where Your Servers Come From? Here’s Why Securing The Supply Chain Matters</a> &mdash; A column by Matt Kimball</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>You don&#39;t always think about the security of your vendor&#39;s supply chain as a part of your organization&#39;s cybersecurity and compliance efforts -- but you should.  Everything from ensuring the authenticity of components, all the way through the potential exploitation of systems &amp; subsystems in-transit can cause enterprise&#39;s damage.  </p>

<p>This episode has hosts Steve McDowell and Matt Kimball, both senior analysts at Moor Insights &amp; Strategy, talking with John Grosso, Hewlett Packard Enterprise&#39;s vice president, global supply chain, about what these issues are, and how technology providers like HPE are addressing them. </p><p>Special Guest: John Grosso.</p><p>Sponsored By:</p><ul><li></li></ul><p>Links:</p><ul><li><a title="Do You Know Where Your Servers Come From? Here’s Why Securing The Supply Chain Matters" rel="nofollow" href="https://www.forbes.com/sites/moorinsights/2020/05/19/do-you-know-where-your-servers-come-from-heres-why-securing-the-supply-chain-matters/#2bdcdce4e150">Do You Know Where Your Servers Come From? Here’s Why Securing The Supply Chain Matters</a> &mdash; A column by Matt Kimball</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Cybersecurity in the age of the Intelligent Edge: A conversation with HPE and Aruba </title>
  <link>https://www.datacentricpodcast.com/207</link>
  <guid isPermaLink="false">dc1b60f4-f718-4b2c-bcbc-34c9331bc4df</guid>
  <pubDate>Thu, 26 Mar 2020 10:00:00 -0400</pubDate>
  <author>NAND Research </author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/49c95f4a-40c5-46ff-817f-e7236a4b5a56/dc1b60f4-f718-4b2c-bcbc-34c9331bc4df.mp3" length="84828073" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2020</itunes:season>
  <itunes:author>NAND Research </itunes:author>
  <itunes:subtitle>Deploying technology at the Intelligent Edge disrupts traditional IT thinking about devices, best practices, and security &amp; compliance. Hosts Matt Kimball and Steve McDowell are joined by Jon Green, VP and Chief Security Technologist and Aruba, a Hewlett Packard Company company, and Tim Ferrell, master cybersecurity architect at Hewlett Packard Enterprise. </itunes:subtitle>
  <itunes:duration>52:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/4/49c95f4a-40c5-46ff-817f-e7236a4b5a56/cover.jpg?v=7"/>
  <description>The Intelligent Edge, encompassing "devices that aren't in the datacenter", is growing at a nearly exponential rate.  This challenges how traditional IT thinks about managing intelligent infrastructure, especially at the intersection of IT and OT, forcing everyone to think just a little bit differently -- all of this as nearly every company is forging their own paths. 
DataCentric hosts Matt Kimball and Steve McDowell are joined by two experts in this field: Jon Green, VP and Chief Security Technologist and Aruba, a Hewlett Packard company,  and Tim Ferrell, master cybersecurity architect at Hewlett Packard Enterprise, bring their unique perspectives about the challenges involved. 
The gang ponders the how IT should think about evolving people, processes, and practices in the age of the Intelligent Edge.  
This episode is sponsored by Hewlett Packard Enterprise.  Special Guests: Jon Green and Tim Ferrell.
</description>
  <itunes:keywords>datacenter, technology, enterprise, information technology, IT, storage, servers, processor, convergence, HCI, composable infrastructure, data fabric, CIO</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The Intelligent Edge, encompassing &quot;devices that aren&#39;t in the datacenter&quot;, is growing at a nearly exponential rate.  This challenges how traditional IT thinks about managing intelligent infrastructure, especially at the intersection of IT and OT, forcing everyone to think just a little bit differently -- all of this as nearly every company is forging their own paths. </p>

<p>DataCentric hosts Matt Kimball and Steve McDowell are joined by two experts in this field: Jon Green, VP and Chief Security Technologist and Aruba, a Hewlett Packard company,  and Tim Ferrell, master cybersecurity architect at Hewlett Packard Enterprise, bring their unique perspectives about the challenges involved. </p>

<p>The gang ponders the how IT should think about evolving people, processes, and practices in the age of the Intelligent Edge.  </p>

<p>This episode is sponsored by Hewlett Packard Enterprise. </p><p>Special Guests: Jon Green and Tim Ferrell.</p><p>Sponsored By:</p><ul><li></li></ul><p>Links:</p><ul><li><a title="CyberSecurity in the Edge Era: A Practitioner&#39;s Guide (Research Paper)" rel="nofollow" href="http://www.moorinsightsstrategy.com/research-paper-cybersecurity-in-the-edge-era-a-practitioners-guide/">CyberSecurity in the Edge Era: A Practitioner's Guide (Research Paper)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The Intelligent Edge, encompassing &quot;devices that aren&#39;t in the datacenter&quot;, is growing at a nearly exponential rate.  This challenges how traditional IT thinks about managing intelligent infrastructure, especially at the intersection of IT and OT, forcing everyone to think just a little bit differently -- all of this as nearly every company is forging their own paths. </p>

<p>DataCentric hosts Matt Kimball and Steve McDowell are joined by two experts in this field: Jon Green, VP and Chief Security Technologist and Aruba, a Hewlett Packard company,  and Tim Ferrell, master cybersecurity architect at Hewlett Packard Enterprise, bring their unique perspectives about the challenges involved. </p>

<p>The gang ponders the how IT should think about evolving people, processes, and practices in the age of the Intelligent Edge.  </p>

<p>This episode is sponsored by Hewlett Packard Enterprise. </p><p>Special Guests: Jon Green and Tim Ferrell.</p><p>Sponsored By:</p><ul><li></li></ul><p>Links:</p><ul><li><a title="CyberSecurity in the Edge Era: A Practitioner&#39;s Guide (Research Paper)" rel="nofollow" href="http://www.moorinsightsstrategy.com/research-paper-cybersecurity-in-the-edge-era-a-practitioners-guide/">CyberSecurity in the Edge Era: A Practitioner's Guide (Research Paper)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Cyber-Security with HPE's Bob Moore:  Live from HPE Discover</title>
  <link>https://www.datacentricpodcast.com/121</link>
  <guid isPermaLink="false">17b38478-ddb7-4c5b-b59d-9bb5848afe95</guid>
  <pubDate>Mon, 24 Jun 2019 10:00:00 -0400</pubDate>
  <author>NAND Research </author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/49c95f4a-40c5-46ff-817f-e7236a4b5a56/17b38478-ddb7-4c5b-b59d-9bb5848afe95.mp3" length="13087054" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2019</itunes:season>
  <itunes:author>NAND Research </itunes:author>
  <itunes:subtitle>There are two kinds of commercial computer users, our guest Bob Moore, Director of Server Software and Product Security at HPE, tells us: Those that have been attacked, and those that have been attacked again. This is a great half-hour delving into the devious ways that we're all being targeted, and how the industry (and HPE) reacts to it.</itunes:subtitle>
  <itunes:duration>18:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/4/49c95f4a-40c5-46ff-817f-e7236a4b5a56/cover.jpg?v=7"/>
  <description>During this wide-ranging half-hour discussion recorded live at the 2019 HPE Discover in Las Vegas, hosts Steve McDowell and Matt Kimball talk to HPE's Director of Server Software and Product Security, Bob Moore, about the insidious attack vectors that are emerging. This covers everything from firmware attacks to supply chain interceptions, along with the growth of mafia-like organizations that are driving attacks at an unprecedented scale. 
We also talk about how the industry is helping IT respond to those attacks.  IT best practices are being supplemented by silicon-based defenses, AI-driven predictive analytics (such as HPE's own InfoSight), and new cyber-insurance offerings. 
It's a jam-packed, wide-ranging discussion. It's also one you won't want to miss.
Thanks you to Bob Moore for joining us, and HPE's analyst relations team for helping coordinate it all.  Special Guest: Bob Moore.
</description>
  <itunes:keywords>datacenter, technology, enterprise, information technology, IT, storage, servers, processor, convergence, HCI, composable infrastructure, data fabric, CIO</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>During this wide-ranging half-hour discussion recorded live at the 2019 HPE Discover in Las Vegas, hosts Steve McDowell and Matt Kimball talk to HPE&#39;s Director of Server Software and Product Security, Bob Moore, about the insidious attack vectors that are emerging. This covers everything from firmware attacks to supply chain interceptions, along with the growth of mafia-like organizations that are driving attacks at an unprecedented scale. </p>

<p>We also talk about how the industry is helping IT respond to those attacks.  IT best practices are being supplemented by silicon-based defenses, AI-driven predictive analytics (such as HPE&#39;s own InfoSight), and new cyber-insurance offerings. </p>

<p>It&#39;s a jam-packed, wide-ranging discussion. It&#39;s also one you won&#39;t want to miss.</p>

<p>Thanks you to Bob Moore for joining us, and HPE&#39;s analyst relations team for helping coordinate it all. </p><p>Special Guest: Bob Moore.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>During this wide-ranging half-hour discussion recorded live at the 2019 HPE Discover in Las Vegas, hosts Steve McDowell and Matt Kimball talk to HPE&#39;s Director of Server Software and Product Security, Bob Moore, about the insidious attack vectors that are emerging. This covers everything from firmware attacks to supply chain interceptions, along with the growth of mafia-like organizations that are driving attacks at an unprecedented scale. </p>

<p>We also talk about how the industry is helping IT respond to those attacks.  IT best practices are being supplemented by silicon-based defenses, AI-driven predictive analytics (such as HPE&#39;s own InfoSight), and new cyber-insurance offerings. </p>

<p>It&#39;s a jam-packed, wide-ranging discussion. It&#39;s also one you won&#39;t want to miss.</p>

<p>Thanks you to Bob Moore for joining us, and HPE&#39;s analyst relations team for helping coordinate it all. </p><p>Special Guest: Bob Moore.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
