Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Zero Trust Architecture Podcasts

show episodes
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Host David Brossard discusses the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award ...
  continue reading
 
The TOF® Biosphere is a privacy focused platform. It accommodates real-world, event driven accounting in DLT and location free use of fiat or cryptocurrencies during legally compliant contractual based engagements. Users define and exchange on their own, trusted terms.
  continue reading
 
Artwork
 
OK, everyone knows that #APKnowsIT. Our global team of 500+ geeks, who work globally on five continents, across 30+ countries, are #CreatingExcellence every day. We want to share our excellence with the IT community. We aim to educate, inspire, and motivate IT, professionals, worldwide. Disclaimer: The views expressed in the podcasts are the speaker’s own and do not reflect the view of Authority Partners. ® AP 1998 - 2023
  continue reading
 
Loading …
show series
 
David and Emme are joined by Mark Berg, Principal Architect at Axiomatics, for a recap of his time at FIDO Alliance’s Authenticate - from his ALFA masterclass to a panel discussion on the future of authorization. They also dive into David’s sessions and key takeaways from Identity Day and the Nordic APIs Platform Summit in Stockholm. In this episod…
  continue reading
 
Markus Viitamäki, Senior Infrastructure Architect at Embark Studios is back on the podcast. In this episode, he and Mattias Fridström discuss Markus’ previous engagement in the world’s largest gaming festival DreamHack, when to establish local gaming sites to meet customer needs (and what the requirements are), DDoS attacks in the gaming industry, …
  continue reading
 
David and Emme welcome Mark Fussell (Co-founder of Dapr and the CEO of Diagrid) on this episode of Dynamically Speaking! The group dives into the origin story of Dapr, how it fits into the cloud-native ecosystem, and why it matters for developers building modern, distributed applications. They also touch on Dapr’s relationship with CNCF, open stand…
  continue reading
 
Misha Kuperman, Chief Reliability Officer at Zscaler is back on the podcast. In this episode he and Mattias Fridström discuss if the recent trade tariffs will impact services from Zscaler, whether people in general understand cloud connectivity, if security in the cloud is just a waste of bandwidth resources, what customers know about the public in…
  continue reading
 
Emme and David welcome Roland Baum (Founder, umbrella.associates GmbH) and Gerry Gebel (VP Product & Standards, Strata Identity), live from Identiverse25 in Las Vegas! The gang talks about this year's event and the hot topics and panel sessions, what vendors are saying, and what they are seeing in the market. In this episode: Hot topics at Identive…
  continue reading
 
In this episode, Misha Kuperman, Chief Reliability Officer at Zscaler joins the podcast to discuss the past and recent developments in enterprise networking, whether the current geopolitical situation has had any impact on the way enterprises think about security, what’s behind the ‘zero trust’ concept and how this works in real life.…
  continue reading
 
David and Emme are joined by Mark Berg, Principal Architect at Axiomatics, for a hands-on episode of Dynamically Speaking! In this special installment, the trio dives into the practical side of policy creation using Abbreviated Language for Authorization (ALFA). Whether you're new to ALFA or looking to sharpen your skills, this episode offers a vis…
  continue reading
 
Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
  continue reading
 
Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
  continue reading
 
40% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
  continue reading
 
287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
  continue reading
 
David and Emme welcome Jacob Ideskog (CTO, Curity) on this special episode of Dynamically Speaking! The gang talks about how Axiomatics and Curity work together, Neo-Security Architecture, and what people can expect at our upcoming joint event on March 26th in London. In this episode: What is Neo-Security Architecture? Why is API security so import…
  continue reading
 
Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
  continue reading
 
60% of small businesses close within six months of a cyberattack. Cyber threats are evolving, and small to mid-sized businesses are becoming prime targets. Traditional security solutions—like standalone antivirus and firewalls—leave dangerous gaps that attackers exploit. Businesses need a proactive, unified approach to threat detection and response…
  continue reading
 
David & Emme look ahead to the Gartner IAM summit in London comparing it with the past agenda from the summit in North America. They look into insights around authorization that came out of the summit in Dallas and what they expect to see over in Europe. In this episode, they cover: Authorization insights from the Gartner IAM Summit in North Americ…
  continue reading
 
Ready for SaaS security without the complexity? Managing SaaS security is becoming one of the biggest challenges for IT teams. With employees using apps like Salesforce, Dropbox, and countless others, businesses struggle to keep access secure without adding friction to everyday workflows. Legacy security approaches—like VPNs and standalone logins—f…
  continue reading
 
Are You Ready to Scale Securely? For mid-market businesses, staying secure while growing your IT infrastructure is no easy task. Legacy solutions like VPNs can leave your network vulnerable, while the costs and complexity of piecing together security tools can overwhelm even the best IT teams. What’s the solution? Network as a Service (SASE)—a clou…
  continue reading
 
Eric Löwgren, Head of Network at data center provider GleSYS, is back on the podcast. This time, he and Mattias Fridström discuss physical and cyber security in data centers, optimizing sustainability through measures such as heat recovery (and getting customers to pay a premium for sustainability), increasing the understanding of network architect…
  continue reading
 
Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
  continue reading
 
In this inaugural episode of Perimeter Perspective, we introduce the podcast, its mission, and the value it brings to IT leaders, business owners, and tech enthusiasts. Learn what Perimeter Perspective is all about, the topics we’ll cover, and why cybersecurity and IT innovation are more critical than ever. Whether you're navigating zero trust arch…
  continue reading
 
Eric Löwgren, Head of Network at data center provider GleSYS, joins the podcast for a discussion on what impacts the selection of where to put a data center, the trend of moving things out of the cloud, AI driving power density and connectivity demands, and attracting ‘lead guitar’ talent to the data center industry.…
  continue reading
 
David and Emme take a deep dive into the must attend sessions at Gartner IAM in Grapevine, Texas that relate to authorization. We can’t wait to see you there! In this episode: Look at sessions relating to authorization at Gartner IAM Texas Look ahead to AuthZEN working group’s interops at Gartner IAM London And more! Learn more Authorization Agenda…
  continue reading
 
Robert Maher, CTO of Infinera, joins the podcast to talk about how the optical business has developed during the last 20 years, the strive for constant innovation, openness and disaggregation in the telecoms space, the impact of AI in areas such as self-provisioning, and hyperscalers building their own gear.…
  continue reading
 
Anders Vestergren, Vice President, Head of Solution Area Network Management at Ericsson is back on the podcast. In this episode, the discussion centers around differentiation of mobile networks, component shortages, development and use cases of AI in mobile networks, finding and training talent with the right skill set, the road to 6G and 7G, the f…
  continue reading
 
Anders Vestergren, Vice President, Head of Solution Area Network Management at Ericsson joins the podcast to talk about where we are with the global roll-out of 5G, fixed wireless vs mobile access, edge computing, and the softwareization of mobile networks. A great discussion with high-end use cases from the PGA Tour and Taylor Swift concerts.…
  continue reading
 
Ryan Lafler, CTO of Quantum Corridor is back on the podcast to discuss the gender split in the quantum industry, funding of quantum development, sustainability trends, and why quantum entanglement – which Ryan believes is 3-5 years out – is the holy grail of quantum communications.By MATTIAS FRIDSTRÖM
  continue reading
 
In this episode, Ryan Lafler, CTO of Quantum Corridor joins the podcast to talk about quantum network transmissions, the impact of AI on quantum computing, and real use cases like generative AI, graphics applications, climate modelling, and vaccine development.By MATTIAS FRIDSTRÖM
  continue reading
 
Kelly and David welcomes Gerry Gebel (VP Product & Standards, Strata) and Eve Maler (Founder, Venn Factory), live from Identiverse24 in Las Vegas! The gang talks about this year's event and the hot topics and panel sessions, what vendors are saying, and what the authorization landscape might look like when we're all back next year. Many thanks to M…
  continue reading
 
Kelly & David talk about the past, present, and future of ALFA (Abbreviated Language for Authorization) and how enterprise can approach it in adopting a purpose-built, fine-grained authorization strategy that streamlines policy management that's highly-structured and compliance-driven. In this episode: The ALFA origin story and the developer commun…
  continue reading
 
David Tomalin, Group CTO at CityFibre is back on the podcast to talk about preventing accidental fiber cuts, transparency vs. openness when it comes to network routes, the trend towards multi-network resiliency, sustainability in the networking industry, and more.By MATTIAS FRIDSTRÖM
  continue reading
 
Kelly & David take a deep dive into APIs and how policy-driven authorization can help your enterprise solve many of the challenges in addressing API access and security risks to help developers and auditors mitigate those risks with confidence. In this episode: Spring cleaning your APIs David's insights from the Nordic API Summit The evolving appro…
  continue reading
 
Kelly & David return to chat about topics surrounding authorization maturity and hot topics at the coming industry events in 2024. In this episode: Choosing a flexible authorization framework Externalizing authorization and collaboration for better efficiency for developers and auditors Initiatives in IAM to improve workflows for developers Upcomin…
  continue reading
 
Javad Shabani is Assistant Professor of Physics and Director of the Center of Quantum Information Physics at New York University. He joins the podcast to share his expertise on the quantum development: The next big thing in quantum computing Breakthroughs in quantum communication Sustainability aspects Funding quantum research Quantum computing in …
  continue reading
 
The Zero Trust Data Pillar is a critical component of the Department of Defense's (DoD) Zero Trust Strategy, which aims to enhance cybersecurity and protect sensitive information. The Data Pillar focuses on securing and safeguarding data by implementing a Zero Trust approach. This approach assumes that no user or asset can be trusted by default, an…
  continue reading
 
Javad Shabani is Assistant Professor of Physics and Director of the Center of Quantum Information Physics at New York University. He joins the podcast to share his expertise on the quantum development: How close are we to some really cool stuff in this area – in the lab and in the real world? Quantum computing use cases Infrastructure limitations Q…
  continue reading
 
Explore the dynamic realm of internal audits, revealing the transformative power of automation with MS Power Platform and Power BI. From ISO certifications to the critical role of CAPA systems, our subject matter experts provide a concise, yet comprehensive, look at how Authority Partners elevates audit processes for enhanced efficiency and client …
  continue reading
 
Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3. Scroll to the bottom to click on "Contact" link. 4. Fill in contact information. 5. Click submit! Let us know what kind of content you …
  continue reading
 
Implementing an Organizational Multi-Factor Authentication and Identity Provider Solution with Microsoft Entra ID, Yubico, and KeyFactor Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3…
  continue reading
 
Where Automation Meets Security: Episode 2 Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3. Scroll to the bottom to click on "Contact" link. 4. Fill in contact information. 5. Click su…
  continue reading
 
Kelly and David return for another episode of the Dynamically Speaking podcast to discuss Open Banking and why it matters, including insights into what's in store in 2024. Your hosts Kelly O'Dwyer-Manuel, VP Brand & Communications David Brossard, Chief Technology Officer Connect with us LinkedIn: https://www.linkedin.com/company/axiomatics YouTube:…
  continue reading
 
Marina Otero Verzier is an architect and researcher who in 2022 received Harvard’s Wheelwright Prize for a project on the future of data storage. She aims to publish the first open-source manual for global data center architecture design, featuring examples of ecological, sustainable, and egalitarian data storage models used in data centers across …
  continue reading
 
Marina Otero Verzier is an architect and researcher who in 2022 received Harvard’s Wheelwright Prize for a project on the future of data storage. She aims to publish the first open-source manual for global data center architecture design, featuring examples of ecological, sustainable, and egalitarian data storage models used in data centers across …
  continue reading
 
Join us in our latest podcast episode where we dive deep into the intersection of artificial intelligence, ethics and data security. Our hosts, Carlos Julio Tejada, Engineering Manager, and Dino Buljubasic, Head of Infrastructure, share insights on what inspired this crucial conversation and explore real-life examples of ethical dilemmas and securi…
  continue reading
 
Kelly and David return for another episode of the Dynamically Speaking podcast to discuss the role entitlements plays in authorization and how enterprises can approach them, how the AuthZen working group at OpenID Foundation will focus on everything authorization, and the increased presence of authorization as a topic and solution at industry event…
  continue reading
 
Michael Potter is an entrepreneur, documentary filmmaker, author, and social enterprise investor. In this episode, he and Mattias Fridström discuss: Obstacles to overcome in developing countries and how Geeks without Frontiers, an NGO co-founded by Michael, can support this work. His involvement in Intel’s N50 initiative, striving for digital adopt…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play