Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Integrate Everything: The Swiss Army Knife of Data Management is Here Team Tealium Every part of your business impacts the customer. That’s why, when it comes to customer data, your business needs a flexible and robust solution at th... 10 months ago | 36 mins It's Time to Take Control of Your Provider Data Deanna Nole, Director of Solutions & Marketing at IMT Provider data is often overlooked in strategic data quality and governance programs, yet complete, high-quality data is essential to: - Effective pat... 21 hours ago | 46 mins Can You Trust The Cloud With Your Sensitive Data? Tim Phipps, Cloud Alliances EMEA, Thales Join Tim Phipps as he explores a range of questions IT Security professionals are asking: 1) What is currently driving the demand for putting sensiti... 1 day ago | 54 mins Combating Control Failures: How Can Enterprises Stop Preventable Breaches? Andreas Wuchner - Advisor at Panaseer, Dr Rebecca Wynn - Global CISO at Click Solutions Group and Dom Glavach - CSO, CyberSN There’s no denying that the stress of working in cybersecurity in 2023 is huge. Security teams are dealing with increasingly complex environments, han... 1 day ago | 53 mins Signposts on the Road to Data Eutopia; Hitting the Accelerator Bryan Glick, Editor in Chief, Computer Weekly; Mark Semenenko, Director Solutions Engineering, Immuta IDC predicts that by 2023, 60% of organisations will start implementing DataOps programmes to boost trust in analytics outcomes and the efficiency of ... January 31, 2023 2:00pm Own your keys, not your HSM Iain Beveridge - Product Marketing Manager, Entrust nShield as a Service is a subscription-based cloud solution for generating, accessing, and protecting cryptographic key material, separately from sens... 24 hours ago | 33 mins Beyond Misconfigurations Correlating Threats to Truly Understand Your Cloud Risk Ofer Yarom, Principal Product Manager, Posture Control, Zscaler Today’s attackers leverage sophisticated techniques against their target organizations, using multiple attack vectors to exploit several security weak... 2 days ago | 45 mins Making Sense of Zero Trust Josh Green - Duo Technical Marketing Engineer While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentia... 21 hours ago | 36 mins Data Protector Role Based Access Control Marc Fisseler - Presales Consultant, Data Protection Backup as a Service (BaaS) bietet die Möglichkeit, Unternehmensdaten über einen Service Provider zu sichern, der die erforderliche Backup- und Wiederh... February 6, 2023 8:00am Why Encryption, Access Control are Not Enough Protection for Your Data (APJ) Imperva - Terry Ray ; Fortanix - Dr. Richard Searle; Oracle - Bipin Mistry; Ohalo - Kyle DuPont In today’s fast-moving world, where everything is connected, a company’s data is and should be considered as valuable and easily transported as diamon... 1 week ago | 62 mins Load more