Episoder
-
DORA, or the Digital Operational Resiliency Act, is set torevolutionise cybersecurity regulations for financial institutions across europe. With a focus on enhanced security measures and resilience against cyber threats, DORA aims to ensure the stability and integrity of financial systems. As deadlines approach and legislation is finalized, the implications of DORA are poised to reshape the landscape of financial cybersecurity. Monitored by EU financial authorities, compliance isn't optional—it's essential for continued operation in the European market. Withdeadlines looming, the financial sector is bracing for a seismic shift in cybersecurity standards.
-
In the wake of Broadcom's acquisition of VMware, significant changes have rocked the landscape of virtualization and software solutions. With a shift towards subscription-based models and simplified bundles, VMware by Broadcom aims to streamline offerings but faces backlash from smaller customers grappling with price hikes. Meanwhile, industry giants ponder alternatives, raising questions about the future of virtualization and its impact on IT ecosystems.
-
Mangler du episoder?
-
Welcome to the Lets talk data podcast about AIUnpacked, where we unravel the mysteries and marvels of artificial intelligence! In a world where AI is soaring in popularity but often shrouded in misconception, join us as we navigate the twists and turns of this technological landscape. From its overhyped buzz to its unexpected applications, we're here to explore the quirky, the curious, and sometimes the downright bizarre side of AI. Get ready for a wild ride through the realm where human ingenuity meets artificial intelligence!
-
In this episode, our experts break down the distinction between public and private AI. Public AI involves feeding personal data to AI systems hosted by providers, while private AI allows businesses to customise AI models with their own data. Despite the vast amount of data handled by large language models, businesses may not generate enough data for effective training. illustrating how AI tools like Co-pilot can accelerate programming tasks, providing valuable insights into the world of AI utilisation.
-
In this podcast episode we discuss the challenges and expectations for the IT business and other industries in 2024. We explore the productivity gains of remote work but also acknowledge potential challenges, such as the need for intentional communication and periodic team gatherings for enhanced collaboration.
We reflect on the experiences of working remotely. Sharing varied perspectives on the effectiveness of remote collaboration and the need for concentrated, in-person team interactions. Tune in for insights into the evolving landscape of work dynamics in 2024.
Join us as we explore various perspectives on the future of work, from the practicalities of remote collaboration tools to the importance of creating a conducive work environment, and even humorous speculations involving robot baristas. The genie is indeed out of the bottle, and the conversation unfolds with engaging insights and differing opinions on the intricate balance between remote and in-person work.
-
In the discussion, there's skepticism about the practicalityof using VR headsets for everyday tasks like meetings. The conversation takes a humorous turn as they share their experiences with VR technology, including comparisons to Google Glass and discussions about Apple's track record of creating markets.
While acknowledging the potential of augmented reality, theconsensus is that the current iteration of VR headsets might not findmainstream success. The conversation delves into the anti-social aspects of wearing large VR headsets and expresses doubts about the Vision Pro's $3,200price tag.
Join us for a lively discussion on the future of VR andwhether Apple's Vision Pro will be a groundbreaking success or just another flashy tech product.
-
As we navigate through 2024, the emphasis on cyberresiliency becomes paramount. Christian sheds light on the evolving landscape,stressing the importance of the Zero Trust framework. It's not just abouttools; it's a mindset, a holistic approach to security. The conversation delvesinto the changing dynamics, from the cosy confines of internal networks to thesprawling landscape of software as a service.
Christian Mohn, the new member, brings his perspective asChief Technologist, adding a crucial layer to the discussion. The need to breakdown traditional barriers and reimagine security in the age ofinterconnectedness becomes apparent. Zero Trust isn't just a buzzword; it's acall to action.
-
Today, we untangle the enigma of cybersecurity acronyms—MDR, XDR, EDR, and the alphabet soup that perplexes many. For those venturing into the realm of security solutions, the journey begins with the basics: firewalls and more. But the complexity emerges when EDR transforms into an "ex," prompting questions about endpoint detection, managed detection, and the distinctions between them.
As we navigate through conflicting information, the layman's perspective is crucial. Siem, EDR, MDR—they're not mere jargon; they're gatekeepers, safeguarding desktops and back-office infrastructure. The question lingers: XDR or EDR?
A dilemma of cost, effectiveness, and security unfolds, challenging the very fabric of cybersecurity solutions.
-
Today, we uncover a tale that blurs the lines between science fiction and reality. Picture a massive barge in international waters, hosting a computing powerhouse of 10,000 Nvidia A100 GPUs – the Blue Sea Frontier compute cluster, a brainchild of Del Complex. Join us in contemplating the ramifications. Christian and Lisa ponder the unsettling questions: Does this challenge AI regulations globally? What if unregulated entities operate in these waters, leaving regulated nations vulnerable? Brace yourselves for a riveting discussion on the intersection of AI, regulation, and the uncharted waters of innovation.
-
In the dynamic IT landscape, we delve into the often underestimated challenge of change management. Drawing from personal experiences, we observe people's apprehension towards change. This discussion touches on the necessity of ongoing support, training, and communication post-implementation. A significant drop in willingness to change, highlighting the impacts of "change tiredness."
-
In a podcast discussion, we highlight the critical importance of regularly testing backups!
Discussing the delegation of backup responsibilities and the risks of assuming backup security without testing. We explore the complexities of testing backups, with insights into database and email system challenges.
-
In this episode, we'll be delving into some spine-tingling tech stories. While Halloween might have come and gone, the thrill of these tales still lingers. From a frightening ransomware attack on a hospital that disrupted patient treatments to a sinister technology that could alter printed documents, prepare to be spooked by the darker side of the digital world. So grab your favourite discarded Halloween sweets, turn down the lights, and let's embark on this chilling tech journey!
-
Welcome to another eye-opening episode. Today, we're delving into the world of digital privacy and exploring the intricacies of voice-activated assistants, Facebook and Google tracking, and digital phone calls. Are they being monitored? The burning question is, is online data secretly being weaponised against us, or is this just the inevitable cost of using free software? Join us for a riveting discussion on technology, privacy, and the fine line between convenience and surveillance.
Please note that if any personal assistants are activated by this episode, we apologise in advance. We've all heard the rumors that when we're talking or walking around our homes, Alexa, Google, Siri, or WhatsApp might be listening. We aim to get to the bottom of whether this is true. Are we being listened to all the time, and are they using that information to target ads or products? Let's dive into this topic and uncover the facts!
-
In this episode, we dive deep into the world of passwords and explore the fascinating evolution of authentication. Join our expert, Christian, as he takes us on a journey through the history of passwords and their role in digital security. Discover the reasons behind the existence of passwords, the challenges of managing multiple accounts, and the birth of password managers. Explore the concept of multi-factor authentication, its importance in today's digital landscape, and the promising shift towards a passwordless future. Plus, gain insights into the security implications of quantum computing and practical recommendations for enhancing your organization's security posture. Don't miss this enlightening discussion on the future of authentication in a rapidly evolving digital world.
-
The Let's Talk Data podcast episode you're about to dive into explores the art of making effective requests in the world of IT. This episode delves into the five essential keys for mastering the art of the request.In a world increasingly reliant on email and non-verbal communication tools, knowing how to make a request efficiently has become more crucial than ever. The hosts discuss the challenges they face in this context, such as the loss of side information due to remote work and the shift towards team-based interactions rather than manager-heavy ones.This insightful discussion equips IT professionals with valuable strategies for effective communication and collaboration in their field. Tune in to Let's Talk Data and master the art of the request for a more productive work environment.
-
In this episode of "Let's Talk Data," the hosts delve into the pervasive issue of data bias and its profound implications for our daily lives and artificial intelligence. They explore various facets of bias, including confirmation bias, historical bias, and selection bias. One example highlights how historical data can lead to gender-based biases in medical diagnosis, such as the symptoms of heart attacks. They discuss how predictive policing algorithms can amplify bias, leading to problematic outcomes. The hosts emphasize the importance of maintaining a broad and unbiased database and being critically aware of inherent biases. They also encourage seeking diverse perspectives to counteract personal biases.
-
In this episode, we delve into the evolving landscape of social engineering in cybersecurity. Following the recent passing of Kevin Mitnick, a renowned figure in the world of hacking and cybersecurity, we explore how social engineering, a term popularized by Mitnick in 1995, has changed and continues to impact us today.Join us discuss how social engineering techniques have shifted from in-person interactions to sophisticated email phishing, man-in-the-middle attacks, and more. Discover the critical role human awareness plays in defending against these threats and how artificial intelligence may reshape the future of social engineering attacks.Don't miss this insightful discussion on the changing face of cybersecurity and the importance of staying vigilant in the digital age. Subscribe to Let's Talk Data for more engaging conversations on IT and data-related topics.
-
In this episode, we delve into Google's recent choice to restrict internet access for its employees and explore whether this move is beneficial. Our hosts, Tony Gent, Lisa-Marie Ihnen, and Christian Lehrer, dissect this decision and its implications for cybersecurity. They discuss the pros and cons of limiting internet access, especially for critical employees, and the potential benefits of removing administrative permissions on devices. The conversation touches on multi-factor authentication, the balance between security and usability, and the importance of well-designed processes. The trio addresses the challenges of maintaining security in a distributed work environment and underscores the need for tailored security measures based on users' roles. Tune in to gain insights into the evolving landscape of data security and IT practices. Don't forget to subscribe for more engaging discussions on Let's Talk Data, presented by Proact and NetApp.
-
What are the possible causes of gender imbalance in the tech industry? What can be done about it? And how we can all contribute to creating a more inclusive environment for everyone working in IT? Tune into our latest episode where we discuss these topics and more with Agnes Billgren, treasurer at Pink Programming and Business developer at Extrapreneur and Lotta Arnshav, Vice President of Service Operations at Proact.
-
Ransomware is on the rise, and it often targets backup solutions as part of an attack. We're hearing more and more about immutability — could it be the ultimate answer to protecting backups? Join us for a special edition of Let's Talk Data where we discuss backup methods that help keep your organisation’s data safe in the event of an attack.
- Se mer