Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cloud security best practices for defending against APTs Tyler Moffitt | Senior Threat Research Analyst Year over year, newer and more inventive social-engineering techniques, such as watering hole attacks and spear phishing, are combined with malware at... 7 years ago | 43 mins How the Right Content & Delivery Strategies Double Demand Gen ROI John Steinert, the CMO of TechTarget, and Zak Pines, the VP of Marketing at Bedrock Data As the measurability of marketing campaigns has gone up, marketers have become obsessed with things like CPL and MQL. They’ve focused more of their bu... 5 years ago | 45 mins 電力與自來水公司新一代的 SCADA 安全性 電力與自來水公司新一代的 SCADA 安全性 電力與自來水公司新一代的 SCADA 安全性 7 years ago | 47 mins The Reality Of Software Defined Storage Peter McCallum, VP Datacenter Solutions Are you looking for freedom to choose or leverage the right storage infrastructure to match your business, operations, and budget? Would you like to b... 7 years ago | 58 mins Remove Overhead and Complexity with Tunnel free SD-WAN Ritesh Mukherjee, Vice President Product Management at 128 Technology Removal of tunnels, reduction of bandwidth, end-to-end networking, instantaneous failovers and zero-trust security are superpowers that 128 Technology... 4 years ago | 57 mins Presidio & Amazon Connect: Why You Need A Customer Contact Center in the Cloud Brad Haas, Director Collaboration Practice, Presidio & Chris Bergin, Business Development Manager, Amazon Connect Placeholder for test upload 5 years ago | 0 min The Economic Advantages of TLS Certificates-as-a-Service Mark Sanders placeholder 2 years ago | 18 mins Digitally Transform Your Enterprise with Low Code Andrew Murphy, EMEA VP, K2 Placeholder 5 years ago | 66 mins Automating the Machine Identity Management Lifecycle for TLS Certificates Anthony Lombardi Placeholder 2 years ago | 20 mins Houston, We Have a Problem: Sensitive Data Orbiting Your Business Mike Kiser, Sr. Security Strategist, SailPoint Similar to space debris, data is orbiting enterprises at an alarming speed and volume. Like many of the floating objects in space, much of this data i... 5 years ago | 28 mins