show episodes
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork
 
Architect Mark R. LePage explores the business of architecture, firm leadership and the everyday life of an architect. From Gābl Media, EntreArchitect Podcast features weekly interviews with inspiring, passionate people who share their knowledge and expertise... all to help you build a better business as a small firm entrepreneur architect. Proven business strategies for architects, including financial management, profit, marketing, sales, productivity, and planning.
  continue reading
 
Host David Brossard discusses the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award ...
  continue reading
 
Your source for wide-ranging discussions from all around the Go community. Panelists include Mat Ryer, Jon Calhoun, Natalie Pistunovich, Johnny Boursiquot, Angelica Hill, Kris Brandow, and Ian Lopshire. We discuss cloud infrastructure, distributed systems, microservices, Kubernetes, Docker... oh and also Go! Some people search for GoTime or GoTimeFM and can't find the show, so now the strings GoTime and GoTimeFM are in our description too.
  continue reading
 
Artwork
 
The TOF® Biosphere is a privacy focused platform. It accommodates real-world, event driven accounting in DLT and location free use of fiat or cryptocurrencies during legally compliant contractual based engagements. Users define and exchange on their own, trusted terms.
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
  continue reading
 
Artwork

1
Authority Partners Podcast

Authority Partners

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
OK, everyone knows that #APKnowsIT. Our global team of 500+ geeks, who work globally on five continents, across 30+ countries, are #CreatingExcellence every day. We want to share our excellence with the IT community. We aim to educate, inspire, and motivate IT, professionals, worldwide. Disclaimer: The views expressed in the podcasts are the speaker’s own and do not reflect the view of Authority Partners. ® AP 1998 - 2023
  continue reading
 
Loading …
show series
 
Ever wonder if Zero Trust is the next big buzzword or if it actually holds the key to modern cybersecurity? In Episode 27 of Cyber After Hours—titled “Zero Trust: Buzzword or Best Practice?”—co-hosts Evan Morgan and Paul Marco kick things off with a friendly Star Wars vs. Star Trek debate before diving into the serious question of what it really ta…
  continue reading
 
The Death of Apprenticeship: Architecture’s Urgent Culture Shift In this episode of the EntreArchitect Podcast, Carina Mills, Senior Talent Director at RDC and President of AIA California, dives into the urgent culture shift reshaping architecture. She shares her personal journey from technical architect to leadership, emphasizing the fading model …
  continue reading
 
Will McGugan, the CEO and founder of Textualize, speaks with host Gregory M. Kapfhammer about how to use packages such as Rich and Textual to build text-based user interfaces (TUIs) and command-line interfaces (CLIs) in Python. Along with discussing the design idioms that enable developers to create TUIs in Python, they consider practical strategie…
  continue reading
 
Ever wonder if universities are really prepping cybersecurity students for the real world—or just handing out degrees that look nice framed on a wall? In this lively episode of Cyber After Hours—Developing Cybersecurity Talent: Is Academia Keeping Up?—Evan and Paul (who, humorously, admits he has a chronic name-forgetting phobia) dive headfirst int…
  continue reading
 
From Ground Zero to Global Practice: Reimagining Architecture’s Future In this episode, Fallon Scott, founder of F28&Co, shares how small firms can scale without sacrificing their sanity. Drawing from her background in accounting, auditing, and corporate operations, Fallon explains how implementing enterprise-level systems—like SOPs and financial f…
  continue reading
 
Steve Summers speaks with SE Radio host Sam Taggart about securing test and measurement equipment. They start by differentiating between IT and OT (Operational Technology) and then discuss the threat model and how security has evolved in the OT space, including a look some of the key drivers. They then examine security challenges associated with a …
  continue reading
 
Ever wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 e…
  continue reading
 
In this episode, Misha Kuperman, Chief Reliability Officer at Zscaler joins the podcast to discuss the past and recent developments in enterprise networking, whether the current geopolitical situation has had any impact on the way enterprises think about security, what’s behind the ‘zero trust’ concept and how this works in real life.…
  continue reading
 
From Ground Zero to Global Practice: Reimagining Architecture’s Future Kevin Kennon is an internationally renowned architect with over 40 years of experience, known for his innovative and environmentally conscious designs. He is the founder and principal of Kennon Design Consultancy, a multidisciplinary practice that focuses on architecture, urban …
  continue reading
 
Ashley Peacock, the author of Serverless Apps on Cloudflare, speaks with host Jeremy Jung about content delivery networks (CDNs). Along the way, they examine dependency injection with bindings, local development, serverless, cold starts, the V8 runtime, AWS Lambda vs Cloudflare workers, WebAssembly limitations, and core services such as R2, D1, KV,…
  continue reading
 
Ever feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposte…
  continue reading
 
What a $500M Tech Exit Taught Him About Building a Thriving Architecture Firm What does a $500 million tech exit have to do with building a thriving architecture firm? In this episode, Amos Peleg shares his incredible journey—from a young man determined not to follow in his architect father’s footsteps, to building Pelleck Linehouse, a thriving 20-…
  continue reading
 
David and Emme are joined by Mark Berg, Principal Architect at Axiomatics, for a hands-on episode of Dynamically Speaking! In this special installment, the trio dives into the practical side of policy creation using Abbreviated Language for Authorization (ALFA). Whether you're new to ALFA or looking to sharpen your skills, this episode offers a vis…
  continue reading
 
Eran Yahav, Professor of Computer Science at Technion, Israel, and CTO of Tabnine, speaks with host Gregory M. Kapfhammer about the Tabnine AI coding assistant. They discuss how the design and implementation allows software engineers to use code completion and perform tasks such as automated code review while still maintaining developer privacy. Er…
  continue reading
 
Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated t…
  continue reading
 
How the AIA Trust Empowers Small Firms In this episode, Mark speaks with Elizabeth Wolverton, Executive Director of the AIA Trust, about how the Trust is uniquely positioned to support small architecture firms. Elizabeth shares her own journey from growing up in Virginia with a love for historic homes to leading the AIA Trust in Washington, D.C. Sh…
  continue reading
 
Malcolm Matalka, founder of Terrateam, joins host Giovanni Asproni to talk about the reasoning behind choosing a not-so-widespread language (OCaml) and (almost) totally avoiding frameworks for the development of Terrateam. While discussing the reasons for choosing this specific programming language and the advantages and disadvantages of using exte…
  continue reading
 
Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity? In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dy…
  continue reading
 
What To Do When the Pipeline Dries Up: 5 Steps to Keep the Projects Coming When the pipeline dries up and the inbox goes quiet, it can be easy to panic—but this week's Solo Session is here to help you take action instead. In this episode of EntreArchitect Podcast Solo Sessions, Mark R. LePage shares five practical steps to keep the projects coming …
  continue reading
 
Emre Baran, CEO and co-founder of Cerbos, and Alex Olivier, CPO and co-founder, join SE Radio host Priyanka Raghavan to explore “stateless decoupled authorization frameworks. The discussion begins with an introduction to key terms, including authorization, authorization models, and decoupled frameworks. They dive into the challenges of building dec…
  continue reading
 
Ever wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving…
  continue reading
 
Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
  continue reading
 
Vision Will Break You (If You Let Fear Win) In this special solo session of the EntreArchitect Podcast, Mark R. LePage dives into the powerful intersection of vision, growth, and fear. Fear often shadows our boldest dreams, not as a warning sign, but as a companion to growth and transformation. Small firm architects can reframe fear—not as somethin…
  continue reading
 
Tyler Flint, CEO of qpoint.io, joins host Robert Blumen for a conversation about managing external vendor dependencies, including several best practices for adoption. They start with a look at internal versus external services, including details such as the footprint of external services within a micro-services application, and difficulties organiz…
  continue reading
 
Ever feel numb when you hear about yet another data breach? You're not alone. In this episode of Cyber After Hours—Data Privacy vs. Cybersecurity: Where Do They Intersect?—Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and …
  continue reading
 
Scaling Your Firm In this episode, Brad Farris of Anchor Advisors shares his expertise in helping agency and expert firm owners scale their businesses and prepare for a successful exit. He breaks down common misconceptions about selling service firms, the key factors that influence valuation, and the critical steps owners should take to make their …
  continue reading
 
Software architect and author Vlad Khononov joins host Jeff Doolittle for a discussion on balancing coupling in software design. They start by examining coupling and its relationship to complexity and modularity. Vlad explains the historical models for assessing coupling and introduces his updated approach, integration strength, which aims to simpl…
  continue reading
 
Ever felt like cybersecurity is always the team that says “no” to everything? Well, it’s time to change that narrative. In this episode of Cyber After Hours—How to Prevent Security From Becoming the "Department of No"—we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises. But quickly,…
  continue reading
 
Architecture is Human Architecture is more than just buildings—it’s a reflection of humanity itself. In this episode, architect, writer, and educator Duo Dickinson shares his insights on how architecture shapes our values, communities, and experiences. He discusses the delicate balance between honoring history and pushing design forward, emphasizin…
  continue reading
 
What happens when AI meets quantum computing in the heart of your SOC? In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead. From the frozen roofs of Syracuse to palm-sized quantum machines…
  continue reading
 
Sunil Mallya, co-founder and CTO of Flip AI, discusses small language models with host Brijesh Ammanath. They begin by considering the technical distinctions between SLMs and large language models. LLMs excel in generating complex outputs across various natural language processing tasks, leveraging extensive training datasets on with massive GPU cl…
  continue reading
 
Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
  continue reading
 
A Master Guide Spec for Small Firm Architects In this episode, Mark sits down with Sherry Harbaugh, a seasoned specification consultant with over 35 years of experience in the architecture and construction industry. Sherry shares her unique journey into the world of specifications and highlights how critical well-crafted specs are to project succes…
  continue reading
 
Ever wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation? In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI. It’s about perspective, and how understanding t…
  continue reading
 
Pete Warden, CEO of Useful Sensors and a founding member of the TensorFlow team at Google, discusses TinyML, the technology enabling machine learning on low-power, small-footprint devices. This innovation opens up applications such as voice-controlled devices, offline translation tools, and smarter embedded systems, which are crucial for privacy an…
  continue reading
 
40% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
  continue reading
 
The Evolution of Web Design for Architects Web design isn’t just about looks—it’s about creating a seamless experience that reflects the care and thought architects put into their projects. In this episode, Jeff Ross, founder of CDH, shares how his background in design and strategy led him to specialize in websites for architects, interior designer…
  continue reading
 
Brenden Matthews, a seasoned software engineer, entrepreneur, and author of the Idiomatic Rust and Code Like a Pro in Rust books (both from Manning), speaks with SE Radio host Gavin Henry about Idiomatic Rust. They start with a look at what "idiomatic" means, and then discuss Generics, Traits, common design patterns you'll see in well written Rust …
  continue reading
 
Ever wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats? In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients. From demysti…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play