Where Automation Meets Security
…
continue reading
Zero Trust Architecture Podcasts
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Host David Brossard discusses the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award ...
…
continue reading
The TOF® Biosphere is a privacy focused platform. It accommodates real-world, event driven accounting in DLT and location free use of fiat or cryptocurrencies during legally compliant contractual based engagements. Users define and exchange on their own, trusted terms.
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
OK, everyone knows that #APKnowsIT. Our global team of 500+ geeks, who work globally on five continents, across 30+ countries, are #CreatingExcellence every day. We want to share our excellence with the IT community. We aim to educate, inspire, and motivate IT, professionals, worldwide. Disclaimer: The views expressed in the podcasts are the speaker’s own and do not reflect the view of Authority Partners. ® AP 1998 - 2023
…
continue reading
1
The Great Identity Tour: Lessons from FIDO and Nordic APIs - Ep.16
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06David and Emme are joined by Mark Berg, Principal Architect at Axiomatics, for a recap of his time at FIDO Alliance’s Authenticate - from his ALFA masterclass to a panel discussion on the future of authorization. They also dive into David’s sessions and key takeaways from Identity Day and the Nordic APIs Platform Summit in Stockholm. In this episod…
…
continue reading
1
EP60: Connectivity in the gaming industry: DreamHack, local sites, and future of gaming
27:11
27:11
Play later
Play later
Lists
Like
Liked
27:11Markus Viitamäki, Senior Infrastructure Architect at Embark Studios is back on the podcast. In this episode, he and Mattias Fridström discuss Markus’ previous engagement in the world’s largest gaming festival DreamHack, when to establish local gaming sites to meet customer needs (and what the requirements are), DDoS attacks in the gaming industry, …
…
continue reading
1
EP59: Connectivity in the gaming industry: trends, drivers, latency & bandwidth
16:33
16:33
Play later
Play later
Lists
Like
Liked
16:33In this episode, Markus Viitamäki, Senior Infrastructure Architect at Embark Studios joins the podcast to discuss trends in the gaming industry, main drivers to creating a new game, and how much latency and bandwidth are affecting the gaming experience.By MATTIAS FRIDSTRÖM
…
continue reading
1
Where Dapr Meets Identity: Building Secure, Scalable Systems w/ Mark Fussell - Ep.15
47:23
47:23
Play later
Play later
Lists
Like
Liked
47:23David and Emme welcome Mark Fussell (Co-founder of Dapr and the CEO of Diagrid) on this episode of Dynamically Speaking! The group dives into the origin story of Dapr, how it fits into the cloud-native ecosystem, and why it matters for developers building modern, distributed applications. They also touch on Dapr’s relationship with CNCF, open stand…
…
continue reading
1
EP58: Cloud connectivity, public internet, security standards, and enterprise networking trends
20:11
20:11
Play later
Play later
Lists
Like
Liked
20:11Misha Kuperman, Chief Reliability Officer at Zscaler is back on the podcast. In this episode he and Mattias Fridström discuss if the recent trade tariffs will impact services from Zscaler, whether people in general understand cloud connectivity, if security in the cloud is just a waste of bandwidth resources, what customers know about the public in…
…
continue reading
1
Access Granted: Live from Identiverse w/ Roland Baum & Gerry Gebel - Ep.14
55:56
55:56
Play later
Play later
Lists
Like
Liked
55:56Emme and David welcome Roland Baum (Founder, umbrella.associates GmbH) and Gerry Gebel (VP Product & Standards, Strata Identity), live from Identiverse25 in Las Vegas! The gang talks about this year's event and the hot topics and panel sessions, what vendors are saying, and what they are seeing in the market. In this episode: Hot topics at Identive…
…
continue reading
1
EP57: Enterprise networking, geopolitical impact, and zero trust
24:27
24:27
Play later
Play later
Lists
Like
Liked
24:27In this episode, Misha Kuperman, Chief Reliability Officer at Zscaler joins the podcast to discuss the past and recent developments in enterprise networking, whether the current geopolitical situation has had any impact on the way enterprises think about security, what’s behind the ‘zero trust’ concept and how this works in real life.…
…
continue reading
1
Mastering ALFA: Policy Authoring Made Simple - Ep.13
43:48
43:48
Play later
Play later
Lists
Like
Liked
43:48David and Emme are joined by Mark Berg, Principal Architect at Axiomatics, for a hands-on episode of Dynamically Speaking! In this special installment, the trio dives into the practical side of policy creation using Abbreviated Language for Authorization (ALFA). Whether you're new to ALFA or looking to sharpen your skills, this episode offers a vis…
…
continue reading
1
Why Cloud Identity is Your New Front Line in Cybersecurity
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
…
continue reading
1
The Future of Work: Why the Modern Desktop Experience Changes Everything
10:27
10:27
Play later
Play later
Lists
Like
Liked
10:27Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
…
continue reading
1
IT Lifecycle Management: The Foundation of Secure Operations
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:1540% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
…
continue reading
1
From Detection to Action: How SOAR Stops Cyberattacks in Minutes
15:40
15:40
Play later
Play later
Lists
Like
Liked
15:40287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
…
continue reading
1
Neo-Security Architecture & Upcoming London Meetup w/ Jacob Ideskog - Ep.12
30:54
30:54
Play later
Play later
Lists
Like
Liked
30:54David and Emme welcome Jacob Ideskog (CTO, Curity) on this special episode of Dynamically Speaking! The gang talks about how Axiomatics and Curity work together, Neo-Security Architecture, and what people can expect at our upcoming joint event on March 26th in London. In this episode: What is Neo-Security Architecture? Why is API security so import…
…
continue reading
1
Why SIEM and Threat Detection Are Foundational for SMB Cybersecurity
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
…
continue reading
1
How MXDR Protects SMBs from Cyber Threats
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:2760% of small businesses close within six months of a cyberattack. Cyber threats are evolving, and small to mid-sized businesses are becoming prime targets. Traditional security solutions—like standalone antivirus and firewalls—leave dangerous gaps that attackers exploit. Businesses need a proactive, unified approach to threat detection and response…
…
continue reading
1
Lessons from Gartner IAM NA & What’s Ahead in London - Ep.11
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00David & Emme look ahead to the Gartner IAM summit in London comparing it with the past agenda from the summit in North America. They look into insights around authorization that came out of the summit in Dallas and what they expect to see over in Europe. In this episode, they cover: Authorization insights from the Gartner IAM Summit in North Americ…
…
continue reading
1
Zero Trust SaaS Security: Protecting Your Apps, Identities, and Devices
11:09
11:09
Play later
Play later
Lists
Like
Liked
11:09Ready for SaaS security without the complexity? Managing SaaS security is becoming one of the biggest challenges for IT teams. With employees using apps like Salesforce, Dropbox, and countless others, businesses struggle to keep access secure without adding friction to everyday workflows. Legacy security approaches—like VPNs and standalone logins—f…
…
continue reading
1
How Network as a Service (SASE) Empowers Mid-Market IT Leaders
9:20
9:20
Play later
Play later
Lists
Like
Liked
9:20Are You Ready to Scale Securely? For mid-market businesses, staying secure while growing your IT infrastructure is no easy task. Legacy solutions like VPNs can leave your network vulnerable, while the costs and complexity of piecing together security tools can overwhelm even the best IT teams. What’s the solution? Network as a Service (SASE)—a clou…
…
continue reading
1
EP56: Data center security, heat recovery, understanding network architecture
17:40
17:40
Play later
Play later
Lists
Like
Liked
17:40Eric Löwgren, Head of Network at data center provider GleSYS, is back on the podcast. This time, he and Mattias Fridström discuss physical and cyber security in data centers, optimizing sustainability through measures such as heat recovery (and getting customers to pay a premium for sustainability), increasing the understanding of network architect…
…
continue reading
1
How to Prepare Your Business for the End of Windows 10
10:24
10:24
Play later
Play later
Lists
Like
Liked
10:24Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
…
continue reading
1
Welcome to Perimeter Perspective: Expanding the Boundaries of Cybersecurity and IT
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52In this inaugural episode of Perimeter Perspective, we introduce the podcast, its mission, and the value it brings to IT leaders, business owners, and tech enthusiasts. Learn what Perimeter Perspective is all about, the topics we’ll cover, and why cybersecurity and IT innovation are more critical than ever. Whether you're navigating zero trust arch…
…
continue reading
1
EP55: Choosing location for data centers, moving out of the cloud, AI affecting connectivity demands
21:27
21:27
Play later
Play later
Lists
Like
Liked
21:27Eric Löwgren, Head of Network at data center provider GleSYS, joins the podcast for a discussion on what impacts the selection of where to put a data center, the trend of moving things out of the cloud, AI driving power density and connectivity demands, and attracting ‘lead guitar’ talent to the data center industry.…
…
continue reading
1
Breaking Down the Gartner IAM Summit Agenda - Ep.10
23:31
23:31
Play later
Play later
Lists
Like
Liked
23:31David and Emme take a deep dive into the must attend sessions at Gartner IAM in Grapevine, Texas that relate to authorization. We can’t wait to see you there! In this episode: Look at sessions relating to authorization at Gartner IAM Texas Look ahead to AuthZEN working group’s interops at Gartner IAM London And more! Learn more Authorization Agenda…
…
continue reading
1
EPEP54: Quantum physics in optical networks, hollow-core fiber, and optimizing power consumption
21:24
21:24
Play later
Play later
Lists
Like
Liked
21:24Robert Maher, CTO of Infinera, is back on the podcast. This time, he and Mattias Fridström discuss quantum physics in optical networks, the development of hollow-core fiber, optimizing power consumption in the AI data center era, and more.By MATTIAS FRIDSTRÖM
…
continue reading
1
EP53: Optical networking, impact of AI, and hyperscalers building their own gear
23:06
23:06
Play later
Play later
Lists
Like
Liked
23:06Robert Maher, CTO of Infinera, joins the podcast to talk about how the optical business has developed during the last 20 years, the strive for constant innovation, openness and disaggregation in the telecoms space, the impact of AI in areas such as self-provisioning, and hyperscalers building their own gear.…
…
continue reading
1
EP52: AI in mobile networks, road to 6G & 7G, and security
25:01
25:01
Play later
Play later
Lists
Like
Liked
25:01Anders Vestergren, Vice President, Head of Solution Area Network Management at Ericsson is back on the podcast. In this episode, the discussion centers around differentiation of mobile networks, component shortages, development and use cases of AI in mobile networks, finding and training talent with the right skill set, the road to 6G and 7G, the f…
…
continue reading
1
EP51: Global 5G roll-out, edge computing, and network softwareization
25:31
25:31
Play later
Play later
Lists
Like
Liked
25:31Anders Vestergren, Vice President, Head of Solution Area Network Management at Ericsson joins the podcast to talk about where we are with the global roll-out of 5G, fixed wireless vs mobile access, edge computing, and the softwareization of mobile networks. A great discussion with high-end use cases from the PGA Tour and Taylor Swift concerts.…
…
continue reading
1
EP50: Quantum connectivity: attracting people and funds, sustainability trends, and the holy grail of quantum communications
18:10
18:10
Play later
Play later
Lists
Like
Liked
18:10Ryan Lafler, CTO of Quantum Corridor is back on the podcast to discuss the gender split in the quantum industry, funding of quantum development, sustainability trends, and why quantum entanglement – which Ryan believes is 3-5 years out – is the holy grail of quantum communications.By MATTIAS FRIDSTRÖM
…
continue reading
1
EP49: Quantum connectivity: successful transmissions, impact of AI, and real use cases
23:31
23:31
Play later
Play later
Lists
Like
Liked
23:31In this episode, Ryan Lafler, CTO of Quantum Corridor joins the podcast to talk about quantum network transmissions, the impact of AI on quantum computing, and real use cases like generative AI, graphics applications, climate modelling, and vaccine development.By MATTIAS FRIDSTRÖM
…
continue reading
1
Live from Identiverse w/ Gerry Gebel & Eve Maler - Ep.9
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10Kelly and David welcomes Gerry Gebel (VP Product & Standards, Strata) and Eve Maler (Founder, Venn Factory), live from Identiverse24 in Las Vegas! The gang talks about this year's event and the hot topics and panel sessions, what vendors are saying, and what the authorization landscape might look like when we're all back next year. Many thanks to M…
…
continue reading
1
All things ALFA: Talking Authz Policy and AuthZEN - Ep.8
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27Kelly & David talk about the past, present, and future of ALFA (Abbreviated Language for Authorization) and how enterprise can approach it in adopting a purpose-built, fine-grained authorization strategy that streamlines policy management that's highly-structured and compliance-driven. In this episode: The ALFA origin story and the developer commun…
…
continue reading
1
EP48: Preventing fiber cuts, transparency of network routes, multi-network resiliency
23:55
23:55
Play later
Play later
Lists
Like
Liked
23:55David Tomalin, Group CTO at CityFibre is back on the podcast to talk about preventing accidental fiber cuts, transparency vs. openness when it comes to network routes, the trend towards multi-network resiliency, sustainability in the networking industry, and more.By MATTIAS FRIDSTRÖM
…
continue reading
1
Authorization & APIs: Everything you need to know - Ep.7
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12Kelly & David take a deep dive into APIs and how policy-driven authorization can help your enterprise solve many of the challenges in addressing API access and security risks to help developers and auditors mitigate those risks with confidence. In this episode: Spring cleaning your APIs David's insights from the Nordic API Summit The evolving appro…
…
continue reading
1
Episode 5:Network Pillar Micro-Segmentation 3-Tier Architecture
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09Building a Micro-segmented 3-Tier Architecture in Azure Government with STRUCTURA.IO: Infrastructure as Code and Zero Trust Network Pillar PrinciplesBy VILLA-TECH
…
continue reading
1
EP47: Building an intelligent fiber network
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48In this episode, David Tomalin, Group CTO at CityFibre joins the podcast to discuss what sorts of fiber are used for broadband services, how to choose the best locations and routes when expanding a network, and the need for more intelligent data in the business.By MATTIAS FRIDSTRÖM
…
continue reading
1
Externalizing authorization, API access, and AuthZen adoption - Ep.6
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17Kelly & David return to chat about topics surrounding authorization maturity and hot topics at the coming industry events in 2024. In this episode: Choosing a flexible authorization framework Externalizing authorization and collaboration for better efficiency for developers and auditors Initiatives in IAM to improve workflows for developers Upcomin…
…
continue reading
1
EP46: The next big thing in quantum computing
21:12
21:12
Play later
Play later
Lists
Like
Liked
21:12Javad Shabani is Assistant Professor of Physics and Director of the Center of Quantum Information Physics at New York University. He joins the podcast to share his expertise on the quantum development: The next big thing in quantum computing Breakthroughs in quantum communication Sustainability aspects Funding quantum research Quantum computing in …
…
continue reading
1
Zero Trust Bytes Podcast EP4: Data Pillar with MSFT Purview for Data Lifecycle Management and DLP
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50The Zero Trust Data Pillar is a critical component of the Department of Defense's (DoD) Zero Trust Strategy, which aims to enhance cybersecurity and protect sensitive information. The Data Pillar focuses on securing and safeguarding data by implementing a Zero Trust approach. This approach assumes that no user or asset can be trusted by default, an…
…
continue reading
1
EP45: Quantum computing breakthroughs – in the lab and in real-life
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03Javad Shabani is Assistant Professor of Physics and Director of the Center of Quantum Information Physics at New York University. He joins the podcast to share his expertise on the quantum development: How close are we to some really cool stuff in this area – in the lab and in the real world? Quantum computing use cases Infrastructure limitations Q…
…
continue reading
1
Ensuring quality, compliance and client satisfaction using automation in audits
20:27
20:27
Play later
Play later
Lists
Like
Liked
20:27Explore the dynamic realm of internal audits, revealing the transformative power of automation with MS Power Platform and Power BI. From ISO certifications to the critical role of CAPA systems, our subject matter experts provide a concise, yet comprehensive, look at how Authority Partners elevates audit processes for enhanced efficiency and client …
…
continue reading
1
Zero Trust Bytes: Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3. Scroll to the bottom to click on "Contact" link. 4. Fill in contact information. 5. Click submit! Let us know what kind of content you …
…
continue reading
1
Zero Trust Bytes Podcast Episode 3: Implementing an Org MFA, Identity Provider Solution
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44Implementing an Organizational Multi-Factor Authentication and Identity Provider Solution with Microsoft Entra ID, Yubico, and KeyFactor Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3…
…
continue reading
1
Zero Trust Bytes: Ep.2: Software Defined Perimeter with Appgate
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Where Automation Meets Security: Episode 2 Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3. Scroll to the bottom to click on "Contact" link. 4. Fill in contact information. 5. Click su…
…
continue reading
1
Open Banking in 2024...and why you should care - Ep.5
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29Kelly and David return for another episode of the Dynamically Speaking podcast to discuss Open Banking and why it matters, including insights into what's in store in 2024. Your hosts Kelly O'Dwyer-Manuel, VP Brand & Communications David Brossard, Chief Technology Officer Connect with us LinkedIn: https://www.linkedin.com/company/axiomatics YouTube:…
…
continue reading
1
EP44: Sustainable data center architecture – part II
25:02
25:02
Play later
Play later
Lists
Like
Liked
25:02Marina Otero Verzier is an architect and researcher who in 2022 received Harvard’s Wheelwright Prize for a project on the future of data storage. She aims to publish the first open-source manual for global data center architecture design, featuring examples of ecological, sustainable, and egalitarian data storage models used in data centers across …
…
continue reading
By VILLA-TECH
…
continue reading
1
EP43: Sustainable data center architecture – part I
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20Marina Otero Verzier is an architect and researcher who in 2022 received Harvard’s Wheelwright Prize for a project on the future of data storage. She aims to publish the first open-source manual for global data center architecture design, featuring examples of ecological, sustainable, and egalitarian data storage models used in data centers across …
…
continue reading
1
Trust the Machine: A Dialogue on AI Ethics and Data Security
24:07
24:07
Play later
Play later
Lists
Like
Liked
24:07Join us in our latest podcast episode where we dive deep into the intersection of artificial intelligence, ethics and data security. Our hosts, Carlos Julio Tejada, Engineering Manager, and Dino Buljubasic, Head of Infrastructure, share insights on what inspired this crucial conversation and explore real-life examples of ethical dilemmas and securi…
…
continue reading
1
Entitlements, AuthZen, & authorization focus at industry events - Ep.4
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25Kelly and David return for another episode of the Dynamically Speaking podcast to discuss the role entitlements plays in authorization and how enterprises can approach them, how the AuthZen working group at OpenID Foundation will focus on everything authorization, and the increased presence of authorization as a topic and solution at industry event…
…
continue reading
1
EP42: Global digital adoption, exponential technology’s impact on policymaking
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27Michael Potter is an entrepreneur, documentary filmmaker, author, and social enterprise investor. In this episode, he and Mattias Fridström discuss: Obstacles to overcome in developing countries and how Geeks without Frontiers, an NGO co-founded by Michael, can support this work. His involvement in Intel’s N50 initiative, striving for digital adopt…
…
continue reading