Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Zero Trust Architecture. Establishing a security blueprint: step by step Dr. Christopher Meyer, Product Manager Utimaco | Dr. Fabian Eidens, Technology Manager Utimaco Zero Trust Architecture. Establishing a security blueprint - step by step, brick by brick: Things to bear in mind when building your Zero Trust Archit... 9 hours ago | 62 mins A Musicologist's Take on Better-Orchestrated Target Account Programs Mary Shea, PhD, Co-CEO (Mediafly) and John Steinert, CMO (TechTarget) By definition, ABM that doesn’t capture more revenue from target accounts doesn’t cut it. And, while there’s been a focus on increasing ABM’s marketin... June 21, 2023 2:00pm Container Security Essentials David Benas, Associate Principal Consultant, Synopsys As the popularity of cloud-native applications continues to surge, containers are becoming the preferred option to package and deploy these applicatio... 3 months ago | 61 mins Last-Mile Personalization: Intent Insights and Sales Outreach Renee Tily, Olivia Dassler and Brian Dowling of TechTarget It’s undeniable that Sales Development plays a crucial role in any B2B tech organization’s go-to-market strategy. Yet, how many of us really stop to t... 4 months ago | 47 mins Integration of Automated Security Tools in CI/CD Pipelines Meera Rao, Senior Director - Product Management (DevOps Solutions) Development organizations continue to implement security earlier in the continuous integration/continuous delivery (CI/CD) pipeline. And the benefits ... 7 months ago | 60 mins Making 5G Ready to Live on The Edge Kaitki Agarwal, Founder, President and CTO, A5G Networks, Inc. Edge IT is diverse, distributed, and largely siloed. With OT in the network that involves sensors, IoT devices etc., we need coordination with mobile ... 10 months ago | 19 mins 5 Questions Every CFO Should Be Asking Their Controller Israel Askew, CFO of Emission Monitoring Service, Inc. | Andrew Pease, CFO of Brighter Leading CFOs collaborate closely with their controllers to define and implement winning strategies throughout financial operations, but how do you kno... 2 hours ago | 61 mins How the New Web Application Architecture is Changing Web Application Security Eyal Arazi, Senior Product Marketing Manager, Radware; Moderated by Simon Ratcliffe, Principal Consultant, Ensono Web applications are moving from traditional back-end and front-end architecture, deployed in an organization’s physical data center, to modern multi-... 8 hours ago | 29 mins Telco Market Trends and Key Cybersecurity Considerations Fortinet's Jonathan Nguyen-Duy, Ronen Shpirer, Pablo Molinero Telco Service Providers are at the center of today’s digital ecosystem and play a key role facilitating the exchange of the data and enabling the esse... 1 day ago | 42 mins Identity-First Security, the Foundation for Zero Trust Marc Airo Farulla, ANZ Regional Sales Director, AppViewX & Nick Lovell, Global Sales Director, Oper8 Global Machine identities greatly outnumber human identities but they continue to be a blind spot for most identity and access management programs. In this w... June 8, 2023 5:00am Load more