Productivity Protected by PKWARE
The world’s accomplishments depend on data security. Join PKWARE CEO Spencer Kupferman every month as he chats with data security experts on eliminating security gaps, taking control of sensitive data, and meeting the most stringent data compliance requirements. Tune in to find out how industry leaders are eliminating data security gaps and achieving compliance goals.
Episodes
22 episodes
Exploring Data Security: Classification, AI, and Compliance
Join PKWARE's CEO, Spencer Kupferman, and Eden Priela of Converge Technologies as they unravel the complexities of data security, emphasizing classification and discovery. Discover how AI-driven advancements have reshaped data management over t...
•
Episode 22
•
34:51
SchemaLink Unveiled: Decoding PKWARE z/OS Data Security Solutions
Explore the groundbreaking SchemaLink Technology by PKWARE, unraveling how it solves the unsolved challenges in z/OS data security. Join us as we delve into the intricacies of PK Protect, questioning, understanding, and demystifying the evoluti...
•
Episode 21
•
39:05
Mainframe Evolution: Challenges, Security, and Success Stories with Dusty Rivers
In this podcast episode, featuring the insightful Dusty Rivers as the guest, we delve deep into the world of mainframe modernization—an essential conversation for businesses navigating the digital landscape. As an eminent figure well-versed in ...
•
Episode 20
•
29:34
The Future of Mainframe Data Security is Now – Here’s What You Need to Know
Our recent podcast with Len Santalucia delves deep into the ever-changing mainframe security landscape. We discuss how z/OS is the ultimate platform for sensitive data and has been for 40 years making it a prime target for those with malicious ...
•
Episode 19
•
36:41
IBM and the Future of Cybersecurity
In our latest Productivity Protected Podcast, we had the pleasure of speaking with Meredith Stowell, Vice President of IBM Z Ecosystem. With her extensive background in technology and a deep understanding of IBM's innovative solutions, Stowell ...
•
Episode 18
•
22:55
The Fundamentals of Dynamic Masking
In this podcast, we are speaking with Nidhi Mahajan, an expert from our Engineering Team, discussing our recently released Dynamic Masking feature. We discuss the differences between Dynamic Masking and Static Masking, highlighting our real-tim...
•
Episode 17
•
23:47
Data Risk Management: Best Practices and Predictions
As data has evolved over the years, so too has data risk management changed and evolved. Mandates such as HIPAA, GDPR, CCPA, and PCI DSS continue to adjust how organizations collect, use, store, and protect their data, while new advancements su...
•
Episode 16
•
34:52
Understanding Sensitive Data Discovery
Sensitive data discovery seems like a straightforward process, but in reality, it’s a nuanced practice that involves detailed understanding in order to make sure that organizations are as aware and protected as possible. Businesses must have a ...
•
Episode 15
•
37:33
Women in Tech: How Far We’ve Come and What’s Next
At PKWARE, we’ve always been about progress, and that includes building an organization that celebrates and encourages women in technology and leadership roles. In honor of International Women’s Day and Women’s History Month, join Kathy Myhand,...
•
Episode 14
•
23:02
Stopping Cybercrime Before It Starts: Dark Web Threat Intelligence
The dark web is home to the fraud economy and multiple criminal communities, rife with stolen data. It’s a complex and twisted environment that the average internet user should avoid, but what happens when they learn their data is available for...
•
Episode 13
•
34:58
Why Cybersecurity Needs Ethical Hackers
Protecting your data sometimes requires thinking like a threat actor. Enter ethical hackers, authorized security experts that try to break into your systems on purpose so you know where to improve security measures. Hacker and CypherCon founder...
•
Episode 12
•
24:05
Why UX/UI is Crucial to Cybersecurity Software
User interface and experience design is one of the most critical aspects of successful software. Done well, UX/UI actually goes largely unnoticed, and users will intuitively perform the right actions. With complex solutions like cybersecurity...
•
Episode 11
•
29:18
Leading the Way: Israel’s Investment in Cybersecurity
Over the past several decades, Israel has become a powerhouse in cybersecurity, supplying a large percentage of the world’s cyber technology. Israel has also focused on assisting smaller nations in creating cybersecurity startups. Josh Cohen, D...
•
Episode 10
•
38:02
What CFOs Should Know About Data Breaches
In many organizations, the CFO’s responsibility in overseeing company funds puts them in control of signing off on risks, including how data is handled. CFOs end up playing a specific role in helping their organization prepare for the inevitabl...
•
Episode 9
•
28:18
From ZIP to Data Protection: The Evolution of a Software Company
The ZIP file revolutionized the way information could be shared between computers prior to the internet, and it was invented by none other than PKWARE founder Phil Katz. Our unique role as a trusted data compression provider has enabled PKWARE ...
•
Episode 8
•
35:59
Learning from the Top: Women in Tech Leadership
There are more than one million people employed in cybersecurity in the US, yet only a quarter of that workforce are women. The statistics are similar for women in leadership roles: They hold only 23 percent of executive roles, and in the tech ...
•
Episode 7
•
43:54
Succeeding in the Technology Partner Ecosystem
Technology partnerships are designed to drive efficiency through integration. One of PKWARE’s top partners, TrustArc, allows us to focus on delivering solutions that help companies navigate the ever-evolving landscape of global data privacy leg...
•
Episode 6
•
48:13
3 Tips for Shielding Sensitive Data
Consumers are becoming more and more savvy about their data: where it’s shared, who has it, and what they do with it. Over the past few years we’ve also seen a rise in volume of data privacy regulations, which creates additional challenge for i...
•
Episode 5
•
45:36
PCI DSS 4.0 is Here. Now What?
PCI DSS version 4.0 was finally announced publicly on March 31, 2022. While companies have until March 31, 2024, to begin complying with 4.0, there are some notable changes that you should prep for now. Data expert Chris Pin joins Spencer Kupfe...
•
Episode 4
•
37:21
War on the Cyber Front
Conventional war is extending now to include cyberwarfare, malicious cyber attacks coinciding with military strikes on the ground that create an entirely new battleground. Cybersecurity expert Joe Faxlanger, Cyber Solutions Executive at RockITe...
•
Episode 3
•
38:05
Protection on the Move: Shifting Cybersecurity to Protect Remote Work
The last two years stretched workforces in many ways, especially with the addition of remote and hybrid workplaces. In all of this, protecting data still remains crucial to business operations. With these work models here to stay, it’s time for...
•
Episode 2
•
28:59