Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Transforming Customer Data into Insights: The Marketer's Guide to CDPs Brett Bothe, Principal Product Marketing Manager, Acquia & Chris Rothstein, Gorilla Group, a WundermanThompson company It's a brave new world for marketers. Consumers are shopping and engaging with brands across more digital channels than ever, and customer loyalty is ... 5 months ago | 49 mins What’s New in Forcepoint DLP? Kevin Oliveira, Sr. Product Marketing Manager for Data Security | Mattia Maggiol, Head of Technical Marketing Expanding data loss prevention to where data resides and people work In Q4 2021, Forcepoint released the latest 8.9 version of the industry’s most t... 5 months ago | 34 mins Transforming Customer Data into Insights: The Marketer's Guide to CDPs Brett Bothe, Principal Product Marketing Manager, Acquia & Chris Rothstein, Gorilla Group, a WundermanThompson company It's a brave new world for marketers. Consumers are shopping and engaging with brands across more digital channels than ever, and customer loyalty is ... 6 months ago | 49 mins 2022 DBIR Presents Episode 4: Denial of Service Phil Langlois, Suzanne Widup The Verizon 2022 Data Breach Investigations Report (DBIR)—marking its 15-year anniversary—examines an unprecedented year in cybersecurity history. Joi... July 7, 2022 3:00pm xPU Accelerator Offload Functions Joseph White, Dell; John Kim, NVIDIA; Mario Baldi, Pensando; Yadong Li, Intel; David McIntyre, Samsung As covered in our first webcast “SmartNICs and xPUs: Why is the Use of Accelerators Accelerating,” we discussed the trend to deploy dedicated accelera... 4 days ago | 60 mins SUSE Rancher and Kubernetes Secrets: How to Encrypt Your Data in the Cloud? Nicolas Vermande, Principal Developer Advocate, Ondat Secrets are not so secret in Kubernetes! You may be aware that SUSE Rancher can be configured to enable Kubernetes Secrets Encryption. But the encrypt... 2 weeks ago | 27 mins Cryptography Enabled Data Science: Meeting the Demands of Data Driven Enterprise Dr. Marcelo Blatt, Vice President of Data Science, Duality & Ronen Cohen, Vice President of Strategy, Duality We are all familiar with encryption of data-at-rest and data-in-transit, but can encryption also protect data-in-use? An emerging field of Privacy Enh... 1 month ago | 20 mins Securing Communications at the Tactical Edge using Hardware Security Modules Alex Antrim, Senior Solutions Engineer, Yubico Today’s warfighters and the network architects that design the communications networks that they rely on, are faced with adversaries that are increasi... 5 days ago | 61 mins Preventing Database Breaches with Application-Layer Encryption Philip Vejre, Cryptographer (PhD) and Tech Lead at CYBERCRYPT Data breaches are more prolific than ever, with 2021 seeing 5250 confirmed instances involving large companies such as Facebook, LinkedIn, and Ubiquit... 2 months ago | 38 mins How to De-Identify Apache Kafka Data Streams Ameesh Divatia, CEO, Baffle and Syl Yelle, VP, Baffle Apache Kafka is a powerful platform for streaming data in real time for multiple use cases, including data analysis downstream. However, putting sensi... 1 month ago | 38 mins Load more