The Podcast Channel of AST Cybersecurity
Technology
About Sharon Goldberg:
Dr. Sharon Goldberg is a noted infosec researcher and the CEO and cofounder of BastionZero, an infrastructure cybersecurity startup that provides simple passwordless access to servers, kubernetes, web and database infrastructure. She's also a tenured computer science professor at Boston University where she's taught courses in cybersecurity for over a decade. Sharon has authored over 30 peer-reviewed technical papers, multiple IETF RFCs and is the recipient of an NSF CAREER Award and a Sloan Research Fellowship. She is a contributor to BGP, NTP, DNS, Bit coin, Ethereum and IETF cryptography standards, is an author of the 2015 attacks on NTP, and has designed protocols that are currently deployed and used in Bitcoin Core, Ethereum and WhatsApp. Lately, she spends most of her time thinking about shell access, kubernetes and CICD pipelines.
About BastionZero:
Recognized as the runner-up at RSA Innovation Sandbox 2022 and by CRN as a "Top 10 hottest cloud security startup", BastionZero provides simple passwordless access to kubernetes, server and database infrastructure. Our platform pairs with your IdP to quickly grant access with policy controls and observability --- without a mess of passwords, VPNs, and SSH keys. BastionZero delivers zero trust access without creating a single point of compromise, improving the security of your infrastructure while ensuring that we never hold the keys to your kingdom or require privileged access to your infrastructure.
Why Security Starts with Asset Discovery
Bringing Enterprise-level Cybersecurity To SMBs With Eric Pinto of SOCSoter
Getting Into the Mind of a Hacker
Security With App Development And SaaS Solutions
Cybersecurity Roundtable – Trends We’ve Noticed Since COVID
How To Deploy M365 & Azure For Your Remote Workforce
Ransomware—Good Technology Doing Bad Things
How To Establish A Zero Trust Framework For Your Business Quickly & Easily
CMMC: The Convergence of Compliance and Cybersecurity
Find Out How Knowledge Graphs Are Used In Cybersecurity
Cyber Made Easy For Mid-Market Business Executives
Learn How Investing In Cybersecurity Is Done Today!!!
Find Out How COVID19 Has Now Shaped The "New Normal"
The Role Of vCISO Is Now More Crucial Than Ever Before - Find Out Why
Find Out About The Importance & Ramifications Of The CMMC
Safer Computing through Invisible Authentication
Actionable Guidance for Corporate Data Protection In The 2020s
The Bot Mitigation Software that's Challenging the Economics of Automated Attack
What Just Happened?! How Companies Should Transition From WFH
Business Cybersecurity With Alexander Chamandy of Envescent
Join Podbean Ads Marketplace and connect with engaged listeners.
Advertise Today
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
A Prairie Home Companion: News from Lake Wobegon