Where Automation Meets Security
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Architect Mark R. LePage explores the business of architecture, firm leadership and the everyday life of an architect. From Gābl Media, EntreArchitect Podcast features weekly interviews with inspiring, passionate people who share their knowledge and expertise... all to help you build a better business as a small firm entrepreneur architect. Proven business strategies for architects, including financial management, profit, marketing, sales, productivity, and planning.
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
Host David Brossard discusses the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award ...
…
continue reading
Your source for wide-ranging discussions from all around the Go community. Panelists include Mat Ryer, Jon Calhoun, Natalie Pistunovich, Johnny Boursiquot, Angelica Hill, Kris Brandow, and Ian Lopshire. We discuss cloud infrastructure, distributed systems, microservices, Kubernetes, Docker... oh and also Go! Some people search for GoTime or GoTimeFM and can't find the show, so now the strings GoTime and GoTimeFM are in our description too.
…
continue reading
The TOF® Biosphere is a privacy focused platform. It accommodates real-world, event driven accounting in DLT and location free use of fiat or cryptocurrencies during legally compliant contractual based engagements. Users define and exchange on their own, trusted terms.
…
continue reading
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
…
continue reading
OK, everyone knows that #APKnowsIT. Our global team of 500+ geeks, who work globally on five continents, across 30+ countries, are #CreatingExcellence every day. We want to share our excellence with the IT community. We aim to educate, inspire, and motivate IT, professionals, worldwide. Disclaimer: The views expressed in the podcasts are the speaker’s own and do not reflect the view of Authority Partners. ® AP 1998 - 2023
…
continue reading

1
Zero Trust: Buzzword or Best Practice?
1:05:48
1:05:48
Play later
Play later
Lists
Like
Liked
1:05:48Ever wonder if Zero Trust is the next big buzzword or if it actually holds the key to modern cybersecurity? In Episode 27 of Cyber After Hours—titled “Zero Trust: Buzzword or Best Practice?”—co-hosts Evan Morgan and Paul Marco kick things off with a friendly Star Wars vs. Star Trek debate before diving into the serious question of what it really ta…
…
continue reading

1
EA609: Carina Mills - The Death of Apprenticeship: Architecture’s Urgent Culture Shift
37:19
37:19
Play later
Play later
Lists
Like
Liked
37:19The Death of Apprenticeship: Architecture’s Urgent Culture Shift In this episode of the EntreArchitect Podcast, Carina Mills, Senior Talent Director at RDC and President of AIA California, dives into the urgent culture shift reshaping architecture. She shares her personal journey from technical architect to leadership, emphasizing the fading model …
…
continue reading

1
Developing Cybersecurity Talent: Is Academia Keeping Up?
53:04
53:04
Play later
Play later
Lists
Like
Liked
53:04Ever wonder if universities are really prepping cybersecurity students for the real world—or just handing out degrees that look nice framed on a wall? In this lively episode of Cyber After Hours—Developing Cybersecurity Talent: Is Academia Keeping Up?—Evan and Paul (who, humorously, admits he has a chronic name-forgetting phobia) dive headfirst int…
…
continue reading

1
EA608: Fallon Scott - Fix the Foundation: How to Build a Scalable Firm Without Burning Out
39:01
39:01
Play later
Play later
Lists
Like
Liked
39:01From Ground Zero to Global Practice: Reimagining Architecture’s Future In this episode, Fallon Scott, founder of F28&Co, shares how small firms can scale without sacrificing their sanity. Drawing from her background in accounting, auditing, and corporate operations, Fallon explains how implementing enterprise-level systems—like SOPs and financial f…
…
continue reading

1
Cybersecurity Budgeting: Where to Spend, Where to Save
55:08
55:08
Play later
Play later
Lists
Like
Liked
55:08Ever wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 e…
…
continue reading

1
EP57: Enterprise networking, geopolitical impact, and zero trust
24:27
24:27
Play later
Play later
Lists
Like
Liked
24:27In this episode, Misha Kuperman, Chief Reliability Officer at Zscaler joins the podcast to discuss the past and recent developments in enterprise networking, whether the current geopolitical situation has had any impact on the way enterprises think about security, what’s behind the ‘zero trust’ concept and how this works in real life.…
…
continue reading

1
EA607: Kevin Kennon – From Ground Zero to Global Practice: Reimagining Architecture’s Future
53:09
53:09
Play later
Play later
Lists
Like
Liked
53:09From Ground Zero to Global Practice: Reimagining Architecture’s Future Kevin Kennon is an internationally renowned architect with over 40 years of experience, known for his innovative and environmentally conscious designs. He is the founder and principal of Kennon Design Consultancy, a multidisciplinary practice that focuses on architecture, urban …
…
continue reading

1
Security in the DevOps Era: Balancing Speed and Safety
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Ever feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposte…
…
continue reading

1
EA606: Amos Peleg – What a $500M Tech Exit Taught Him About Building a Thriving Architecture Firm
55:05
55:05
Play later
Play later
Lists
Like
Liked
55:05What a $500M Tech Exit Taught Him About Building a Thriving Architecture Firm What does a $500 million tech exit have to do with building a thriving architecture firm? In this episode, Amos Peleg shares his incredible journey—from a young man determined not to follow in his architect father’s footsteps, to building Pelleck Linehouse, a thriving 20-…
…
continue reading

1
Mastering ALFA: Policy Authoring Made Simple - ep.13
43:48
43:48
Play later
Play later
Lists
Like
Liked
43:48David and Emme are joined by Mark Berg, Principal Architect at Axiomatics, for a hands-on episode of Dynamically Speaking! In this special installment, the trio dives into the practical side of policy creation using Abbreviated Language for Authorization (ALFA). Whether you're new to ALFA or looking to sharpen your skills, this episode offers a vis…
…
continue reading
Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated t…
…
continue reading

1
EA605: Elizabeth Wolverton - How the AIA Trust Empowers Small Firms
42:43
42:43
Play later
Play later
Lists
Like
Liked
42:43How the AIA Trust Empowers Small Firms In this episode, Mark speaks with Elizabeth Wolverton, Executive Director of the AIA Trust, about how the Trust is uniquely positioned to support small architecture firms. Elizabeth shares her own journey from growing up in Virginia with a love for historic homes to leading the AIA Trust in Washington, D.C. Sh…
…
continue reading

1
Security Orchestration, Automation, and Response (SOAR): Hype or Necessity?
58:55
58:55
Play later
Play later
Lists
Like
Liked
58:55Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity? In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dy…
…
continue reading

1
EA604: Solo Sessions - What To Do When the Pipeline Dries Up: 5 Steps to Keep the Projects Coming
16:51
16:51
Play later
Play later
Lists
Like
Liked
16:51What To Do When the Pipeline Dries Up: 5 Steps to Keep the Projects Coming When the pipeline dries up and the inbox goes quiet, it can be easy to panic—but this week's Solo Session is here to help you take action instead. In this episode of EntreArchitect Podcast Solo Sessions, Mark R. LePage shares five practical steps to keep the projects coming …
…
continue reading

1
Why Endpoint Security is Your First Line of Defense
47:09
47:09
Play later
Play later
Lists
Like
Liked
47:09Ever wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving…
…
continue reading

1
Why Cloud Identity is Your New Front Line in Cybersecurity
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
…
continue reading

1
EA603: Solo Sessions - Vision Will Break You (If You Let Fear Win)
17:26
17:26
Play later
Play later
Lists
Like
Liked
17:26Vision Will Break You (If You Let Fear Win) In this special solo session of the EntreArchitect Podcast, Mark R. LePage dives into the powerful intersection of vision, growth, and fear. Fear often shadows our boldest dreams, not as a warning sign, but as a companion to growth and transformation. Small firm architects can reframe fear—not as somethin…
…
continue reading

1
Data Privacy vs. Cybersecurity: Where Do They Intersect?
53:45
53:45
Play later
Play later
Lists
Like
Liked
53:45Ever feel numb when you hear about yet another data breach? You're not alone. In this episode of Cyber After Hours—Data Privacy vs. Cybersecurity: Where Do They Intersect?—Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and …
…
continue reading
Scaling Your Firm In this episode, Brad Farris of Anchor Advisors shares his expertise in helping agency and expert firm owners scale their businesses and prepare for a successful exit. He breaks down common misconceptions about selling service firms, the key factors that influence valuation, and the critical steps owners should take to make their …
…
continue reading

1
Cybersecurity Needs a Revolution, Not a Department of No
50:44
50:44
Play later
Play later
Lists
Like
Liked
50:44Ever felt like cybersecurity is always the team that says “no” to everything? Well, it’s time to change that narrative. In this episode of Cyber After Hours—How to Prevent Security From Becoming the "Department of No"—we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises. But quickly,…
…
continue reading

1
EA601: Duo Dickinson - Architecture is Human
1:05:05
1:05:05
Play later
Play later
Lists
Like
Liked
1:05:05Architecture is Human Architecture is more than just buildings—it’s a reflection of humanity itself. In this episode, architect, writer, and educator Duo Dickinson shares his insights on how architecture shapes our values, communities, and experiences. He discusses the delicate balance between honoring history and pushing design forward, emphasizin…
…
continue reading

1
How Quantum Computers Will Change Cybersecurity Forever
50:28
50:28
Play later
Play later
Lists
Like
Liked
50:28What happens when AI meets quantum computing in the heart of your SOC? In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead. From the frozen roofs of Syracuse to palm-sized quantum machines…
…
continue reading

1
The Future of Work: Why the Modern Desktop Experience Changes Everything
10:27
10:27
Play later
Play later
Lists
Like
Liked
10:27Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
…
continue reading

1
EA600: Sherry Harbaugh - A Master Guide Spec for Small Firm Architects
43:20
43:20
Play later
Play later
Lists
Like
Liked
43:20A Master Guide Spec for Small Firm Architects In this episode, Mark sits down with Sherry Harbaugh, a seasoned specification consultant with over 35 years of experience in the architecture and construction industry. Sherry shares her unique journey into the world of specifications and highlights how critical well-crafted specs are to project succes…
…
continue reading

1
Cybersecurity Regulations Are Coming—What You Need To Know
52:03
52:03
Play later
Play later
Lists
Like
Liked
52:03Ever wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation? In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI. It’s about perspective, and how understanding t…
…
continue reading

1
IT Lifecycle Management: The Foundation of Secure Operations
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:1540% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
…
continue reading

1
EA599: Jeff Ross - The Evolution of Web Design for Architects
36:52
36:52
Play later
Play later
Lists
Like
Liked
36:52The Evolution of Web Design for Architects Web design isn’t just about looks—it’s about creating a seamless experience that reflects the care and thought architects put into their projects. In this episode, Jeff Ross, founder of CDH, shares how his background in design and strategy led him to specialize in websites for architects, interior designer…
…
continue reading
Ever wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats? In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients. From demysti…
…
continue reading

1
From Detection to Action: How SOAR Stops Cyberattacks in Minutes
15:40
15:40
Play later
Play later
Lists
Like
Liked
15:40287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
…
continue reading

1
Neo-Security Architecture & Upcoming London Meetup w/ Jacob Ideskog - Ep.12
30:54
30:54
Play later
Play later
Lists
Like
Liked
30:54David and Emme welcome Jacob Ideskog (CTO, Curity) on this special episode of Dynamically Speaking! The gang talks about how Axiomatics and Curity work together, Neo-Security Architecture, and what people can expect at our upcoming joint event on March 26th in London. In this episode: What is Neo-Security Architecture? Why is API security so import…
…
continue reading

1
EA598: Reg Prentice - Gehry, Gensler, and Lessons Leading to TonicDM
1:02:53
1:02:53
Play later
Play later
Lists
Like
Liked
1:02:53Gehry, Gensler, and Lessons Leading to TonicDM Reg Prentice, CEO and founder of TonicDM, shares his journey from architecture school to leading innovation in design technology. With over a decade at Gehry Partners and nine years at Gensler, Reg’s career has centered on bridging architecture and technology — finding ways to make design processes smo…
…
continue reading

1
The Future of Cybersecurity: 2025's Cutting-Edge Technologies
1:06:39
1:06:39
Play later
Play later
Lists
Like
Liked
1:06:39Ever wish strategic planning felt more like a celebration and less like a chore? In this episode, we pop the cork on what makes a planning session truly satisfying, from the thrill of crossing off to-do items to the power of hitting pause for some much-needed self-reflection. Get ready to raise a glass—because by the end of this conversation, you’l…
…
continue reading

1
Why SIEM and Threat Detection Are Foundational for SMB Cybersecurity
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
…
continue reading

1
EA597: Leslie Horn and Breck Crandell - Cargo Architecture
50:17
50:17
Play later
Play later
Lists
Like
Liked
50:17The 4 Steps to Selling Your Expertise as an Architect In this episode of the EntreArchitect podcast, Mark sits down with Leslie Horn and Breck Crandell of Three Squared, Inc. to explore the innovative world of cargo architecture and the growing role of shipping containers in modern design and construction. Leslie and Breck share their unique paths …
…
continue reading

1
Why Cyber Extortion Payments Should Be Illegal
1:10:29
1:10:29
Play later
Play later
Lists
Like
Liked
1:10:29Ever wonder what would happen if paying cyber ransom demands was flat-out illegal? In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that. Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs)…
…
continue reading
Ever wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits. From waxing poetic about handlebar musta…
…
continue reading

1
How MXDR Protects SMBs from Cyber Threats
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:2760% of small businesses close within six months of a cyberattack. Cyber threats are evolving, and small to mid-sized businesses are becoming prime targets. Traditional security solutions—like standalone antivirus and firewalls—leave dangerous gaps that attackers exploit. Businesses need a proactive, unified approach to threat detection and response…
…
continue reading