What Does Zero Trust Tell Us About Cybersecurity? A Q&A With Wandera’s Michael Covington

At this year’s RSA conference, Early Adopter Research’s Dan Woods sat down for a podcast conversation with Michael Covington, VP of product strategy for Wandera. They discussed a number of topics, including an overview of what Wandera does. Woods also asked Covington about his three key cybersecurity questions for 2019. This is an edited version […]

Tags: , , ,

Read more

Visibility for Cybersecurity: A Podcast with Wandera’s Michael Covington

At this year’s RSA conference, Early Adopter Research’s Dan Woods sat down for a podcast conversation with Michael Covington, VP of product strategy for Wandera. They discussed a number of topics, including an overview of what Wandera does. Woods also asked Covington about his three key cybersecurity questions for 2019. Their conversation also covered: * […]

Tags: , , ,

Read more

Cloud-Based Cybersecurity: A Q&A with Zscaler’s Stan Lowe

At this year’s RSA Conference, Early Adopter Research’s Dan Woods conducted a podcast with Stan Lowe from Zscaler. Lowe is the Global CISO for Zscaler and their conversation covered three big questions about cybersecurity in 2019. This is an edited version of their conversation that you can listen to in full on the podcast. Woods: […]

Read more

The New World of Cybersecurity: A Podcast with Zscaler’s Stan Lowe

At this year’s RSA Conference, Early Adopter Research’s Dan Woods conducted a podcast with Stan Lowe from Zscaler. Lowe is the Global CISO for Zscaler and their conversation covered three big questions about cybersecurity in 2019. Topics covered in the podcast include: * 3:15 – Is “zero trust” cybersecurity a reality? * 9:00 – Can […]

Tags: ,

Read more

Where Digital Transformation Fits In: A Q&A with First Round’s Howard Morgan

Recently, Early Adopter Research’s (EAR) Dan Woods had the chance to sit down and have a conversation for the EAR Podcast with Howard Morgan of First Round Capital about digital transformation. Their conversation covered the history of digital transformation and how it fits into the larger story of technological change in general. This is an […]

Tags: , , , ,

Read more

Understanding the Roots of Digital Transformation: A Podcast with First Round’s Howard Morgan

In this latest edition of the Early Adopter Podcast, Dan Woods speaks with First Round’s Howard Morgan about how digital transformation fits into the larger history of technological change. The conversation covers the following: * 3:00 – The nebulous definition of digital transformation * 10:00 – Business process engineering * 13:30 – Six Sigma * […]

Tags: , ,

Read more

The Power of Spreadsheets: A Q&A with Sigma Computing’s Rob Woollen

In a recent episode of the Early Adopter Research (EAR) Podcast, EAR’s Dan Woods spoke with Rob Woollen, the CEO and cofounder of Sigma Computing, about designing enterprise platforms. Sigma Computing’s products can be a component inside an enterprise platform, as the company was created to bring the spreadsheet paradigm to the world of business […]

Read more

Early Adopter Research Podcast: Sigma Computing’s Rob Woollen on Spreadsheets for All

In this edition of the Early Adopter Research Podcast, Early Adopter’s Dan Woods speaks with Rob Woollen, CEO of Sigma Computing. Sigma Computing’s products can be a component inside an enterprise platform, as the company was created to bring the spreadsheet paradigm to the world of business intelligence and data analytics. This is an idea […]

Read more

AI, Integration, Data, and Transparency: RSA’s Rohit Ghai Answers Crucial Cybersecurity Questions

This is the second in a series of pieces that address crucial questions in cybersecurity that I spoke to with industry leaders during the RSA 2018 Conference and updated with new ideas in the run-up to RSA 2019 in San Francisco. These questions built on my previous work, in which I’ve written about the need […]

Tags: , , ,

Read more

Zscaler’s Jay Chaudhry On What Matters Most In Cybersecurity Today

At the RSA 2018 Conference, I had the chance to discuss the current landscape of cybersecurity technology with a wide range of industry leaders, CEOs, and thinkers. I’ve written extensively over the past few years about the need for companies to adopt a portfolio approach to their cybersecurity needs modeled on financial investments, so that […]

Tags: , ,

Read more