Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Varnish Configuration Language 101: Basic Controls, Use Cases, & Benefits Thijs Feryn, Tech Evangelist, Varnish Software Having a full-blown programming language to describe the configuration of your cache gives you unparalleled flexibility to tune the behavior of the ca... 1 month ago | 29 mins Real Impact from Intent Data in 2023 Malachi Threadgill, Principal Analyst, Forrester Combined with over-arching trends towards digital, the events of the past few years have caused distinct shifts in buyer behavior. And now, as economi... 1 month ago | 45 mins Using Audience Insights to Drive Value at Scale Kate Jacobsen, Manager of Marketing Programs, and Olivia Dassler, Director of Marketing Programs (BrightTALK) Buyer behavior has evolved rapidly in the last decade. B2B buyers have embraced video-based content consumption in recent years and the emergence of n... 2 months ago | 51 mins Real-Time Computing Challenges for Document Stores in Online Gaming George Demarest - Director of Product Marketing at Aerospike & Richard Lewis - Solution Architect at Aerospike Document stores for real-time applications in online gaming have stringent requirements. They need to support millions of concurrent users while being... 1 day ago | 50 mins Enhancing Patient Engagement With AWS Apexon: Rajan Vanjani, SVP & Dr. Suresh, SME | AWS: Vikram Singh, Global Head of Healthcare Partners Patient engagement refers to digital health initiatives that allow patients to fully participate in healthcare, support positive behavior change, and ... 1 day ago | 41 mins How Mature Behavior Analytics Accelerates Detection of Persistent Threats Sanjay Raja, VP Product Marketing and Solutions, Gurucul Many solutions that have some threat detection and response capabilities, such as SIEM and XDR, are claiming to add User and Entity Behavior Analytics... 1 week ago | 36 mins Top 5 Insider Threat Profiles a Next-Gen SIEM Can Detect Findlay Whitelaw, Sr. Director, Insider Threat Program, Securonix; Tyler Williams, Principal Detection Engineer, Securonix With insider threats persisting, our webinar looks at how threat models bring real-life cases and incidents to life. Our experts offer an overview of ... 2 days ago | 50 mins Cymulate Cyber Resilience 2023: Lessons Learned from 1.5 Million Hours of Tests Mike DeNapoli, Director, Cybersecurity Architect, Cymulate Cymulate Cybersecurity Effectiveness Report: What We Learned from 1,725,720 Hours of Security Testing In one year, Cymulate has helped customers wi... 2 days ago | 60 mins Expanding Serverless Protection for AWS Lambda Bennett Borofka Partner Solutions Architect, AWS James Nguyen Next Gen WAF, Elizabeth Hurder, Sr. Product Marketing Manager The challenges that security teams face with CAPTCHAs are often ignored, but it needs to be addressed. Whether it’s privacy concerns of user data bein... 2 days ago | 44 mins Top 5 Insider Threat Profiles a Next-Gen SIEM Can Detect Findlay Whitelaw, Sr. Director, Insider Threat Program, Securonix; Tyler Williams, Principal Detection Engineer, Securonix With insider threats persisting, our webinar looks at how threat models bring real-life cases and incidents to life. Our experts offer an overview of ... 4 days ago | 50 mins Load more