Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Innovation Showcase Ep.2: A standard approach to custom SOC Verizon The security industry knows a large number of terms that all describe managed SOC-based services: MSS, MDR, Managed SIEM, Advanced SOC, etc. Furthermo... 5 days ago | 39 mins Beyond Identity: The Pitfalls of Not Becoming Identity Agnostic in 2023 Dan Jaye, Co-Founder & CEO at Aqfer and Daniel Landsman, Global Director of Ad Tech & Gaming at Aerospike Sure, when you first started working with your identity provider, you fell in love with the promise of being able to run more effective and measurable... April 6, 2023 5:00pm How Government Organizations Can Quickly Enforce Mobile App Bans Kern Smith, VP of Sales Engineering for the Americas at Zimperium; Miguel Sian, SVP of Technology at Merlin The White House has given Federal agencies 30 days to remove a popular social media app from all government-issued devices and to prohibit future traf... 7 days ago | 23 mins Embracing Google Analytics 4 Samantha Barnes Senior Director of Google Analytics Google Analytics 4 is no longer the new, it's the now. Recent news represents the biggest updates to Google Analytics ever. We review key details that... 6 months ago | 29 mins Improving Contextual Analysis for Protecting Organizations from Insider Threats Robert A. Davidson, Insider Threat Manager at Dominion Energy & Sanjay Raja, VP Product Marketing and Solutions at Gurucul As insider threats have started to escalate in recent years, it is even more important to build and implement a successful insider threat program. How... 4 months ago | 38 mins Industrial Cross Domain Security: How U.S. Gov't Best Practices Translate to CI Mark Toussaint, Product Manager; Shawn Campbell, Principal Product Mgr., Gov't Solutions; Scott Coleman, VP Marketing Modern critical infrastructure is increasingly reliant on connected systems, data visibility, and remote access. Unfortunately, these connections crea... 2 years ago | 44 mins OWT: The Perfect Solution for Meeting RTB Operational and Audit Requirements Scott Coleman, Shawn Campbell, Brian Romansky According to the latest Raise-the-Bar requirements from the NCDSMO for the U.S. Department of Defense (DoD) and Intelligence Community (IC), any activ... 1 year ago | 30 mins The Role of Server-Side in the Future of Your Data Foundation Chris Slovak, Global VP, Solutions Consulting & Jamie Wells, US West Manager, Solutions Consulting at Tealium In a hyper-competitive, cross-device, cross-experience world, consumer expectations for personalized, omnichannel experiences have put increasing pres... 4 years ago | 61 mins Insider Risk and Supply Chain Threats for Financial Services Sanjay Raja, VP Product Marketing and Solutions, Gurucul The risks associated with insider threats grow with the more blatant recruitment of insiders via threat actor groups like Lapsus$, nation state recrui... 5 months ago | 32 mins What Is Your Data Hiding from You? A Marketer’s Guide to ID Resolution Todd Cullen, Founder and Managing Partner at Blue Table Advisors Tired of roadblocks that keep you from using data your company already paid to collect? Are factors beyond your control—walled gardens, the looming de... 2 years ago | 55 mins Load more