Send us a text In this week's episode of Secure Insights, we dive straight into the big questions shaping the future of secure infrastructure: Is virtualization truly secure for critical workloads?How can we guarantee performance, reliability, and isolation simultaneously?What does secure resource sharing look like for GPUs, TSUs, and NPUs?And what does the future of multi-level security workstations and mutualized IT actually hold?To unpack these challenges, James sits down with Thomas Girar...
All content for Secure Insights with NDK Cyber is the property of NDK Cyber and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text In this week's episode of Secure Insights, we dive straight into the big questions shaping the future of secure infrastructure: Is virtualization truly secure for critical workloads?How can we guarantee performance, reliability, and isolation simultaneously?What does secure resource sharing look like for GPUs, TSUs, and NPUs?And what does the future of multi-level security workstations and mutualized IT actually hold?To unpack these challenges, James sits down with Thomas Girar...
Send us a text Generative AI is transforming the enterprise landscape but it’s also creating an entirely new layer of risk that traditional security tools weren’t built to handle. In this conversation with Nimmy, CMO of Aim Security, we explore the hidden blind spots in today’s security stacks, the rise of Shadow AI, and why model-agnostic controls are essential for future-proofing AI adoption. We’ll dive into the risks of RAG, agents, and GenAI integrations, uncover how real-world rese...
Secure Insights with NDK Cyber
Send us a text In this week's episode of Secure Insights, we dive straight into the big questions shaping the future of secure infrastructure: Is virtualization truly secure for critical workloads?How can we guarantee performance, reliability, and isolation simultaneously?What does secure resource sharing look like for GPUs, TSUs, and NPUs?And what does the future of multi-level security workstations and mutualized IT actually hold?To unpack these challenges, James sits down with Thomas Girar...