Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 1 week ago | 37 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 1 week ago | 38 mins Webinar: Supercharge Your DMA Awards Entries with JICMAIL JICMAIL The DMA Awards are the most rewardingly hard to win in the business. So, how can you go further and grab the glory? Find out alongside Ian Gibbs, Dire... March 30, 2023 2:00pm Using Passkeys in the Enterprise Rich Gibsen & Michael Rothschild, HYPR With support of passkeys by the top three tech giants (Google, Microsoft & Apple), consumers no longer have to ever write, generate or remember a pass... 3 days ago | 49 mins Ransomware: Attackers vs Defenders Alex Hinchliffe, Unit 42 and Maurits Lucas, Intel 471 Ransomware is the most common type of malware attack and often the most costly to organizations around the world. The need for organizations to protec... 2 days ago | 48 mins Authoring a Complete Story of Student Success Melissa Williams, Title III Grant Manager, Linn-Benton Community College Student success isn’t just about advising – it’s about supporting students throughout their time on campus. And to do this effectively, you need to fu... 2 days ago | 46 mins Driving Better Business Outcomes: How to Fuel Your MDM Strategy Alyssa Sliney, MDM Global Practice Lead and Ricardo Rosales, SVP Sales America Even the largest avalanche is triggered by small things. Poor Master Data Management can cause similar impacts when seemingly small issues like data e... 3 days ago | 31 mins Ransomware: Attackers vs Defenders Alex Hinchliffe, Unit 42 and Maurits Lucas, Intel 471 Ransomware is the most common type of malware attack and often the most costly to organizations around the world. The need for organizations to protec... 3 days ago | 48 mins Rocket + Zia: How Automation Fixes Insurance Company Content Management Problems Eric Howse, Enterprise Sales Director at Zia Consulting, and William Davit, Senior Account Executive at Rocket Software Customers choose insurance companies that are easy to work with. But insurance companies are tasked with a contradictory goal: improving profitability... 3 days ago | 46 mins How Noom Improved Finance Efficiency with NetSuite and Tipalti Marc Balcke-Corp Controller; Jacquin Yohan-Asst Corp Controller; Ranga Bodla-VP & Anand Misra-SrDirector Noom’s mantra is to make the world a healthier place. Before Noom started using NetSuite and Tipalti, third-party accountants managed the organization... 3 days ago | 61 mins Load more