The Gig-logo

The Gig

Technology Podcasts

UpGuard is the first digital resilience platform that evaluates the ongoing configuration state of every server, application, or network device in your complex corporate infrastructure to provide deep visibility and insight into your configuration state. UpGuard can help you accelerate DevOps initiatives by validating your complete tool-chain and pipeline, discover critical security gaps and vulnerabilities, and foster the necessary insights for deploying, managing, retiring and optimizing IT systems safely and securely. UpGuard is now the only company that provides you with your Cyber Security Threat Assessment Report, or CSTAR, score. The CSTAR score is a single, easy-to-understand value representing an organization's aptitude in monitoring compliance, tracking unwanted change and detecting vulnerabilities in their infrastructure. UpGuard customer’s are already using their CSTAR score to easily understand and remediate their risk for data breaches and unplanned outages as well as obtaining cyber insurance coverage that was never available before. Try UpGuard for free at www.upguard.com

Location:

Mountain View, CA

Description:

UpGuard is the first digital resilience platform that evaluates the ongoing configuration state of every server, application, or network device in your complex corporate infrastructure to provide deep visibility and insight into your configuration state. UpGuard can help you accelerate DevOps initiatives by validating your complete tool-chain and pipeline, discover critical security gaps and vulnerabilities, and foster the necessary insights for deploying, managing, retiring and optimizing IT systems safely and securely. UpGuard is now the only company that provides you with your Cyber Security Threat Assessment Report, or CSTAR, score. The CSTAR score is a single, easy-to-understand value representing an organization's aptitude in monitoring compliance, tracking unwanted change and detecting vulnerabilities in their infrastructure. UpGuard customer’s are already using their CSTAR score to easily understand and remediate their risk for data breaches and unplanned outages as well as obtaining cyber insurance coverage that was never available before. Try UpGuard for free at www.upguard.com

Twitter:

@ScriptRock

Language:

English


Episodes
Ask host to enable sharing for playback control

Episode 016: Natalie Diggins from OpenView Venture Partners

4/14/2016
We had a conversation about DevOps culture, adoption, and best practices with Natalie Diggins, entrepreneur-in-residence at OpenView Venture Partners. Natalie is working with OpenView's portfolio companies to effectively scale their technology and operations through the expansion stage and beyond.

Duration:00:11:09

Ask host to enable sharing for playback control

Episode 015: Troy Hunt and Haveibeenpwned.com

3/16/2016
We spoke to Haveibeenpwned.com's Troy Hunt to learn about the latest cyber threats coming down the line, as well as the current state of information security and issues/concerns around IoT safety.

Duration:00:21:02

Ask host to enable sharing for playback control

Episode 014: Simon Crosby from Bromium

1/15/2016
We spoke to Bromium’s CTO and Co-founder Simon Crosby to learn more about the Cupertino-based startup’s offering and why its model for security using micro-virtualization may result in fewer data breaches and security compromises.

Duration:00:23:01

Ask host to enable sharing for playback control

Episode 013: Holiday Special / 2015 Highlights

12/23/2015
In this special holiday edition of The Gig, we revisit some conversations with guests from our 2015 lineup. Stay tuned for a spectacular roster and more insights around DevOps and IT security in 2016!

Duration:00:12:46

Ask host to enable sharing for playback control

Episode 012: Mike Kavis from Cloud Technology Partners

12/18/2015
Mike Kavis from Cloud Technology Partners joins us for this episode of The Gig. Author of Architecting the Cloud, Kavis is a cloud computing pioneer and led a team to win the Amazon AWS Global Startup Challenge in 2010.

Duration:00:15:34

Ask host to enable sharing for playback control

Episode 011: Alex Polvi from CoreOS

12/7/2015
We had a chat with CoreOS CEO Alex Polvi about their Docker-alternative Rocket, and discussed other offerings from the San Francisco-based startup and issues/concerns around container security.

Duration:00:15:09

Ask host to enable sharing for playback control

Episode 010: James Turnbull from Kickstarter

11/24/2015
We had a conversation about startup culture, tech innovation, and DevOps with James Turnbull, CTO of Kickstarter. James is also the author of 7 books, including Pro Puppet, Pulling Strings with Puppet, and Docker Book, among others.

Duration:00:16:19

Ask host to enable sharing for playback control

Episode 009: Troy Hunt and Have I been pwned?

10/30/2015
For this special Halloween episode of The Gig, we had a conversation with Troy Hunt, the creator of Have I Been Pwned?—a web resource that enables you to search across multiple data breaches to see if your email addresses have been compromised.

Duration:00:27:24

Ask host to enable sharing for playback control

Episode 008: Michael DeHaan and Ansible

10/16/2015
We had a conversation with Michael DeHaan about the origins and motivations behind the creation of Ansible, as well as the future of automation and DevOps tooling.

Duration:00:15:04

Ask host to enable sharing for playback control

Episode 007: Luke Kanies

10/5/2015
We had a conversation with founder and CEO of Puppet Labs Luke Kanies to learn about the origins of Puppet, as well as what's coming down the pipe for the leading IT automation platform.

Duration:00:23:23

Ask host to enable sharing for playback control

Episode 006: IoT with Phil Kearney and Phil Bosua

9/9/2015
By now you've probably seen the mindblowing statistics around IoT—but what are the risks and challenges to creating a world of connected autonomous devices? We ask two experts in this episode of Radio ScriptRock. Phil Bosua and Phil Kearney from Soraa dropped by to chat with us about their company's innovative smart lighting technology, as well as key trends and issues surrounding the IoT space at large.

Duration:00:53:02

Ask host to enable sharing for playback control

Episode 005: DevOps, Compliance and Security with James DeLuccia

8/18/2015
James DeLuccia IV is a published author, practitioner, auditor, inventor, with extensive first hand research and experience on Cloud and global security operating frameworks. His expertise has been instrumental in helping organizations innovate operations, collaboratively develop strategic objectives, and establish winning teams to achieve objectives. James has been a featured speaker at the Association of Certified Fraud Examiner's Annual conference, The Institute of Internal Auditors Risk...

Duration:00:39:10

Ask host to enable sharing for playback control

Episode 004: The Disposable Browser with Scott Petry

7/16/2015
Scott Petry has made a career out of building next-generation security solutions for email and the web. His first company Postini provided email security, archiving, and spam filtering services to 35,000 businesses and 10 million users worldwide before being acquired by Google in 2007. Authentic8—Scott's latest venture—is the maker of Silo, a groundbreaking security solution that has been hailed "the ultimate security solution" by ZDNet. Silo provides an isolated environment for safe web...

Duration:00:29:59

Ask host to enable sharing for playback control

Episode 003: Insecurity Part II with Ira Winkler

6/23/2015
Currently the President of Secure Mentem, Ira Winkler has a storied background in information security. From starting at the NSA to becoming President of the Internet Security Advisors Group and Chief Security Strategist at HP Consulting, Ira has made a career out of assisting organizations in developing better security practices and implementing cost effective programs. Ira is also a bestselling author and regular contributor to ComputerWorld, as well as a frequent RSA speaker. Last year he...

Duration:00:19:05

Ask host to enable sharing for playback control

Episode 001: Patterns with Jim Truher

5/15/2015
Patterns are embedded in the world all around us. Nowhere is this more evident than in technology: from software design patterns, intrusion signatures, and machine learning, patterns are central motif in computer science and IT. For Jim Truher, the ability to recognize patterns was honed in the world of music. A classically trained musician with no formal schooling in computers, he began his career in technology with a head-first dive into Unix world— eventually making his way to Microsoft...

Duration:00:31:56