Let's talk data Proact
-
- Business
We're on a mission to help organisations unlock the power of their data. Follow us here for practical tips on how you can do that.
-
Corporate security and public WiFi risks
In today's episode, we'll discuss the dichotomy of living in
two digital worlds: one where corporate security measures offer robust protection, and another where vulnerabilities can still expose our data in unexpected places, such as public Wi-Fi networks. We'll also tackle the ongoing debate between open source and closed source software security, examining real-world incidents and the human factors that influence the reliability of the software we rely on daily. -
Microsoft Defender: Insights and Intricacies
Welcome to another episode of Let's Talk Data, your go-to
podcast for diving deep into the world of data and technology. We’re taking a closer look at a critical component of cybersecurity in the Microsoft ecosystem: Microsoft Defender. In this episode, we'll explore Microsoft
Defender's capabilities, its comprehensive suite of security tools, and why it has become indispensable for organisations relying on Microsoft 365.
Microsoft Defender is more than just a simple antivirus
program; it's a robust security suite that encompasses nearly all facets of Microsoft 365. From endpoint protection to cloud security, Defender offers a layered defence strategy against a myriad of cyber threats. But what makes it
stand out? How does it integrate seamlessly with other Microsoft services, and what real-world benefits does it provide? -
Securing Kubernetes: Navigating the Complexities
Welcome back to our podcast Let’s Talk Data brought to you
by Proact! In our last episode, we delved into the fundamentals of Kubernetes and explored its role in modern IT infrastructure. If you missed it, be sure to check it out for a comprehensive overview.
Today, we're diving deeper into a critical aspect of
Kubernetes: security. Joining us once again is our esteemed colleague, Jonas Larson, a specialist in Kubernetes and containerisation ahead of DevOps practice. We'll be navigating through the complexities of securing Kubernetes environments, discussing everything from image patching to vulnerability management.
As we unravel Kubernetes security, we'll explore the unique
challenges posed by containerised environments and the strategies for mitigating risks. From supply chain vulnerabilities to runtime security, we'll leave no stone unturned in our quest to understand Kubernetes security.
So, whether you're a seasoned IT professional or new to the
world of containerisation, buckle up as we embark on this journey into Kubernetes security. Let's get started! -
Container Chronicles: Demystifying IT's Digital Evolution
Welcome to the Let’s Talk Data Podcast brought to you by
Proact, where we unravel the mysteries and misconceptions surrounding the world of containers in the realm of IT. I'm your host, Tony Gent, and in today's episode, we delve deep into the landscape of containerisation, guided by our expert, Jonas Larson, a seasoned professional in the field of containers and DevOps.
But what exactly are containers, and how do they differ from
Kubernetes?
Join us as we navigate through the terminology and demystify the concepts behind these powerful tools. From their origins to their practical applications, we'll explore how containers revolutionise software development and deployment.
So, whether you're a seasoned IT veteran or just dipping
your toes into the world of containers, tune in as we debunk myths, clarify terminology, and uncover the true potential of containerisation for businesses of all sizes.
Stay tuned for an enlightening conversation that promises to
expand your understanding of this transformative technology. -
Navigating DORA: Europe's Cybersecurity Game-Changer
DORA, or the Digital Operational Resiliency Act, is set to
revolutionise cybersecurity regulations for financial institutions across europe. With a focus on enhanced security measures and resilience against cyber threats, DORA aims to ensure the stability and integrity of financial systems. As deadlines approach and legislation is finalized, the implications of DORA are poised to reshape the landscape of financial cybersecurity. Monitored by EU financial authorities, compliance isn't optional—it's essential for continued operation in the European market. With
deadlines looming, the financial sector is bracing for a seismic shift in cybersecurity standards. -
Navigating the Aftermath
In the wake of Broadcom's acquisition of VMware, significant changes have rocked the landscape of virtualization and software solutions. With a shift towards subscription-based models and simplified bundles, VMware by Broadcom aims to streamline offerings but faces backlash from smaller customers grappling with price hikes. Meanwhile, industry giants ponder alternatives, raising questions about the future of virtualization and its impact on IT ecosystems.