Preparing for Oracle 26ai

Preparing for Oracle 26ai

Up next

Beyond Monitoring: Inside Pure1, Evergreen//One & Active Management - The History of Digital Experience

In this episode we welcome Naveen Neelakantam, Chief Architect of Everpure’s Digital Experience Business Unit. Naveen dives into the origin and evolution of Everpure's Digital Experience (DX), detailing how DX revolutionized storage management by moving beyond reactive support. T ...  Show more

On the Road at the Pittsburgh Pure User Group Celebrating the Everpure and Nutanix Launch

The Pure Report podcast went on location to the Pittsburgh Pure User Group, set against the backdrop of the Ohio River, to celebrate the GA launch of the Everpure and Nutanix solution. We interviewed a lineup of guests—including David Stevens, Expedient’s Rob McCafferty, Don Poor ...  Show more

Recommended Episodes

Balancing Security with Usability in Cybersecurity
Threat Vector by Palo Alto Networks

In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ...  Show more

Behind the Scenes with Palo Alto Networks CIO and CISO Securing Business Success with Frictionless Cybersecurity
Threat Vector by Palo Alto Networks

In this episode of Threat Vector, David Moulton speaks with Meerah Rajavel, CIO of Palo Alto Networks, and Niall Browne, CISO of the organization, about the importance of aligning IT strategy with cybersecurity.  Meerah and Niall discuss how frictionless security, AI integration ...  Show more

10,000 Days in Cybersecurity
Threat Vector by Palo Alto Networks

Cybersecurity has changed dramatically over the past 10,000 days. In this episode of Threat Vector, host David Moulton speaks with Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, about how the field has evolved and what’s coming next. From his early e ...  Show more

A Former Black Hat Hacker Advises Us On Security Weaknesses
Cybersecurity Today

Unveiling the Double-Edged Sword of AI in Cybersecurity with Brian Black In this episode of Cybersecurity Today, host Jim Love interviews Brian Black, the head of security engineering at Deep Instinct and a former black hat hacker. Brian shares his journey into hacking from a you ...  Show more