Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Data-Driven Marketing with a Human Touch Olivia Dassler, Director of Marketing Programs, and Alex Stern, Marketing Programs Manager (BrightTALK) Today, B2B marketers have access to data that they could have only dreamed of a generation ago. Powered by technology, automation is allowing marketin... 1 week ago | 50 mins Securing the Software Supply Chain with Hacker-Powered Security Chris Dickens, Sales Engineer, Kayla Underkoffler, Senior Security Technologist, Alex Rice, CTO & Co-founder, HackerOne HackerOne CTO and Co-founder Alex Rice and Sales Engineering Manager Laurie Mercer dive into how organizations can reduce risk to their software suppl... 3 months ago | 27 mins Solving the 'work anywhere and access everything' security challenge Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security The corporate world has changed in many ways. Some forced, some desired. The end user experience of working within an organization, large or small, is... 2 days ago | 28 mins Logical Data Fabric Powered by Data Virtualization: An Overview (APAC) Saptarshi Sengupta, Sr. Director Product Marketing, Denodo According to a recent Forrester survey, while 85% of organizations want to improve their use of data insights in their decision making, 91% of the res... 2 days ago | 63 mins The Future of Decision-Making: Human-Powered AI Fatima Brown, CEO, Reclassify AI While traditional approaches to data integration provide much needed aid in efforts to synchronize data across silos, this delivery is just table stak... 2 days ago | 46 mins 5 Steps to Securing Your Terminal Emulator Andrew Simpson, Principal Sales Engineer, Rocket Software Learn why IT leaders can’t afford to disregard legacy security any longer—and what steps to take next. IBM i and IBM Z systems need to be a central p... 2 days ago | 56 mins Logical Data Fabric Powered by Data Virtualization: An Overview Robin Tandon, Director of Product Marketing, Denodo According to a recent Forrester survey, while 85% of organizations want to improve their use of data insights in their decision-making, 91% of the res... May 25, 2022 6:00pm 5 Steps to Securing Your Terminal Emulator Andrew Simpson, Principal Sales Engineer, Rocket Software Learn why IT leaders can’t afford to disregard legacy security any longer—and what steps to take next. IBM i and IBM Z systems need to be a central p... 3 days ago | 56 mins 5 Steps to Securing Your Terminal Emulator Andrew Simpson, Principal Sales Engineer, Rocket Software Learn why IT leaders can’t afford to disregard legacy security any longer—and what steps to take next. IBM i and IBM Z systems need to be a central p... 3 days ago | 56 mins Solving the 'work anywhere and access everything' security challenge Eric Schwake, Sr. Manager of Cybersecurity Strategy, Menlo Security The corporate world has changed in many ways. Some forced, some desired. The end user experience of working within an organization, large or small, is... 3 weeks ago | 35 mins Load more