<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url>
<loc>https://www.truthinit.com/index.php/video/3986/building-a-home-private-cloud-with-proxmox-hcp-terraform/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3986_1775182027_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Building a Home Private Cloud with Proxmox &amp; HCP Terraform]]></video:title>
<video:description><![CDATA[TL;DR Proxmox home labs suffer from configuration drift, lost documentation, and manual operation errors that can be solved by applying Infrastructure as Code principles used in cloud environments. HCP Terraform agents enable remote management of local...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3986&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>973</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>DevSecOps</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Infrastructure as Code</video:tag>
<video:tag>Proxmox virtualization</video:tag>
<video:tag>HCP Terraform</video:tag>
<video:tag>Terraform agents</video:tag>
<video:tag>CI</video:tag>
<video:tag>CD pipelines</video:tag>
<video:tag>GitHub integration</video:tag>
<video:tag>Home lab management</video:tag>
<video:tag>On-premises automation</video:tag>
<video:tag>Configuration management</video:tag>
<video:tag>VCS-driven workflows</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3984/how-bigid-automates-data-security-for-financial-services/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3984_1775180535_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How BigID Automates Data Security for Financial Services]]></video:title>
<video:description><![CDATA[TL;DR Financial services organizations face breach costs 28% higher than the global average at roughly $6 million per incident due to the volume of sensitive data they process. BigID&#039;s platform is built on automated data discovery as the foundation fo...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3984&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>105</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Data Privacy</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Data Security</video:tag>
<video:tag>Financial Services Compliance</video:tag>
<video:tag>Data Discovery</video:tag>
<video:tag>Cyber Resilience</video:tag>
<video:tag>Risk Management</video:tag>
<video:tag>Data Breach Prevention</video:tag>
<video:tag>Cloud Migration Security</video:tag>
<video:tag>Regulatory Compliance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3975/unified-identity-platform-for-enterprise-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3975_1775176846_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Unified Identity Platform for Enterprise Security]]></video:title>
<video:description><![CDATA[TL;DR Identity sprawl across 25+ systems creates dangerous security gaps, with 95% of enterprises struggling to manage identities effectively across fragmented tools. Internal threats dominate the landscape with 63% of breaches traced to internal actor...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3975&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>100</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Zero Trust</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Identity Governance</video:tag>
<video:tag>Zero Trust Security</video:tag>
<video:tag>Privileged Access Management</video:tag>
<video:tag>Identity Sprawl</video:tag>
<video:tag>Access Management</video:tag>
<video:tag>Active Directory Management</video:tag>
<video:tag>Internal Threats</video:tag>
<video:tag>Credential Theft</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3976/ubi-feature-enhancements-agreement-product-mapping/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3976_1775176848_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[UBI Feature Enhancements: Agreement &amp; Product Mapping]]></video:title>
<video:description><![CDATA[TL;DR Agreement mapping by vendor allows MSPs to route usage to vendor-specific agreements, enabling separate invoices by vendor (e.g., Microsoft, CDW) while maintaining a master agreement for others. One-to-many product mapping replicates vendor usage...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3976&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1803</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Unified Billing Intake</video:tag>
<video:tag>UBI</video:tag>
<video:tag>Agreement Mapping</video:tag>
<video:tag>Product Mapping</video:tag>
<video:tag>PSA Integration</video:tag>
<video:tag>Vendor Management</video:tag>
<video:tag>Invoice Generation</video:tag>
<video:tag>Usage Data Sync</video:tag>
<video:tag>MSP Billing Automation</video:tag>
<video:tag>Value-Added Services Billing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3977/dspm-risk-remediation-from-detection-to-action/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3977_1775176850_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[DSPM Risk Remediation: From Detection to Action]]></video:title>
<video:description><![CDATA[TL;DR BigID positions its DSPM solution as going beyond detection to deliver actionable remediation, differentiating from competitors who stop at risk identification. Security analysts can take direct action through native remediation capabilities incl...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3977&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>236</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Data Security Posture Management</video:tag>
<video:tag>Risk Remediation</video:tag>
<video:tag>Access Governance</video:tag>
<video:tag>Data Owner Delegation</video:tag>
<video:tag>Compliance Monitoring</video:tag>
<video:tag>SOAR Integration</video:tag>
<video:tag>Audit Trails</video:tag>
<video:tag>PII Protection</video:tag>
<video:tag>Security Frameworks</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3978/defining-and-measuring-risk-tolerance-for-security-teams/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3978_1775176851_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Defining and Measuring Risk Tolerance for Security Teams]]></video:title>
<video:description><![CDATA[TL;DR Nearly half of security professionals lack access to the data needed to effectively measure and manage risk exposure within their organizations. Building a complete inventory of the attack surface is the foundational step for aligning security ef...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3978&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>66</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Vulnerability Management</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Risk tolerance frameworks</video:tag>
<video:tag>Risk exposure management</video:tag>
<video:tag>Attack surface management</video:tag>
<video:tag>Security metrics</video:tag>
<video:tag>Risk quantification</video:tag>
<video:tag>Data visibility</video:tag>
<video:tag>Risk assessment</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3979/self-service-password-reset-for-remote-active-directory-users/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3979_1775176853_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Self-Service Password Reset for Remote Active Directory Users]]></video:title>
<video:description><![CDATA[TL;DR Traditional password resets fail for remote users disconnected from Active Directory, creating helpdesk bottlenecks and productivity delays across time zones. AD Self-Service Plus adds a password reset button to the Windows logon screen that work...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3979&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>493</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Active Directory password management</video:tag>
<video:tag>Self-service password reset</video:tag>
<video:tag>Remote user authentication</video:tag>
<video:tag>Multi-factor authentication</video:tag>
<video:tag>Identity verification</video:tag>
<video:tag>Helpdesk automation</video:tag>
<video:tag>Windows logon integration</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3980/how-to-deploy-fortigate-as-a-service-step-by-step-demo/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3980_1775176855_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How to Deploy FortiGate-as-a-Service: Step-by-Step Demo]]></video:title>
<video:description><![CDATA[TL;DR FortiGate-as-a-Service delivers Fortinet&#039;s hardware firewall capabilities through a cloud-based consumption model using FortiPoints as the purchasing currency. Deployment takes only minutes through the FortiCloud portal, with options for three f...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3980&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>251</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Network Security</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Firewall-as-a-Service</video:tag>
<video:tag>FortiGate deployment</video:tag>
<video:tag>Cloud-delivered security</video:tag>
<video:tag>Hardware-as-a-Service</video:tag>
<video:tag>Network security provisioning</video:tag>
<video:tag>High availability configuration</video:tag>
<video:tag>FortiCloud management</video:tag>
<video:tag>MSSP security solutions</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3981/managing-data-storage-for-enterprise-ai-initiatives/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3981_1775176856_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Managing Data Storage for Enterprise AI Initiatives]]></video:title>
<video:description><![CDATA[TL;DR Managing data across siloed storage systems (SAN, NAS, object, cloud, edge) has become critical for enterprise AI success, as organizations struggle with visibility into what data they have and where it resides. High-performance AI workloads requ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3981&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>293</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Thought Leadership</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Enterprise AI</video:tag>
<video:tag>Data Management</video:tag>
<video:tag>Hybrid Multicloud</video:tag>
<video:tag>Storage Architecture</video:tag>
<video:tag>GPU Infrastructure</video:tag>
<video:tag>Data Visibility</video:tag>
<video:tag>Large Language Models</video:tag>
<video:tag>Small Language Models</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3982/rmm-patching-improvements-manual-controls/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3982_1775176858_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[RMM Patching Improvements &amp; Manual Controls]]></video:title>
<video:description><![CDATA[TL;DR Approval groups enable scoped patch approvals tied to device groups, allowing MSPs to override partner-level policies for specific endpoints — critical for managing problematic patches like KB 5074109 that only affected physical devices. On-deman...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3982&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1701</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Endpoint Management</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Patch Management</video:tag>
<video:tag>RMM Automation</video:tag>
<video:tag>Third-Party Patching</video:tag>
<video:tag>Application Deployment</video:tag>
<video:tag>Device Grouping</video:tag>
<video:tag>Patch Approval Workflows</video:tag>
<video:tag>Windows Endpoint Management</video:tag>
<video:tag>MSP Operations</video:tag>
<video:tag>Vulnerability Management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3983/installing-the-stormagic-svsan-plugin-in-vsphere/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3983_1775176860_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Installing the StorMagic SvSAN Plugin in vSphere]]></video:title>
<video:description><![CDATA[TL;DR The SvSAN Plugin installs via standard VMware OVF template deployment, requiring basic VM configuration including network settings, credentials, and vCenter registration. Installation follows StorMagic&#039;s online documentation and takes approximat...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3983&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>185</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>StorMagic SvSAN installation</video:tag>
<video:tag>VMware vSphere plugin deployment</video:tag>
<video:tag>OVF template configuration</video:tag>
<video:tag>vCenter integration</video:tag>
<video:tag>Virtual Storage Appliance setup</video:tag>
<video:tag>Edge computing storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3973/proactive-digital-experience-management-for-sase-environments/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3973_1775170668_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Proactive Digital Experience Management for SASE Environments]]></video:title>
<video:description><![CDATA[TL;DR Netskope&#039;s PDEM addresses visibility gaps in modern hybrid work environments where traditional monitoring tools fall short of detecting issues across interconnected SaaS, cloud, and network infrastructure. The solution shifts IT operations from ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3973&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>151</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>SASE</video:tag>
<video:tag>SSE</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Network Security</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Digital Experience Management</video:tag>
<video:tag>Proactive Monitoring</video:tag>
<video:tag>SASE Architecture</video:tag>
<video:tag>Hybrid Work Enablement</video:tag>
<video:tag>IT Operations Automation</video:tag>
<video:tag>End User Experience</video:tag>
<video:tag>Cloud Security Performance</video:tag>
<video:tag>Help Desk Optimization</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3966/how-the-netskope-zero-trust-engine-secures-cloud-access/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3966_1775170656_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How the Netskope Zero Trust Engine Secures Cloud Access]]></video:title>
<video:description><![CDATA[TL;DR The Netskope Zero Trust Engine is positioned as the only solution that truly fulfills Zero Trust promises, built cloud-native from the ground up rather than retrofitted from legacy architectures. The platform delivers precise access controls beyo...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3966&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>101</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Zero Trust</video:tag>
<video:tag>SASE</video:tag>
<video:tag>SSE</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Network Security</video:tag>
<video:tag>Zero Trust Architecture</video:tag>
<video:tag>SASE Platform</video:tag>
<video:tag>Security Service Edge</video:tag>
<video:tag>Access Control</video:tag>
<video:tag>Risk Assessment</video:tag>
<video:tag>Cloud-Native Security</video:tag>
<video:tag>Network Security Transformation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3967/proactive-dem-enterprise-site-centric-user-experience-monitoring/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3967_1775170658_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Proactive DEM Enterprise: Site-Centric User Experience Monitoring]]></video:title>
<video:description><![CDATA[TL;DR Proactive DEM Enterprise integrates real user monitoring with synthetic transaction monitoring for complete SASE visibility across endpoints, networks, and applications. The platform provides hop-by-hop analysis from user device to application de...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3967&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>84</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>SASE</video:tag>
<video:tag>SSE</video:tag>
<video:tag>Network Security</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Digital Experience Monitoring</video:tag>
<video:tag>SASE Performance Visibility</video:tag>
<video:tag>Real User Monitoring</video:tag>
<video:tag>Synthetic Transaction Monitoring</video:tag>
<video:tag>Network Troubleshooting</video:tag>
<video:tag>Endpoint Performance</video:tag>
<video:tag>User Experience Optimization</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3968/wiz-and-netskope-integration-dynamic-cloud-access-control/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3968_1775170659_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Wiz and Netskope Integration: Dynamic Cloud Access Control]]></video:title>
<video:description><![CDATA[TL;DR The Wiz-Netskope integration uses webhooks and APIs to automatically block access to private applications when Wiz detects security issues in cloud workloads. An AWS-based integration toolkit (API Gateway and Lambda) serves as the bridge between ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3968&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>240</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>Zero Trust</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Cloud Security Integration</video:tag>
<video:tag>Wiz Platform</video:tag>
<video:tag>Netskope Private Access</video:tag>
<video:tag>Webhook Automation</video:tag>
<video:tag>Dynamic Access Control</video:tag>
<video:tag>AWS Lambda</video:tag>
<video:tag>API Gateway</video:tag>
<video:tag>Zero Trust Network Access</video:tag>
<video:tag>Cloud Workload Protection</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3969/netskope-one-private-access-zero-trust-vpn-replacement-demo/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3969_1775170661_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Netskope One Private Access: Zero Trust VPN Replacement Demo]]></video:title>
<video:description><![CDATA[TL;DR Netskope One Private Access uses zero trust principles to connect users directly to specific applications rather than networks, eliminating the lateral movement risks inherent in traditional VPNs. The solution supports managed devices via the Net...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3969&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>315</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Zero Trust</video:tag>
<video:tag>Network Security</video:tag>
<video:tag>Demo</video:tag>
<video:tag>SASE</video:tag>
<video:tag>SSE</video:tag>
<video:tag>Zero Trust Network Access</video:tag>
<video:tag>VPN Replacement</video:tag>
<video:tag>Private Application Access</video:tag>
<video:tag>Device Posture Verification</video:tag>
<video:tag>Identity-Based Access Control</video:tag>
<video:tag>Data Loss Prevention</video:tag>
<video:tag>Unmanaged Device Security</video:tag>
<video:tag>Server-Initiated Connections</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3970/netskope-advanced-sse-integration-with-microsoft-entra-demo/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3970_1775170663_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Netskope Advanced SSE Integration with Microsoft Entra Demo]]></video:title>
<video:description><![CDATA[TL;DR Netskope One Advanced SSE for Microsoft Entra unifies Netskope&#039;s threat protection and DLP with Microsoft&#039;s SSE capabilities through a single client and profile. The integration is accessed through Microsoft Entra Admin Center&#039;s marketplace an...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3970&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>315</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>SASE</video:tag>
<video:tag>SSE</video:tag>
<video:tag>Zero Trust</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Security Service Edge</video:tag>
<video:tag>Microsoft Entra Integration</video:tag>
<video:tag>Advanced Threat Protection</video:tag>
<video:tag>Data Loss Prevention</video:tag>
<video:tag>Conditional Access</video:tag>
<video:tag>Web Filtering</video:tag>
<video:tag>Global Secure Access</video:tag>
<video:tag>Unified Security Logging</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3971/netskope-one-unified-sase-platform-demo/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3971_1775170664_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Netskope One Unified SASE Platform Demo]]></video:title>
<video:description><![CDATA[TL;DR Netskope One deploys a single unified client across all device types including laptops, smartphones, and Chromebooks, maintaining consistent SASE protection regardless of user location or device. The Zero Trust engine monitors over 100 different ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3971&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>741</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>SASE</video:tag>
<video:tag>SSE</video:tag>
<video:tag>Zero Trust</video:tag>
<video:tag>Data Privacy</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>SASE architecture</video:tag>
<video:tag>Zero Trust Network Access</video:tag>
<video:tag>Cloud Access Security Broker</video:tag>
<video:tag>Data Loss Prevention</video:tag>
<video:tag>Remote Browser Isolation</video:tag>
<video:tag>User Behavioral Analytics</video:tag>
<video:tag>Cloud Firewall</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3972/chatgpt-enterprise-dlp-integration-api-data-protection-demo/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3972_1775170666_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[ChatGPT Enterprise DLP Integration: API Data Protection Demo]]></video:title>
<video:description><![CDATA[TL;DR Netskope&#039;s ChatGPT Enterprise integration enables API-based DLP policy enforcement that monitors both user messages and file uploads for sensitive data violations in real-time. The platform generates distinct alert types for messages versus file...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3972&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>289</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>ChatGPT Enterprise Security</video:tag>
<video:tag>API-Based Data Protection</video:tag>
<video:tag>Data Loss Prevention</video:tag>
<video:tag>PII Detection</video:tag>
<video:tag>Generative AI Compliance</video:tag>
<video:tag>Security Policy Enforcement</video:tag>
<video:tag>DLP Incident Management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3964/securing-apple-vision-pro-for-enterprise-use-with-netskope/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3964_1775170341_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Securing Apple Vision Pro for Enterprise Use with Netskope]]></video:title>
<video:description><![CDATA[TL;DR Netskope One client runs natively on Apple Vision Pro, enabling enterprise security controls on the spatial computing platform. Remote Browser Isolation protects users from malicious links in collaboration tools like Microsoft Teams without block...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3964&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>77</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>Zero Trust</video:tag>
<video:tag>Endpoint Management</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Apple Vision Pro</video:tag>
<video:tag>spatial computing security</video:tag>
<video:tag>remote browser isolation</video:tag>
<video:tag>Zero Trust Network Access</video:tag>
<video:tag>Microsoft Teams security</video:tag>
<video:tag>enterprise mobility</video:tag>
<video:tag>endpoint protection</video:tag>
<video:tag>ZTNA Next</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3965/proactive-digital-experience-management-pdem-explained/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3965_1775170342_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Proactive Digital Experience Management (PDEM) Explained]]></video:title>
<video:description><![CDATA[TL;DR PDEM provides complete end-to-end monitoring from device to application across all network segments, eliminating visibility blind spots in complex hybrid environments. The solution shifts IT from reactive monitoring to proactive experience manage...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3965&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>86</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-04-02</video:publication_date>
<video:tag>SASE</video:tag>
<video:tag>SSE</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Network Security</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Digital Experience Management</video:tag>
<video:tag>SASE</video:tag>
<video:tag>Network Monitoring</video:tag>
<video:tag>IT Operations Automation</video:tag>
<video:tag>End-User Experience</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Help Desk Optimization</video:tag>
<video:tag>Proactive IT Management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3944/protecting-microsoft-365-data-before-copilot-rollout-with-varonis/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3944_1774909160_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Protecting Microsoft 365 Data Before Copilot Rollout with Varonis]]></video:title>
<video:description><![CDATA[TL;DR Varonis positions itself as a data security platform that maps permissions, classifies sensitive information, and automatically remediates overexposure across Microsoft 365 and other data repositories. Microsoft 365 Copilot inherits user permissi...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3944&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>744</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-30</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Interview</video:tag>
<video:tag>Microsoft 365 Copilot security</video:tag>
<video:tag>Data security platform</video:tag>
<video:tag>Least privilege access</video:tag>
<video:tag>Blast radius reduction</video:tag>
<video:tag>Managed detection and response</video:tag>
<video:tag>Data classification and labeling</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3945/veeam-backup-integration-with-scale-computing-hypercore/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3945_1774909162_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Veeam Backup Integration with Scale Computing HyperCore]]></video:title>
<video:description><![CDATA[TL;DR Scale Computing HyperCore now officially supported in Veeam Backup &amp; Replication v12.3.2, providing channel partners with a VMware alternative for edge and distributed infrastructure deployments Integration uses lightweight worker VMs for agentle...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3945&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2447</video:duration>
<video:view_count>39</video:view_count>
<video:publication_date>2026-03-30</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Webinar</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>VMware alternatives</video:tag>
<video:tag>backup and recovery integration</video:tag>
<video:tag>hyperconverged infrastructure</video:tag>
<video:tag>edge computing</video:tag>
<video:tag>channel partner enablement</video:tag>
<video:tag>ransomware protection</video:tag>
<video:tag>multi-cluster management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3946/q1-2024-product-updates-ipam-rack-management-hudu-assist/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3946_1774909164_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Q1 2024 Product Updates: IPAM, Rack Management &amp; Hudu Assist]]></video:title>
<video:description><![CDATA[TL;DR IPAM and Rack Management features provide validated infrastructure documentation with automatic relationship mapping to existing assets and visual utilization tracking Hudu Assist browser extension surfaces documentation, passwords, and related i...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3946&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2044</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-30</video:publication_date>
<video:tag>Demo</video:tag>
<video:tag>Webinar</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>IP Address Management</video:tag>
<video:tag>Rack Management</video:tag>
<video:tag>Browser Extension</video:tag>
<video:tag>PSA Integration</video:tag>
<video:tag>RMM Integration</video:tag>
<video:tag>Mobile App Development</video:tag>
<video:tag>Permission Management</video:tag>
<video:tag>Network Documentation</video:tag>
<video:tag>Community-Driven Development</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3947/r3hub-technologies-on-5-year-partnership-with-sangfor/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3947_1774909165_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[R3hub Technologies on 5-Year Partnership with Sangfor]]></video:title>
<video:description><![CDATA[TL;DR R3hub Technologies has maintained a five-year partnership with Sangfor in the Philippines, distributing their full product portfolio including servers, HCI, firewalls, and endpoint security. The partner credits Sangfor&#039;s technical support and af...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3947&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>143</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-30</video:publication_date>
<video:tag>Customer Story</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Network Security</video:tag>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Partner testimonial</video:tag>
<video:tag>Channel partnership</video:tag>
<video:tag>Technical support</video:tag>
<video:tag>Hyperconverged infrastructure</video:tag>
<video:tag>Firewall solutions</video:tag>
<video:tag>Endpoint security</video:tag>
<video:tag>Managed Detection and Response</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3948/transitioning-from-vmware-to-proxmox-virtualization/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3948_1774909167_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Transitioning from VMware to Proxmox Virtualization]]></video:title>
<video:description><![CDATA[TL;DR Broadcom&#039;s VMware acquisition eliminated perpetual licensing in favor of mandatory subscriptions, with some customers facing 10x cost increases and discontinued SMB product lines, forcing widespread evaluation of alternatives. Proxmox Virtual En...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3948&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>933</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-30</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Webinar</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>VMware licensing changes</video:tag>
<video:tag>Broadcom acquisition impact</video:tag>
<video:tag>Proxmox virtualization platform</video:tag>
<video:tag>hypervisor alternatives</video:tag>
<video:tag>enterprise virtualization migration</video:tag>
<video:tag>open-source virtualization</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3949/automating-developer-sandbox-setup-with-proxmox-ansible/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3949_1774909169_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Automating Developer Sandbox Setup with Proxmox &amp; Ansible]]></video:title>
<video:description><![CDATA[TL;DR SailPoint sandbox tenants provide valuable testing environments, but developers need automated infrastructure to configure custom sources and avoid production system impact Proxmox Virtual Environment (free, open-source) combined with Ansible con...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3949&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1637</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-30</video:publication_date>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>DevSecOps</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Developer Sandbox Automation</video:tag>
<video:tag>Proxmox Virtual Environment</video:tag>
<video:tag>Ansible Configuration Management</video:tag>
<video:tag>IdentityNow API Integration</video:tag>
<video:tag>Infrastructure as Code</video:tag>
<video:tag>VM Template Management</video:tag>
<video:tag>IAM Testing Environments</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3950/september-2025-patch-tuesday-smb-relay-azure-entra/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3950_1774909171_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[September 2025 Patch Tuesday: SMB Relay &amp; Azure Entra]]></video:title>
<video:description><![CDATA[TL;DR CVE-2025-55234 is an SMB relay attack that Microsoft released to provide audit capabilities, raising questions about whether it should be classified as a CVE since SMB relay attacks are not new. CVE-2025-55232 is a critical unauthenticated remote...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3950&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>124</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-30</video:publication_date>
<video:tag>Vulnerability Management</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Patch Tuesday</video:tag>
<video:tag>Microsoft Security Updates</video:tag>
<video:tag>SMB Relay Attacks</video:tag>
<video:tag>Remote Code Execution</video:tag>
<video:tag>Azure Entra Security</video:tag>
<video:tag>Privilege Escalation</video:tag>
<video:tag>CVE Assignment Practices</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3951/securing-nomad-ui-access-with-google-cloud-load-balancer-iap/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3951_1774909173_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Securing Nomad UI Access with Google Cloud Load Balancer &amp; IAP]]></video:title>
<video:description><![CDATA[TL;DR Demonstrates securing Nomad&#039;s administrative UI using Google Cloud&#039;s Identity-Aware Proxy (IAP) to enforce authentication before allowing access to the cluster management interface Implements a complete ingress architecture using Terraform incl...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3951&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2604</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-30</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>How-To</video:tag>
<video:tag>DevSecOps</video:tag>
<video:tag>Nomad cluster management</video:tag>
<video:tag>Google Cloud load balancing</video:tag>
<video:tag>Identity-Aware Proxy</video:tag>
<video:tag>IAP</video:tag>
<video:tag>Terraform infrastructure as code</video:tag>
<video:tag>OAuth 2.0 authentication</video:tag>
<video:tag>SSL certificate management</video:tag>
<video:tag>DNS configuration</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3952/veganext-on-choosing-superops-for-msp-operations/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3952_1774909174_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[VegaNext on Choosing SuperOps for MSP Operations]]></video:title>
<video:description><![CDATA[TL;DR VegaNext selected SuperOps.ai after evaluating all major PSA platforms, citing ease of deployment, intuitive design, and accessibility as primary decision factors. The client portal enables customers to view and interact with tickets directly, gi...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3952&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>143</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-30</video:publication_date>
<video:tag>Customer Story</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>IT Service Management</video:tag>
<video:tag>PSA platform selection</video:tag>
<video:tag>MSP operations</video:tag>
<video:tag>client onboarding</video:tag>
<video:tag>ticketing systems</video:tag>
<video:tag>RMM documentation</video:tag>
<video:tag>customer portals</video:tag>
<video:tag>IT service management</video:tag>
<video:tag>platform evaluation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3953/stormagic-svkms-encryption-key-management-overview/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3953_1774909176_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[StorMagic SvKMS: Encryption Key Management Overview]]></video:title>
<video:description><![CDATA[TL;DR StorMagic SvKMS is a software-based KMIP-compliant key management system designed for distributed, edge, and hybrid cloud environments. The solution enables bring-your-own-key (BYOK) capabilities, allowing organizations to maintain control over e...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3953&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>223</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-30</video:publication_date>
<video:tag>Data Privacy</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Encryption Key Management</video:tag>
<video:tag>KMIP Protocol</video:tag>
<video:tag>Bring Your Own Key</video:tag>
<video:tag>BYOK</video:tag>
<video:tag>Edge Computing Security</video:tag>
<video:tag>Hybrid Cloud Security</video:tag>
<video:tag>Software-Based Key Management</video:tag>
<video:tag>Distributed Architecture</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3936/detecting-and-fixing-cloud-configuration-drift/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3936_1774783585_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Firefly.ai: Detecting and Fixing Cloud Configuration Drift]]></video:title>
<video:description><![CDATA[TL;DR Configuration drift occurs when production infrastructure silently diverges from IaC definitions, causing outages, security risks, and unexpected costs without any deliberate changes being made. Traditional drift management relies on manual plan-...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3936&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>75</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-29</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>DevSecOps</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Short Form</video:tag>
<video:tag>Configuration Drift</video:tag>
<video:tag>Infrastructure as Code</video:tag>
<video:tag>Cloud Infrastructure Management</video:tag>
<video:tag>Multi-Cloud Operations</video:tag>
<video:tag>DevOps Automation</video:tag>
<video:tag>GitOps</video:tag>
<video:tag>Infrastructure Monitoring</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3937/removing-local-admin-rights-with-least-privilege-manager/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3937_1774783586_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Netwrix: Removing Local Admin Rights with Least Privilege Manager]]></video:title>
<video:description><![CDATA[TL;DR Netwrix Least Privilege Manager enables organizations to remove local admin rights from endpoints while allowing users to perform necessary tasks through policy-based elevation controls. Administrators can create granular rules based on file path...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3937&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>143</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-29</video:publication_date>
<video:tag>Endpoint Management</video:tag>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Zero Trust</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Least Privilege Access</video:tag>
<video:tag>Endpoint Security</video:tag>
<video:tag>Privileged Access Management</video:tag>
<video:tag>Local Admin Rights Removal</video:tag>
<video:tag>User Access Control</video:tag>
<video:tag>Policy-Based Elevation</video:tag>
<video:tag>Driver Management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3938/onapsis-at-sapinsider-2025-cybersecurity-for-sap/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3938_1774783588_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Onapsis at SAPinsider 2025: Cybersecurity for SAP]]></video:title>
<video:description><![CDATA[TL;DR Onapsis will be at SAPinsider Las Vegas 2025 (booth 1415) showcasing cybersecurity and compliance solutions for SAP environments, with focus on RISE with SAP HANA Cloud transformations. The conference will feature the unveiling of Cybersecurity f...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3938&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>74</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-29</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Application Security</video:tag>
<video:tag>Event Recap</video:tag>
<video:tag>SAP Security</video:tag>
<video:tag>Cybersecurity</video:tag>
<video:tag>Compliance</video:tag>
<video:tag>RISE with SAP</video:tag>
<video:tag>HANA Cloud</video:tag>
<video:tag>Conference Announcement</video:tag>
<video:tag>Thought Leadership</video:tag>
<video:tag>Book Launch</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3939/40-years-in-msps-mastering-m-a-strategy-with-neil-medwed/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3939_1774783590_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Kaseya: 40 Years in MSPs: Mastering M&amp;A Strategy with Neil Medwed]]></video:title>
<video:description><![CDATA[TL;DR Neil Medwed built and sold his MSP after 26.5 years, then led 11 acquisitions for Meriplex, learning more about business operations in four years of M&amp;A than in decades of ownership. Successful acquirers like Meriplex target profitable, growing M...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3939&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2332</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-29</video:publication_date>
<video:tag>Best Practices</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>MSP Mergers and Acquisitions</video:tag>
<video:tag>Business Exit Strategy</video:tag>
<video:tag>Data-Driven Management</video:tag>
<video:tag>Platform Company Integration</video:tag>
<video:tag>MSP Financial Preparation</video:tag>
<video:tag>Cultural Fit in M&amp;A</video:tag>
<video:tag>Employee Career Development</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3940/ai-powered-sql-query-optimization-in-sql-sentry/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3940_1774783592_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Solarwinds: AI-Powered SQL Query Optimization in SQL Sentry]]></video:title>
<video:description><![CDATA[TL;DR AI Query Assist in SQL Sentry uses generative AI to automatically rewrite inefficient SQL Server queries and suggest missing indexes in about one minute The system sanitizes query text and execution plans locally before sending to the AI engine, ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3940&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>182</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-29</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>SQL query optimization</video:tag>
<video:tag>generative AI for database performance</video:tag>
<video:tag>SQL Server tuning</video:tag>
<video:tag>automated index recommendations</video:tag>
<video:tag>database performance monitoring</video:tag>
<video:tag>query rewriting techniques</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3941/visualizing-risky-access-paths-in-identity-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3941_1774783593_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Saviynt: Visualizing Risky Access Paths in Identity Security]]></video:title>
<video:description><![CDATA[TL;DR Saviynt ISPM provides visual mapping of complete access paths from identity through accounts and entitlements to assets, reducing noise in complex identity ecosystems. The platform distinguishes between inherited access (from groups/roles) and de...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3941&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>153</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-29</video:publication_date>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Identity Security Posture Management</video:tag>
<video:tag>Access Path Visualization</video:tag>
<video:tag>Privilege Access Management</video:tag>
<video:tag>Identity Governance</video:tag>
<video:tag>Risk-Based Access Control</video:tag>
<video:tag>SOD Violations</video:tag>
<video:tag>Peer Access Analytics</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3942/how-liongard-improved-msp-ticket-resolution-efficiency/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3942_1774783595_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How Liongard Improved MSP Ticket Resolution Efficiency]]></video:title>
<video:description><![CDATA[TL;DR MSP struggled with efficiently distributing client infrastructure information to technical teams, impacting response times and operational efficiency Liongard automatically populates IT documentation systems with current client environment data, ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3942&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>66</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-29</video:publication_date>
<video:tag>Customer Story</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>MSP Operations</video:tag>
<video:tag>IT Documentation</video:tag>
<video:tag>Infrastructure Visibility</video:tag>
<video:tag>Ticket Management</video:tag>
<video:tag>Operational Efficiency</video:tag>
<video:tag>Client Environment Management</video:tag>
<video:tag>Incident Response</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3943/tfsec-security-scanner-for-terraform-features-examples/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3943_1774783756_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[tfsec Security Scanner for Terraform: Features &amp; Examples]]></video:title>
<video:description><![CDATA[TL;DR tfsec is an open-source security scanner for Terraform that performs static analysis to detect misconfigurations and security risks without requiring API access or external services The tool provides built-in policies with severity classification...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3943&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>332</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-29</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>DevSecOps</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Infrastructure as Code Security</video:tag>
<video:tag>Terraform Security Scanning</video:tag>
<video:tag>Static Code Analysis</video:tag>
<video:tag>Security Policy Enforcement</video:tag>
<video:tag>Cloud Security Misconfiguration Detection</video:tag>
<video:tag>PCI Compliance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3934/european-it-challenges-sovereignty-security-cloud/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3934_1774730255_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Nutanix: European IT Challenges: Sovereignty, Security &amp; Cloud]]></video:title>
<video:description><![CDATA[TL;DR European cybersecurity regulations create operational complexity with each country requiring separate certifications, increasing costs and administrative burden for cross-border service providers despite some equivalence frameworks. France trails...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3934&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>476</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-28</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Customer Story</video:tag>
<video:tag>Interview</video:tag>
<video:tag>European cybersecurity regulations</video:tag>
<video:tag>Cloud adoption in France</video:tag>
<video:tag>Hybrid cloud architecture</video:tag>
<video:tag>Managed service providers</video:tag>
<video:tag>Hyper-converged infrastructure</video:tag>
<video:tag>Data center sustainability</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3935/federal-agencies-shift-to-private-cloud-cost-complexity-compliance/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3935_1774730257_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[VMware: Federal Agencies Shift to Private Cloud: Cost, Complexity &amp; Compliance]]></video:title>
<video:description><![CDATA[TL;DR Federal agencies are experiencing a cloud reset as they shift from public to private cloud infrastructure after fifteen years of public cloud adoption. The transition is driven by three critical factors: public cloud costs exceeding expectations,...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3935&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>69</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-28</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Thought Leadership</video:tag>
<video:tag>Private Cloud</video:tag>
<video:tag>Federal IT</video:tag>
<video:tag>Cloud Migration</video:tag>
<video:tag>Public Cloud Challenges</video:tag>
<video:tag>Compliance</video:tag>
<video:tag>Cost Management</video:tag>
<video:tag>VMware Solutions</video:tag>
<video:tag>Government Technology</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3933/how-to-add-accounts-account-groups-in-pam-essentials/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3933_1774729967_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[One Identity: How to Add Accounts &amp; Account Groups in PAM Essentials]]></video:title>
<video:description><![CDATA[TL;DR Account groups in PAM Essentials organize privileged accounts hierarchically, similar to how asset groups organize infrastructure assets Adding accounts requires selecting the account type (local or domain), specifying the parent asset, and enter...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3933&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>65</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-28</video:publication_date>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Privileged Access Management</video:tag>
<video:tag>Account Management</video:tag>
<video:tag>PAM Configuration</video:tag>
<video:tag>Identity Governance</video:tag>
<video:tag>Access Control</video:tag>
<video:tag>Credential Management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3929/detecting-pass-the-hash-attacks-with-log360/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3929_1774560242_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[ManageEngine: Detecting Pass-the-Hash Attacks with Log360]]></video:title>
<video:description><![CDATA[TL;DR Pass-the-Hash attacks exploit NTLM protocol to authenticate using stolen password hashes instead of plaintext passwords, enabling attackers to maintain persistent access until passwords are reset. Log360 provides MITRE ATT&amp;CK-aligned detection re...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3929&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>344</video:duration>
<video:view_count>41</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Pass-the-Hash attacks</video:tag>
<video:tag>NTLM protocol exploitation</video:tag>
<video:tag>credential theft detection</video:tag>
<video:tag>SIEM threat detection</video:tag>
<video:tag>MITRE ATT&amp;CK framework</video:tag>
<video:tag>lateral movement prevention</video:tag>
<video:tag>SOAR automation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3930/deploying-generative-ai-models-on-amazon-eks-with-terraform/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3930_1774560312_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[HashiCorp: Deploying Generative AI Models on Amazon EKS with Terraform]]></video:title>
<video:description><![CDATA[TL;DR HashiCorp demonstrates deploying generative AI models on Amazon EKS using Terraform and the JARK stack (JupyterHub, Argo, Ray, Kubernetes) to address scaling, performance, and cost challenges of GPU-based AI workloads The architecture uses EKS ma...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3930&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1564</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>DevSecOps</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Generative AI deployment</video:tag>
<video:tag>Amazon EKS</video:tag>
<video:tag>HashiCorp Terraform</video:tag>
<video:tag>JARK stack</video:tag>
<video:tag>Stable Diffusion</video:tag>
<video:tag>GPU autoscaling</video:tag>
<video:tag>Foundation models</video:tag>
<video:tag>Infrastructure as code</video:tag>
<video:tag>Kubernetes for ML</video:tag>
<video:tag>Distributed training</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3919/forescout-eyesentry-cloud-managed-edge-visibility/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3919_1774559636_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Forescout eyeSentry: Cloud-Managed Edge Visibility]]></video:title>
<video:description><![CDATA[TL;DR Forescout eyeSentry is a new cloud-managed solution providing real-time visibility, compliance, and risk management across distributed environments including remote branches, retail stores, and edge sites. The platform monitors both IP-based asse...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3919&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>84</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>OT</video:tag>
<video:tag>IoT Security</video:tag>
<video:tag>Network Security</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Asset Visibility</video:tag>
<video:tag>Edge Computing Security</video:tag>
<video:tag>Cloud-Managed Security</video:tag>
<video:tag>OT</video:tag>
<video:tag>IoT Monitoring</video:tag>
<video:tag>Device Discovery</video:tag>
<video:tag>Compliance Management</video:tag>
<video:tag>Risk Assessment</video:tag>
<video:tag>Distributed Environment Management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3920/people-face-detection-in-forticamera-cloud/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3920_1774559637_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[People &amp; Face Detection in FortiCamera Cloud]]></video:title>
<video:description><![CDATA[TL;DR FortiCamera Cloud provides people counting analytics using configurable crossing lines to track occupancy levels and entry/exit patterns at monitored locations Advanced search filters enable identification of individuals based on physical attribu...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3920&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>164</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>Physical Security</video:tag>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Video surveillance analytics</video:tag>
<video:tag>People counting and occupancy tracking</video:tag>
<video:tag>Face detection and recognition</video:tag>
<video:tag>Physical security monitoring</video:tag>
<video:tag>Multi-camera tracking systems</video:tag>
<video:tag>Attribute-based video search</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3921/ruggedized-hardware-high-availability-at-the-edge/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3921_1774559873_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[StorMagic: Ruggedized Hardware &amp; High Availability at the Edge]]></video:title>
<video:description><![CDATA[TL;DR SNUC Systems specializes in ruggedized, fanless edge compute platforms designed for extreme environments (-40°C to 80°C), addressing the shift from data collection to real-time decision-making at distributed sites across industries including defe...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3921&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1502</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>Edge Computing</video:tag>
<video:tag>Hardware Infrastructure</video:tag>
<video:tag>High Availability</video:tag>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Ruggedized Hardware</video:tag>
<video:tag>AI at the Edge</video:tag>
<video:tag>Remote Management</video:tag>
<video:tag>Hyper-Converged Infrastructure</video:tag>
<video:tag>Extreme Edge Environments</video:tag>
<video:tag>Hardware Supply Chain</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3922/sap-security-patch-analysis-ransomware-threat-update/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3922_1774559965_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[SAP Security Patch Analysis &amp; Ransomware Threat Update]]></video:title>
<video:description><![CDATA[TL;DR SAP&#039;s March Patch Tuesday addressed 12 security notes including a critical code injection vulnerability (CVSS 9.1) in NetWeaver Java&#039;s log viewer and a library vulnerability (CVSS 9.4) affecting SAP Build Apps requiring application rebuilds Org...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3922&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>965</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>Application Security</video:tag>
<video:tag>Vulnerability Management</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>SAP Security Patches</video:tag>
<video:tag>SAP NetWeaver Java</video:tag>
<video:tag>Code Injection Vulnerabilities</video:tag>
<video:tag>Phishing Attacks</video:tag>
<video:tag>Open Redirect Exploits</video:tag>
<video:tag>Ransomware Operations</video:tag>
<video:tag>Penetration Testing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3923/how-to-future-proof-your-dspm-investment/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3923_1774559643_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[BigID: How to Future-Proof Your DSPM Investment]]></video:title>
<video:description><![CDATA[TL;DR Evaluate DSPM solutions based on their ability to evolve into a full data security platform, not just current feature needs. Capabilities like access governance, data lifecycle management, and privacy reporting may not be urgent today but provide...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3923&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>88</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Data Privacy</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Webinar</video:tag>
<video:tag>Data Security Posture Management</video:tag>
<video:tag>Data Security Platform</video:tag>
<video:tag>Vendor Selection</video:tag>
<video:tag>Data Lifecycle Management</video:tag>
<video:tag>Data Access Governance</video:tag>
<video:tag>Cloud DLP</video:tag>
<video:tag>Privacy Compliance</video:tag>
<video:tag>Data Subject Requests</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3924/ai-driven-service-automation-with-ivanti-neurons/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3924_1774559644_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[AI-Driven Service Automation with Ivanti Neurons]]></video:title>
<video:description><![CDATA[TL;DR Ivanti Neurons healing bots proactively detect and fix endpoint issues before users report them, addressing the estimated 50% of incidents that go unreported because users tolerate poor performance. Post-ticket automation enables service desk ana...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3924&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>775</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Endpoint Management</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>AI-driven IT service automation</video:tag>
<video:tag>Proactive endpoint management</video:tag>
<video:tag>Incident correlation and clustering</video:tag>
<video:tag>Service desk efficiency optimization</video:tag>
<video:tag>Real-time fleet diagnostics</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3925/next-gen-dlp-ai-blocking-data-ownership-strategies/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3925_1774559646_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Next-Gen DLP: AI, Blocking &amp; Data Ownership Strategies]]></video:title>
<video:description><![CDATA[TL;DR Legacy DLP fails because it provides visibility without actionable outcomes, while organizations continue hoarding data they cannot effectively manage or protect. Identity compromise is the primary attack vector—once attackers gain privileged acc...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3925&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1365</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Panel</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Data Loss Prevention</video:tag>
<video:tag>Data Retention Policy</video:tag>
<video:tag>Data Ownership</video:tag>
<video:tag>Identity-Based Attacks</video:tag>
<video:tag>Least Privilege Access</video:tag>
<video:tag>AI in Security</video:tag>
<video:tag>User Behavior Analytics</video:tag>
<video:tag>Security Culture</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3926/cyera-s-400m-series-f-scaling-data-ai-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3926_1774559648_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cyera&#039;s $400M Series F: Scaling Data &amp; AI Security]]></video:title>
<video:description><![CDATA[TL;DR Cyera raised $400 million in Series F funding at a $9 billion valuation, tripling its valuation from a year ago, with plans to invest heavily in product development for data and AI security. The company positions itself as enabling enterprises to...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3926&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>292</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Data Privacy</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Data Security</video:tag>
<video:tag>AI Security</video:tag>
<video:tag>Enterprise AI Adoption</video:tag>
<video:tag>Venture Funding</video:tag>
<video:tag>Cybersecurity</video:tag>
<video:tag>Data Governance</video:tag>
<video:tag>AI Risk Management</video:tag>
<video:tag>International Expansion</video:tag>
<video:tag>Product Development Strategy</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3927/how-ai-transforms-data-discovery-and-classification/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3927_1774559650_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How AI Transforms Data Discovery and Classification]]></video:title>
<video:description><![CDATA[TL;DR AI has unlocked the ability to scale data discovery while providing contextual understanding that traditional classification methods could never achieve. Modern enterprises create new categories of data constantly, and AI can trace data lineage t...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3927&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>213</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>Data Privacy</video:tag>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Interview</video:tag>
<video:tag>AI-powered data discovery</video:tag>
<video:tag>Data classification</video:tag>
<video:tag>Data security posture</video:tag>
<video:tag>Sensitive data identification</video:tag>
<video:tag>Data lineage tracing</video:tag>
<video:tag>Security resource optimization</video:tag>
<video:tag>Data governance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3928/indonesian-partner-on-sangfor-s-cybersecurity-solutions/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3928_1774560095_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Indonesian Partner on Sangfor&#039;s Cybersecurity Solutions]]></video:title>
<video:description><![CDATA[TL;DR PT Wiraarta Telematika has partnered with Sangfor for over five years, choosing the vendor for its comprehensive end-to-end cybersecurity solutions covering endpoint to enterprise security. Cybersecurity has become a critical priority in Indonesi...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3928&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>101</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>Customer Story</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Endpoint Management</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Partner testimonial</video:tag>
<video:tag>Cybersecurity solutions</video:tag>
<video:tag>End-to-end security</video:tag>
<video:tag>Indonesian market</video:tag>
<video:tag>Channel partnership</video:tag>
<video:tag>Technical support</video:tag>
<video:tag>Partner enablement</video:tag>
<video:tag>Technology transfer</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3917/automated-threat-hunting-in-cohesity-alta-view/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3917_1774559042_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Automated Threat Hunting in Cohesity Alta View]]></video:title>
<video:description><![CDATA[TL;DR Cohesity Alta View automates threat hunting in backups using hash-based detection integrated with CISA and Malware Bazaar feeds, plus AI-powered entropy analysis to identify unknown ransomware variants The Cyber Resiliency Dashboard provides risk...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3917&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>406</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-26</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Threat Hunting</video:tag>
<video:tag>Malware Detection</video:tag>
<video:tag>Ransomware Protection</video:tag>
<video:tag>Cyber Recovery</video:tag>
<video:tag>Backup Security</video:tag>
<video:tag>Hash-Based Detection</video:tag>
<video:tag>Entropy Analysis</video:tag>
<video:tag>Threat Intelligence Integration</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3915/why-ai-is-finally-making-data-security-manageable/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3915_1774442314_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Why AI Is Finally Making Data Security Manageable]]></video:title>
<video:description><![CDATA[TL;DR Data security has been cybersecurity&#039;s least mature discipline despite data being the primary target for attackers and the lifeblood of modern organizations. The combination of cloud computing power, API accessibility, and AI classification capa...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3915&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>240</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-25</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Zero Trust</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Interview</video:tag>
<video:tag>Data Security</video:tag>
<video:tag>AI-Powered Classification</video:tag>
<video:tag>Data Lifecycle Management</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Data Discovery</video:tag>
<video:tag>Risk Management</video:tag>
<video:tag>Data Governance</video:tag>
<video:tag>Information Security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3916/zero-trust-security-for-german-public-sector-organizations/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3916_1774442316_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Zero Trust Security for German Public Sector Organizations]]></video:title>
<video:description><![CDATA[TL;DR German public institutions face heightened cyber risk from outdated infrastructure, legacy VPN/VDI access methods, and unpatched IoT/OT devices that create persistent attack surfaces. Zscaler&#039;s Zero Trust Exchange eliminates internet-exposed acc...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3916&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>423</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2026-03-25</video:publication_date>
<video:tag>Zero Trust</video:tag>
<video:tag>Network Security</video:tag>
<video:tag>OT</video:tag>
<video:tag>IoT Security</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>SASE</video:tag>
<video:tag>SSE</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Zero Trust Architecture</video:tag>
<video:tag>Public Sector Cybersecurity</video:tag>
<video:tag>Network Segmentation</video:tag>
<video:tag>IoT</video:tag>
<video:tag>OT Security</video:tag>
<video:tag>Legacy Infrastructure Modernization</video:tag>
<video:tag>VPN Replacement</video:tag>
<video:tag>Cloud Security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3914/reducing-it-costs-with-autonomous-endpoint-management/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3914_1774441395_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Reducing IT Costs with Autonomous Endpoint Management]]></video:title>
<video:description><![CDATA[TL;DR Manual endpoint management tasks like patching, policy deployment, and compliance monitoring represent the largest IT spending category for most organizations. Autonomous endpoint management uses AI and machine learning to automate device provisi...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3914&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>140</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-25</video:publication_date>
<video:tag>Endpoint Management</video:tag>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Autonomous Endpoint Management</video:tag>
<video:tag>IT Cost Optimization</video:tag>
<video:tag>AI-Driven Automation</video:tag>
<video:tag>Zero-Touch Provisioning</video:tag>
<video:tag>Compliance Monitoring</video:tag>
<video:tag>Threat Detection and Response</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3904/unified-backup-rapid-recovery-for-every-workload/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3904_1774437264_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Unified Backup &amp; Rapid Recovery for Every Workload]]></video:title>
<video:description><![CDATA[TL;DR Cohesity DataProtect as a Service unifies backup and recovery across all workloads (Microsoft 365, VMware, Salesforce, databases) under a single SaaS platform, eliminating the operational complexity of managing siloed backup tools. Security is bu...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3904&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>232</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-25</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Backup and Recovery</video:tag>
<video:tag>Ransomware Protection</video:tag>
<video:tag>Cyber Resilience</video:tag>
<video:tag>Data Protection as a Service</video:tag>
<video:tag>Hybrid Cloud Backup</video:tag>
<video:tag>Immutable Backups</video:tag>
<video:tag>Multi-Cloud Data Management</video:tag>
<video:tag>VMware Protection</video:tag>
<video:tag>Microsoft 365 Backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3896/managing-browser-zero-days-continuous-updates/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3896_1774049561_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Ivanti: Managing Browser Zero Days &amp; Continuous Updates]]></video:title>
<video:description><![CDATA[TL;DR Google Chrome zero-day vulnerability patched June 30th required immediate Chrome and Edge updates ahead of July Patch Tuesday Five-week period between May and June Patch Tuesday saw intense back-to-back browser updates including multiple Chrome z...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3896&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>239</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Vulnerability Management</video:tag>
<video:tag>Endpoint Management</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Webinar</video:tag>
<video:tag>Zero-day vulnerabilities</video:tag>
<video:tag>Browser security</video:tag>
<video:tag>Patch management</video:tag>
<video:tag>Google Chrome updates</video:tag>
<video:tag>Microsoft Edge updates</video:tag>
<video:tag>Continuous release cycles</video:tag>
<video:tag>Third-party application patching</video:tag>
<video:tag>Security remediation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3897/securing-ai-data-access-in-aws-bedrock-with-zscaler-dspm/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3897_1774049563_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Securing AI Data Access in AWS Bedrock with Zscaler DSPM]]></video:title>
<video:description><![CDATA[TL;DR RAG-based AI applications can inadvertently expose sensitive data when knowledge bases include documents beyond their intended scope, allowing prompt injection attacks to extract confidential information. Zscaler DSPM maps the complete access pat...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3897&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>443</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Data Security Posture Management</video:tag>
<video:tag>AI Security</video:tag>
<video:tag>AWS Bedrock</video:tag>
<video:tag>Retrieval Augmented Generation</video:tag>
<video:tag>Prompt Injection</video:tag>
<video:tag>Large Language Models</video:tag>
<video:tag>Knowledge Base Security</video:tag>
<video:tag>Shadow AI</video:tag>
<video:tag>GLBA Compliance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3890/fortipam-integration-with-fortiauthenticator-fortiidentity/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3890_1774049341_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[FortiPAM Integration with FortiAuthenticator &amp; FortiIdentity]]></video:title>
<video:description><![CDATA[TL;DR FortiPAM integrates with FortiAuthenticator Cloud and FortiIdentity Cloud to provide unified privileged access management with MFA enforcement across internal and remote users The solution supports authentication through multiple identity provide...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3890&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>590</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Zero Trust</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Privileged Access Management</video:tag>
<video:tag>Identity and Access Management</video:tag>
<video:tag>Multi-Factor Authentication</video:tag>
<video:tag>SAML Integration</video:tag>
<video:tag>RADIUS Authentication</video:tag>
<video:tag>Session Recording</video:tag>
<video:tag>Zero Trust Network Access</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3891/2025-state-of-ot-and-cybersecurity-report-key-findings/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3891_1774049343_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Fortinet 2025 State of OT/ICS Report Key Findings]]></video:title>
<video:description><![CDATA[TL;DR Fortinet&#039;s 2025 report surveys over 550 OT professionals worldwide to assess the current state of operational technology cybersecurity. The research examines how organizations are maturing their security strategies to address OT-specific threats...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3891&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>62</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>OT</video:tag>
<video:tag>IoT Security</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Operational Technology Security</video:tag>
<video:tag>OT Cybersecurity</video:tag>
<video:tag>Industrial Control Systems</video:tag>
<video:tag>Critical Infrastructure Protection</video:tag>
<video:tag>IT</video:tag>
<video:tag>OT Convergence</video:tag>
<video:tag>Security Maturity Assessment</video:tag>
<video:tag>Threat Landscape</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3892/april-2025-patch-tuesday-zero-day-ransomware-121-cves/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3892_1774049345_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Ivanti: Zero-Day Ransomware &amp; 121 CVEs]]></video:title>
<video:description><![CDATA[TL;DR Microsoft&#039;s April 2025 Patch Tuesday resolves 121 CVEs, including one zero-day (CVE-2025-29824) actively exploited by Storm2460 ransomware campaigns using PipeMagic malware High-risk LDAP and RDP vulnerabilities in the Windows OS update require ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3892&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2360</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Vulnerability Management</video:tag>
<video:tag>Webinar</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Patch Tuesday</video:tag>
<video:tag>Zero-Day Vulnerabilities</video:tag>
<video:tag>Ransomware</video:tag>
<video:tag>Windows Security Updates</video:tag>
<video:tag>Browser Security</video:tag>
<video:tag>LDAP Vulnerabilities</video:tag>
<video:tag>RDP Security</video:tag>
<video:tag>Windows 10 End-of-Life</video:tag>
<video:tag>Apple Security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3894/enterprise-ai-security-and-data-protection-strategies/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3894_1774049349_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cyera: Enterprise AI Security and Data Protection Strategies]]></video:title>
<video:description><![CDATA[TL;DR AI Guardian extends Cyera&#039;s data intelligence platform to provide comprehensive AI security posture management and runtime protection for enterprise environments. Data and identity have been historically unsolved &#039;orphan security programs&#039; tha...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3894&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>663</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Interview</video:tag>
<video:tag>AI security posture management</video:tag>
<video:tag>data-centric security</video:tag>
<video:tag>identity and access management</video:tag>
<video:tag>agentic AI security</video:tag>
<video:tag>runtime protection</video:tag>
<video:tag>shadow AI discovery</video:tag>
<video:tag>enterprise AI governance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3895/cloud-security-insights-from-microsoft-israel-s-cto/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3895_1774049350_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Varonis: Cloud Security Insights from Microsoft Israel&#039;s CTO]]></video:title>
<video:description><![CDATA[TL;DR Cloud security requires understanding the shared responsibility model—organizations cannot simply replicate on-premises security approaches when migrating to public cloud environments. AI-enabled attacks and data poisoning represent the most conc...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3895&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>942</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Interview</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Shared Responsibility Model</video:tag>
<video:tag>AI-Enabled Attacks</video:tag>
<video:tag>Data Poisoning</video:tag>
<video:tag>Nation-State Threats</video:tag>
<video:tag>Multi-Factor Authentication</video:tag>
<video:tag>Security Hygiene</video:tag>
<video:tag>Patch Management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3886/securing-ai-adoption-visibility-and-data-loss-prevention/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3886_1774049276_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Zscaler: Securing AI Adoption: Visibility and Data Loss Prevention]]></video:title>
<video:description><![CDATA[TL;DR AI is amplifying attack complexity and speed, creating significant new challenges for security defenders who must adapt their strategies accordingly. Generative AI tools like ChatGPT introduced immediate shadow IT concerns when employees began us...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3886&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>68</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Data Privacy</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Customer Story</video:tag>
<video:tag>Generative AI security</video:tag>
<video:tag>Data loss prevention</video:tag>
<video:tag>AI-powered attacks</video:tag>
<video:tag>Shadow IT visibility</video:tag>
<video:tag>ChatGPT governance</video:tag>
<video:tag>Zero trust security</video:tag>
<video:tag>Attack surface management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3873/hackerone-what-color-hat-does-your-ai-wear/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3873_1774042567_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[HackerOne: What Color Hat Does Your AI Wear?]]></video:title>
<video:description><![CDATA[In this inBrief chat, Mike Matchett speaks with Laurie Mercer of HackerOne about how AI is reshaping both attack and defense strategies in cybersecurity.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3873&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1009</video:duration>
<video:live>no</video:live>
<video:view_count>38</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>inBrief</video:tag>
<video:tag>Matchett</video:tag>
<video:tag>HackerOne</video:tag>
<video:tag>AI security</video:tag>
<video:tag>bug bounty</video:tag>
<video:tag>red teaming</video:tag>
<video:tag>vulnerability testing</video:tag>
<video:tag>prompt injection</video:tag>
<video:tag>data leakage</video:tag>
<video:tag>ethical hacking</video:tag>
<video:tag>AI risk</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>application security</video:tag>
<video:tag>threat modeling</video:tag>
<video:tag>secure AI</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3871/threat-protection-clean-data-recovery-with-cohesity/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3871_1774040633_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Threat Protection &amp; Clean Data Recovery with Cohesity]]></video:title>
<video:description><![CDATA[TL;DR Cyberattack dwell time has decreased to as little as one hour, but organizations take days or weeks to detect threats, creating a critical need to scan backup data for hidden malware that evades primary detection systems. Cohesity&#039;s threat prote...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3871&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>428</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Backup Data Threat Scanning</video:tag>
<video:tag>Cyber Resilience</video:tag>
<video:tag>Malware Detection</video:tag>
<video:tag>Threat Intelligence Integration</video:tag>
<video:tag>Clean Data Recovery</video:tag>
<video:tag>Incident Response</video:tag>
<video:tag>Hash-Based File Analysis</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3861/cohesity-red-hat-partnership-for-cyber-resilience/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3861_1774040597_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cohesity &amp; Red Hat Partnership for Cyber Resilience]]></video:title>
<video:description><![CDATA[TL;DR Cohesity and Red Hat have expanded their partnership to deliver integrated data protection and cyber resilience for hybrid cloud, virtualization, and container environments running on OpenShift. Over 50% of Cohesity customers now leverage Red Hat...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3861&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>487</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Zero Trust</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Partnership Announcement</video:tag>
<video:tag>Cyber Resilience</video:tag>
<video:tag>Hybrid Cloud</video:tag>
<video:tag>OpenShift Virtualization</video:tag>
<video:tag>Zero Trust Security</video:tag>
<video:tag>Container Security</video:tag>
<video:tag>Enterprise Backup</video:tag>
<video:tag>Strategic Partnerships</video:tag>
<video:tag>Mergers &amp; Acquisitions</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3862/security-visibility-with-veeam-and-crowdstrike-integration/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3862_1774040599_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Security Visibility with Veeam and CrowdStrike Integration]]></video:title>
<video:description><![CDATA[TL;DR Veeam and CrowdStrike have partnered to integrate backup security events into security operations workflows, addressing the critical gap where 89% of ransomware attacks target backup repositories but IT and security teams often operate in silos. ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3862&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3011</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Webinar</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Ransomware Recovery</video:tag>
<video:tag>Backup Security</video:tag>
<video:tag>SIEM Integration</video:tag>
<video:tag>Threat Detection</video:tag>
<video:tag>IT-Security Alignment</video:tag>
<video:tag>Data Resilience</video:tag>
<video:tag>Incident Response</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3863/recovery-best-practices-from-ransomware-survivors/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3863_1774040601_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Recovery Best Practices from Ransomware Survivors]]></video:title>
<video:description><![CDATA[TL;DR Organizations that successfully recover from ransomware consistently verify backups, ensure copies are clean before restore, maintain alternate infrastructure, and have isolation plans in place The 3-2-1-1-0 rule remains critical: three data copi...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3863&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>323</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Webinar Clip</video:tag>
<video:tag>ransomware recovery</video:tag>
<video:tag>backup verification</video:tag>
<video:tag>3-2-1-1-0 rule</video:tag>
<video:tag>incident response planning</video:tag>
<video:tag>alternate infrastructure</video:tag>
<video:tag>immutable backups</video:tag>
<video:tag>crisis management</video:tag>
<video:tag>law enforcement coordination</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3864/post-quantum-cryptography-preparing-for-the-quantum-threat/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3864_1774040602_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Post-Quantum Cryptography: Preparing for the Quantum Threat]]></video:title>
<video:description><![CDATA[TL;DR Post-quantum cryptography is an accelerated threat arriving in 5-10 years, yet most organizations haven&#039;t begun planning for quantum-resistant security despite active cyber-resilience initiatives. Crypto agility—the ability to quickly switch bet...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3864&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>363</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Post-Quantum Cryptography</video:tag>
<video:tag>Crypto Agility</video:tag>
<video:tag>Quantum Computing Threats</video:tag>
<video:tag>Data Classification</video:tag>
<video:tag>Hybrid Cryptographic Architecture</video:tag>
<video:tag>NIST Standards</video:tag>
<video:tag>Cyber Resilience</video:tag>
<video:tag>Encryption Performance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3865/how-monday-com-built-gdpr-compliant-data-infrastructure-in-two-weeks/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3865_1774040604_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How monday.com Built GDPR-Compliant Data Infrastructure in Two Weeks]]></video:title>
<video:description><![CDATA[TL;DR Monday.com deployed a fully GDPR-compliant European data warehouse in under two weeks using Snowflake, Satori, and Terraform, demonstrating that speed and compliance can coexist with proper tooling and architecture. Modern data security requires ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3865&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>885</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>GDPR Compliance</video:tag>
<video:tag>Data Security</video:tag>
<video:tag>Data Governance</video:tag>
<video:tag>Infrastructure as Code</video:tag>
<video:tag>Terraform</video:tag>
<video:tag>Snowflake</video:tag>
<video:tag>Access Control</video:tag>
<video:tag>AI Readiness</video:tag>
<video:tag>Data Warehouse Architecture</video:tag>
<video:tag>Enterprise Data Management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3866/cewa-protects-90k-m365-users-with-veeam-data-cloud/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3866_1774040606_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[CEWA Protects 90K M365 Users with Veeam Data Cloud]]></video:title>
<video:description><![CDATA[TL;DR CEWA deployed Veeam Data Cloud to protect over a petabyte of Microsoft 365 data across 162 Catholic schools, 12,000 staff, and 81,000 students in Western Australia. Implementation was completed in just 40 minutes, far exceeding expectations for a...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3866&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>186</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Customer Story</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Microsoft 365 backup</video:tag>
<video:tag>Education sector data protection</video:tag>
<video:tag>Cloud-first strategy</video:tag>
<video:tag>Australian regulatory compliance</video:tag>
<video:tag>Essential 8 framework</video:tag>
<video:tag>Role-based access control</video:tag>
<video:tag>SaaS backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3867/veeam-data-cloud-h2-2025-updates-new-features/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3867_1774040608_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Veeam Data Cloud H2 2025 Updates &amp; New Features]]></video:title>
<video:description><![CDATA[TL;DR Unified dashboard provides multi-tenant, multi-workload visibility with comprehensive audit logging for security monitoring and compliance tracking across the Veeam Data Cloud platform. Microsoft 365 protection expands to 23 global regions with n...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3867&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>653</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Product Update</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Veeam Data Cloud</video:tag>
<video:tag>Microsoft 365 Backup</video:tag>
<video:tag>Entra ID Protection</video:tag>
<video:tag>Multi-Tenant Management</video:tag>
<video:tag>SaaS Data Protection</video:tag>
<video:tag>Intune Policy Backup</video:tag>
<video:tag>Multi-Geo Compliance</video:tag>
<video:tag>Cloud Backup Dashboard</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3868/why-clean-recovery-planning-happens-before-the-crisis/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3868_1774040609_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Why Clean Recovery Planning Happens Before the Crisis]]></video:title>
<video:description><![CDATA[TL;DR Recovery success depends on people, process, and technology working together, with many organizations over-focusing on backup technology while neglecting the human and procedural elements that determine real-world outcomes. Building muscle memory...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3868&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>328</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>disaster recovery planning</video:tag>
<video:tag>clean recovery</video:tag>
<video:tag>incident response</video:tag>
<video:tag>tabletop exercises</video:tag>
<video:tag>business continuity</video:tag>
<video:tag>ransomware preparedness</video:tag>
<video:tag>IT operations resilience</video:tag>
<video:tag>cross-functional alignment</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3869/identifying-disk-bottlenecks-with-cvdiskperf/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3869_1774040611_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Identifying Disk Bottlenecks with CVDiskPerf]]></video:title>
<video:description><![CDATA[TL;DR Use Commvault Command Center job details to analyze throughput performance across read, write, DDB, and network categories to identify where bottlenecks originate in your backup environment. High read percentages in job metrics indicate client-si...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3869&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>198</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Disk Performance Testing</video:tag>
<video:tag>Backup Troubleshooting</video:tag>
<video:tag>CVDiskPerf</video:tag>
<video:tag>Throughput Analysis</video:tag>
<video:tag>Storage Optimization</video:tag>
<video:tag>Media Agent Performance</video:tag>
<video:tag>Command Center</video:tag>
<video:tag>I</video:tag>
<video:tag>O Testing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3870/commvault-cloud-cleanroom-recovery-overview/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3870_1774040613_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Commvault Cloud Cleanroom Recovery Overview]]></video:title>
<video:description><![CDATA[TL;DR Commvault Cloud Cleanroom provides on-demand isolated recovery environments in the cloud for cyber resilience and ransomware protection. The solution enables organizations to spin up clean recovery spaces quickly, claiming recovery times in minut...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3870&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>65</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Cyber Recovery</video:tag>
<video:tag>Ransomware Protection</video:tag>
<video:tag>Air-Gapped Backup</video:tag>
<video:tag>Cloud Recovery</video:tag>
<video:tag>Business Continuity</video:tag>
<video:tag>Isolated Recovery Environment</video:tag>
<video:tag>Cyber Resilience</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3859/data-resilience-strategies-to-reduce-cyber-risk/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3859_1774040541_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Data Resilience Strategies to Reduce Cyber Risk]]></video:title>
<video:description><![CDATA[TL;DR 69% of organizations experienced cyberattacks last year, making data resilience strategies essential for business continuity and recovery Secure encrypted backups form the foundation of data resilience, enabling restoration after attacks while pr...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3859&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>153</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Data Resilience</video:tag>
<video:tag>Cyber Risk Reduction</video:tag>
<video:tag>Backup Strategies</video:tag>
<video:tag>3-2-1 Rule</video:tag>
<video:tag>Ransomware Protection</video:tag>
<video:tag>Encrypted Backups</video:tag>
<video:tag>Role-Based Access Control</video:tag>
<video:tag>Backup-as-a-Service</video:tag>
<video:tag>Disaster Recovery</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3860/s3-security-azure-local-backup-powershell-automation/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3860_1774040543_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[S3 Security, Azure Local Backup &amp; PowerShell Automation]]></video:title>
<video:description><![CDATA[TL;DR Amazon S3 Resource Control Policies provide critical top-level security boundaries for backup data, preventing common misconfigurations where buckets are provisioned without clear usage policies or appropriate access restrictions. Luca&#039;s detaile...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3860&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2087</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-20</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>How-To</video:tag>
<video:tag>S3 Security</video:tag>
<video:tag>Resource Control Policies</video:tag>
<video:tag>Azure Local</video:tag>
<video:tag>Azure Stack HCI</video:tag>
<video:tag>PowerShell Automation</video:tag>
<video:tag>Enterprise Manager</video:tag>
<video:tag>Hardened Repository</video:tag>
<video:tag>USB Device Security</video:tag>
<video:tag>Veeam Data Cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3854/5-priorities-for-ai-readiness-in-financial-services/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3854_1773408089_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[5 Priorities for AI Readiness in Financial Services]]></video:title>
<video:description><![CDATA[TL;DR Organizations must actively adopt AI and accept calculated risk to stay competitive, as hesitation will result in losing market position to more aggressive competitors. Hybrid cloud migration and microservices architecture demand fundamentally di...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3854&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>118</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-13</video:publication_date>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Data Privacy</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>AI adoption strategy</video:tag>
<video:tag>hybrid cloud security</video:tag>
<video:tag>microservices architecture</video:tag>
<video:tag>AI-ready data infrastructure</video:tag>
<video:tag>data modernization</video:tag>
<video:tag>regulatory compliance</video:tag>
<video:tag>workforce upskilling</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3855/migrating-securing-apps-on-red-hat-openshift-with-kasten/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3855_1773408092_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Migrating &amp; Securing Apps on Red Hat OpenShift with Kasten]]></video:title>
<video:description><![CDATA[TL;DR Traditional backup solutions cannot properly protect Kubernetes applications due to fundamental platform differences, requiring purpose-built solutions like Veeam Kasten that understand cloud-native architecture and operations. Veeam Kasten 7.0 d...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3855&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3629</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-13</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Kubernetes Data Protection</video:tag>
<video:tag>Red Hat OpenShift</video:tag>
<video:tag>Multi-Cloud Migration</video:tag>
<video:tag>OpenShift Virtualization</video:tag>
<video:tag>Ransomware Defense</video:tag>
<video:tag>Cloud-Native Backup</video:tag>
<video:tag>ROSA</video:tag>
<video:tag>Red Hat OpenShift on AWS</video:tag>
<video:tag>Container Security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3851/using-the-veeam-one-v13-reporting-engine-for-compliance/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3851_1773349025_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Using the Veeam ONE v13 Reporting Engine for Compliance]]></video:title>
<video:description><![CDATA[TL;DR The Veeam ONE Report Catalog provides visual previews and comprehensive filtering options for scoping reports by infrastructure objects, repositories, workload types, and immutability targets. The Immutable Workloads Report reveals protection gap...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3851&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>376</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Veeam ONE</video:tag>
<video:tag>Reporting Engine</video:tag>
<video:tag>Immutability</video:tag>
<video:tag>Compliance Reporting</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Backup Monitoring</video:tag>
<video:tag>Veeam Data Platform</video:tag>
<video:tag>Ransomware Resilience</video:tag>
<video:tag>AI-Powered Analytics</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3841/automated-ransomware-recovery-with-arlie-recover/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3841_1773348979_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Automated Ransomware Recovery with Arlie Recover]]></video:title>
<video:description><![CDATA[TL;DR Arlie Recover automatically ingests Splunk ransomware alerts and generates ready-to-run, asset-specific recovery plans, eliminating manual handoffs and reducing response time during critical incidents. The system guides operators through five str...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3841&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>234</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Ransomware Recovery</video:tag>
<video:tag>Automated Incident Response</video:tag>
<video:tag>Threat Detection Integration</video:tag>
<video:tag>Cyber Resilience</video:tag>
<video:tag>Backup Validation</video:tag>
<video:tag>Cleanroom Recovery</video:tag>
<video:tag>Audit Trail Compliance</video:tag>
<video:tag>SIEM Integration</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3842/china-s-systematic-theft-of-american-ip-trade-secrets/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3842_1773347012_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[China&#039;s Systematic Theft of American IP &amp; Trade Secrets]]></video:title>
<video:description><![CDATA[TL;DR Chinese state-sponsored hackers compromised a Wisconsin welding shop&#039;s server to stage attacks against major American corporations, exploiting the NSA&#039;s legal inability to monitor domestic infrastructure while systematically exfiltrating billio...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3842&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2507</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Thought Leadership</video:tag>
<video:tag>Chinese State-Sponsored Cyber Espionage</video:tag>
<video:tag>Intellectual Property Theft</video:tag>
<video:tag>Joint Venture Technology Transfer</video:tag>
<video:tag>NSA Domestic Surveillance Limitations</video:tag>
<video:tag>Operation Aurora</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3843/incident-response-automation-with-recovery-agent/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3843_1773346705_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Incident Response Automation with Cohesity Recovery Agent]]></video:title>
<video:description><![CDATA[TL;DR Recovery Agent automates incident response workflows through recovery groups and blueprints that act as digital jump bags, enabling organizations to orchestrate recovery from ransomware attacks and disasters without manual coordination Blueprints...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3843&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>395</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Incident Response Automation</video:tag>
<video:tag>Ransomware Recovery</video:tag>
<video:tag>Clean Room Environments</video:tag>
<video:tag>Digital Jump Bags</video:tag>
<video:tag>Disaster Recovery Orchestration</video:tag>
<video:tag>Threat Scanning</video:tag>
<video:tag>Recovery Workflows</video:tag>
<video:tag>Backup Rehearsal</video:tag>
<video:tag>Cyber Resilience</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3844/ransomware-resilience-with-commvault-hyperscale/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3844_1773348900_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Ransomware Resilience with Commvault HyperScale]]></video:title>
<video:description><![CDATA[TL;DR Commvault expanded its HyperScale portfolio into three purpose-built solutions—X for core enterprise, Edge for remote/branch offices, and Flex for massive scale-out workloads—all built on hardened VaultOS with immutable storage and zero-trust arc...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3844&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1101</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Customer Story</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Ransomware Protection</video:tag>
<video:tag>Data Backup and Recovery</video:tag>
<video:tag>Edge Computing</video:tag>
<video:tag>Immutable Storage</video:tag>
<video:tag>Zero Trust Architecture</video:tag>
<video:tag>Hybrid Cloud Data Protection</video:tag>
<video:tag>SaaS Management</video:tag>
<video:tag>Cyber Resilience</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3845/mongodb-data-protection-with-cohesity-ops-manager/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3845_1773346743_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[MongoDB Data Protection with Cohesity Ops Manager]]></video:title>
<video:description><![CDATA[TL;DR Cohesity&#039;s MongoDB integration uses an API-based method to provide enhanced backup and recovery performance with parallel data streams processing billions of objects simultaneously The solution supports automatic protection of all replica sets i...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3845&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>359</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>How-To</video:tag>
<video:tag>MongoDB data protection</video:tag>
<video:tag>Ops Manager integration</video:tag>
<video:tag>API-based backup</video:tag>
<video:tag>replica set protection</video:tag>
<video:tag>point-in-time recovery</video:tag>
<video:tag>database backup policies</video:tag>
<video:tag>incremental backups</video:tag>
<video:tag>disaster recovery</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3846/mcp-2-0-vs-1-0-how-ai-security-protocol-evolved/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3846_1773348863_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[MCP 2.0 vs 1.0: How AI Security Protocol Evolved]]></video:title>
<video:description><![CDATA[TL;DR MCP 1.x focused on enabling AI adoption and onboarding enterprises to use AI tools, while MCP 2.0 shifts focus to securing AI execution within enterprise environments. OAuth support in MCP 2.0 enables standardized identity management with least p...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3846&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>304</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>MCP Protocol</video:tag>
<video:tag>AI Security</video:tag>
<video:tag>OAuth</video:tag>
<video:tag>Prompt Injection</video:tag>
<video:tag>Enterprise AI</video:tag>
<video:tag>AI Agents</video:tag>
<video:tag>Human-in-the-Loop</video:tag>
<video:tag>Access Control</video:tag>
<video:tag>Security Architecture</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3847/inside-a-hospital-ransomware-attack-lessons-from-the-front-lines/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3847_1773348821_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Inside a Hospital Ransomware Attack: Lessons from the Front Lines]]></video:title>
<video:description><![CDATA[TL;DR Immediate network isolation is critical when ransomware is suspected—cutting connections aggressively is safer than attempting quick fixes while the attack scope remains unknown. Hospital recovery is not simply rebooting servers; clinical depende...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3847&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1821</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>ransomware incident response</video:tag>
<video:tag>healthcare cybersecurity</video:tag>
<video:tag>crisis management</video:tag>
<video:tag>business continuity</video:tag>
<video:tag>disaster recovery</video:tag>
<video:tag>ANSSI</video:tag>
<video:tag>hospital IT infrastructure</video:tag>
<video:tag>EDR deployment</video:tag>
<video:tag>security awareness training</video:tag>
<video:tag>degraded operations</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3848/disk-storage-types-in-commvault-nas-san-direct-attached/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3848_1773348716_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Disk Storage Types in Commvault: NAS, SAN &amp; Direct-Attached]]></video:title>
<video:description><![CDATA[TL;DR Commvault disk storage uses logical containers with mount paths as backup locations, supporting both drive letters and UNC paths for flexible configuration. NAS storage provides the best resiliency and is the preferred method for shared network s...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3848&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>116</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>disk storage architecture</video:tag>
<video:tag>backup storage configuration</video:tag>
<video:tag>NAS storage</video:tag>
<video:tag>SAN storage</video:tag>
<video:tag>direct-attached storage</video:tag>
<video:tag>media agents</video:tag>
<video:tag>mount paths</video:tag>
<video:tag>data resiliency</video:tag>
<video:tag>deduplication</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3849/how-to-backup-proxmox-vms-with-veeam-in-3-steps/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3849_1773348243_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How to Backup Proxmox VMs with Veeam in 3 Steps]]></video:title>
<video:description><![CDATA[TL;DR Veeam&#039;s Proxmox integration follows a straightforward three-step process: connect to Proxmox hosts via SSH, deploy Veeam worker nodes for backup processing, and configure policy-based backup jobs with tag-based VM selection. Worker nodes are lig...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3849&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>579</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Demo</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Proxmox backup integration</video:tag>
<video:tag>Veeam worker node deployment</video:tag>
<video:tag>Virtual machine protection</video:tag>
<video:tag>Policy-based backup configuration</video:tag>
<video:tag>Guest file-level restore</video:tag>
<video:tag>Alternative hypervisor support</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3850/veeam-data-platform-v13-overview-linux-deployment/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3850_1773348204_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Veeam Data Platform v13 Overview &amp; Linux Deployment]]></video:title>
<video:description><![CDATA[TL;DR Veeam Backup &amp; Replication v13 introduces native Linux deployment via a Rocky Linux-based software appliance with hardened security, four-eyes authentication, and high availability capabilities New granular role-based access control allows delega...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3850&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1493</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Linux deployment</video:tag>
<video:tag>backup security</video:tag>
<video:tag>role-based access control</video:tag>
<video:tag>cross-platform recovery</video:tag>
<video:tag>disaster recovery orchestration</video:tag>
<video:tag>ransomware detection</video:tag>
<video:tag>web-based management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3831/block-repository-design-vro-failover-veeam-one-v13/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3831_1773348164_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Block Repository Design, VRO Failover &amp; Veeam ONE V13]]></video:title>
<video:description><![CDATA[TL;DR Veeam Legends discuss community articles on repository design, emphasizing that IOPS and throughput matter as much as capacity when planning DAS repositories with spinning disks Veeam Recovery Orchestrator remains underutilized globally despite i...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3831&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1666</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Community Story</video:tag>
<video:tag>Veeam Backup &amp; Replication V13</video:tag>
<video:tag>Veeam ONE V13</video:tag>
<video:tag>Veeam Recovery Orchestrator</video:tag>
<video:tag>Repository Design</video:tag>
<video:tag>DAS Storage</video:tag>
<video:tag>Disaster Recovery</video:tag>
<video:tag>Planned Failover</video:tag>
<video:tag>Deployment Automation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3832/threat-detection-protection-in-veeam-data-platform-12-3/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3832_1773348142_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Threat Detection &amp; Protection in Veeam Data Platform 12.3]]></video:title>
<video:description><![CDATA[TL;DR Veeam 12.3 introduces Coveware Recon Scanner, a proactive threat detection tool that identifies indicators of compromise before malicious code activates, reducing dwell time and enabling early intervention against ransomware attacks. The platform...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3832&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3122</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Ransomware Detection</video:tag>
<video:tag>Backup Security</video:tag>
<video:tag>Incident Response</video:tag>
<video:tag>SIEM Integration</video:tag>
<video:tag>Malware Scanning</video:tag>
<video:tag>Proactive Threat Hunting</video:tag>
<video:tag>MITRE ATT&amp;CK Framework</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3833/configuring-vmware-vsa-transport-modes-in-commvault/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3833_1773348663_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Configuring VMware VSA Transport Modes in Commvault]]></video:title>
<video:description><![CDATA[TL;DR Transport mode is configured at the VM group level in Commvault Command Center and determines how virtual machine data is read from VMware storage during backup and restore operations. Auto transport mode is the default setting and uses intellige...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3833&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>297</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>VMware backup</video:tag>
<video:tag>Transport mode configuration</video:tag>
<video:tag>Commvault administration</video:tag>
<video:tag>Virtual machine protection</video:tag>
<video:tag>SAN storage integration</video:tag>
<video:tag>NFS backup</video:tag>
<video:tag>HotAdd configuration</video:tag>
<video:tag>SCSI controller management</video:tag>
<video:tag>Backup performance optimization</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3834/psychology-of-modern-cyber-attacks-social-engineering/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3834_1773348071_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Psychology of Modern Cyber Attacks &amp; Social Engineering]]></video:title>
<video:description><![CDATA[TL;DR Modern cyber attacks exploit human psychology more than technical vulnerabilities, with threat actors deliberately triggering System 1 (fast, instinctive) thinking through urgency, timing, and emotional manipulation to bypass critical analysis. A...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3834&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2028</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Social Engineering</video:tag>
<video:tag>AI and Deepfakes</video:tag>
<video:tag>Ransomware Psychology</video:tag>
<video:tag>Security Awareness Training</video:tag>
<video:tag>Human Factors in Cybersecurity</video:tag>
<video:tag>Phishing Defense</video:tag>
<video:tag>Threat Actor Tactics</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3835/agrica-achieves-eu-compliance-with-veeam-data-protection/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3835_1773348036_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[AGRICA Achieves EU Compliance with Veeam Data Protection]]></video:title>
<video:description><![CDATA[TL;DR AGRICA protects 900 servers, 1,500 virtual workstations, and 300TB of data for France&#039;s agricultural insurance sector using Veeam&#039;s backup and recovery platform Veeam&#039;s automated Instant Recovery testing verifies restored systems function corr...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3835&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>172</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Customer Story</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Backup and Recovery</video:tag>
<video:tag>EU Regulatory Compliance</video:tag>
<video:tag>NIS2 Regulation</video:tag>
<video:tag>DORA Regulation</video:tag>
<video:tag>Office 365 Backup</video:tag>
<video:tag>Cloud-to-Cloud Backup</video:tag>
<video:tag>Disaster Recovery Testing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3836/cloud-data-protection-lifecycle-security-resilience/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3836_1773347988_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cloud Data Protection: Lifecycle, Security &amp; Resilience]]></video:title>
<video:description><![CDATA[TL;DR Veeam Data Platform provides unified data protection across on-premises, hybrid, and cloud environments through a single management interface with consistent policies, addressing the fragmented reality of modern multi-cloud architectures. The ses...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3836&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2512</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Webinar</video:tag>
<video:tag>Cloud Data Protection</video:tag>
<video:tag>Hybrid Cloud Backup</video:tag>
<video:tag>Data Lifecycle Management</video:tag>
<video:tag>Cloud Migration Strategy</video:tag>
<video:tag>Backup Security and Encryption</video:tag>
<video:tag>Disaster Recovery Planning</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3837/leading-through-cyber-incidents-the-human-cost-of-response/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3837_1773347908_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Leading Through Cyber Incidents: The Human Cost of Response]]></video:title>
<video:description><![CDATA[TL;DR Security incidents create profound physical and psychological stress on response teams, with measurable impacts including elevated heart rates, sleep deprivation, and weight fluctuations lasting weeks beyond the technical resolution. Organization...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3837&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1782</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Security Operations</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Thought Leadership</video:tag>
<video:tag>Incident Response Leadership</video:tag>
<video:tag>Security Team Mental Health</video:tag>
<video:tag>Organizational Trauma Response</video:tag>
<video:tag>CISO Board Communication</video:tag>
<video:tag>Crisis Management</video:tag>
<video:tag>Security Culture</video:tag>
<video:tag>Stakeholder Management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3838/veeam-data-cloud-for-service-providers-t-systems-case-study/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3838_1773347638_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Veeam Data Cloud for Service Providers: T-Systems Case Study]]></video:title>
<video:description><![CDATA[TL;DR T-Systems added Veeam Data Cloud to complement existing private data center services, driven by customer demand for cloud-based backup and the operational simplicity of not maintaining per-customer infrastructure The platform enables a pure OpEx ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3838&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1655</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Cloud Security</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Customer Story</video:tag>
<video:tag>Webinar</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Veeam Data Cloud</video:tag>
<video:tag>VCSP business model</video:tag>
<video:tag>Microsoft 365 backup</video:tag>
<video:tag>Service provider strategy</video:tag>
<video:tag>CapEx vs OpEx</video:tag>
<video:tag>SaaS data protection</video:tag>
<video:tag>Cloud service adoption</video:tag>
<video:tag>T-Systems case study</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3839/blocky-security-sql-server-protection-entra-id-risks/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3839_1773347592_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Blocky Security, SQL Server Protection &amp; Entra ID Risks]]></video:title>
<video:description><![CDATA[TL;DR Blocky for Veeam offers Windows-based repository hardening for organizations that cannot support Linux, though community debate continues over whether it matches Linux hardened repository protection levels. Six distinct methods exist for protecti...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3839&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1587</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Windows repository hardening</video:tag>
<video:tag>SQL Server backup strategies</video:tag>
<video:tag>Microsoft Entra ID security</video:tag>
<video:tag>S3-compatible object storage</video:tag>
<video:tag>Linux hardened repositories</video:tag>
<video:tag>Veeam certification</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3840/data-isolation-recovery-with-cohesity-fortknox/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3840_1773346845_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Data Isolation &amp; Recovery with Cohesity FortKnox]]></video:title>
<video:description><![CDATA[TL;DR Cohesity FortKnox provides fully managed data isolation through cybervaulting, maintaining immutable backup copies in secure cloud vaults to protect against ransomware attacks targeting backup environments. The Quorum authorization framework requ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3840&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>374</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Cybervaulting</video:tag>
<video:tag>Data Isolation</video:tag>
<video:tag>Ransomware Protection</video:tag>
<video:tag>Immutable Backups</video:tag>
<video:tag>Multi-Cloud Storage</video:tag>
<video:tag>Quorum Authorization</video:tag>
<video:tag>VM Recovery</video:tag>
<video:tag>Data Lock</video:tag>
<video:tag>Protection Policies</video:tag>
<video:tag>Backup Security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3829/cybersecurity-policy-equity-for-rural-and-underserved-communities/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3829_1773346959_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cybersecurity Policy Equity for Rural and Underserved Communities]]></video:title>
<video:description><![CDATA[TL;DR Traditional reimbursement-based cybersecurity funding disadvantages rural and low-income communities that lack upfront capital, requiring a shift toward grants and proactive investment models similar to natural disaster preparedness. Cybersecurit...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3829&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3679</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>cybersecurity policy</video:tag>
<video:tag>rural communities</video:tag>
<video:tag>workforce development</video:tag>
<video:tag>cyber resilience</video:tag>
<video:tag>healthcare cybersecurity</video:tag>
<video:tag>critical infrastructure protection</video:tag>
<video:tag>policy advocacy</video:tag>
<video:tag>underserved communities</video:tag>
<video:tag>federal funding models</video:tag>
<video:tag>skill-based hiring</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3830/scattered-spider-identity-based-cyber-threats-in-2025/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3830_1773347497_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Scattered Spider: Identity-Based Cyber Threats in 2025]]></video:title>
<video:description><![CDATA[TL;DR Scattered Spider is a loosely organized but highly effective cybercrime group that specializes in identity-based attacks targeting Microsoft 365, Active Directory, and Entra ID systems through social engineering and MFA bypass tactics. Once insid...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3830&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>265</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-03-12</video:publication_date>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Identity &amp; Access</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Scattered Spider threat actor group</video:tag>
<video:tag>Identity-based cyberattacks</video:tag>
<video:tag>Microsoft 365 security</video:tag>
<video:tag>Active Directory compromise</video:tag>
<video:tag>Entra ID vulnerabilities</video:tag>
<video:tag>MFA bypass techniques</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3825/dyna-software-when-servicenow-gets-big…governance-gets-real/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3825_1774038482_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Dyna Software: When ServiceNow Gets Big…Governance Gets Real]]></video:title>
<video:description><![CDATA[In this inBrief chat, Mike Matchett speaks with Ronald Browning, Co-Founder and CEO of Dyna Software, about how modern DevOps practices and targeted AI capabilities can help organizations better manage large ServiceNow implementations.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3825&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>847</video:duration>
<video:live>no</video:live>
<video:view_count>49</video:view_count>
<video:publication_date>2026-03-09</video:publication_date>
<video:tag>inBrief</video:tag>
<video:tag>Matchett</video:tag>
<video:tag>Dyna Software</video:tag>
<video:tag>ServiceNow</video:tag>
<video:tag>ITSM</video:tag>
<video:tag>DevOps</video:tag>
<video:tag>governance</video:tag>
<video:tag>technical debt</video:tag>
<video:tag>AI remediation</video:tag>
<video:tag>platform upgrades</video:tag>
<video:tag>CMDB</video:tag>
<video:tag>CSDM</video:tag>
<video:tag>IT operations</video:tag>
<video:tag>change management</video:tag>
<video:tag>enterprise automation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3824/akave-breaking-the-cloud-lock-in-problem-with-distributed-object-storage/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3824_1773073232_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Akave: Breaking the Cloud Lock-In Problem with Distributed Object Storage]]></video:title>
<video:description><![CDATA[In this inBrief chat, Mike Matchett speaks with Stefaan Vervaet, CEO of Akave, about how modern object storage architectures are evolving to address new pressures around cost, sovereignty, and large-scale analytics workloads.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3824&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>710</video:duration>
<video:live>no</video:live>
<video:view_count>39</video:view_count>
<video:publication_date>2026-03-09</video:publication_date>
<video:tag>inBrief</video:tag>
<video:tag>Matchett</video:tag>
<video:tag>Akave</video:tag>
<video:tag>object storage</video:tag>
<video:tag>data sovereignty</video:tag>
<video:tag>AI infrastructure</video:tag>
<video:tag>cloud repatriation</video:tag>
<video:tag>hybrid cloud</video:tag>
<video:tag>cryptography</video:tag>
<video:tag>data governance</video:tag>
<video:tag>data provenance</video:tag>
<video:tag>S3 storage</video:tag>
<video:tag>distributed storage</video:tag>
<video:tag>AI workloads</video:tag>
<video:tag>sovereign cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3820/5-critical-actions-cios-must-take-to-prepare-for-cyber-crises/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3820_1773348632_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Critical Actions CIOs Must Take to Prepare for Cyber Crises]]></video:title>
<video:description><![CDATA[TL;DR IT and OT systems must be treated as a single integrated unit because cyber threats do not respect organizational boundaries and OT systems cannot be accessed without underlying IT infrastructure. Foundational services like identity management, n...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3820&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>102</video:duration>
<video:view_count>49</video:view_count>
<video:publication_date>2026-02-28</video:publication_date>
<video:tag>Business Continuity</video:tag>
<video:tag>OT</video:tag>
<video:tag>IoT Security</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Cyber Crisis Preparedness</video:tag>
<video:tag>IT and OT Convergence</video:tag>
<video:tag>Business Continuity Planning</video:tag>
<video:tag>Identity and Access Management</video:tag>
<video:tag>Data Dependency Mapping</video:tag>
<video:tag>Critical Infrastructure Security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3821/8-benefits-of-backup-as-a-service-for-microsoft-365/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3821_1773347451_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Veeam: 8 Benefits of Backup-as-a-Service for Microsoft 365]]></video:title>
<video:description><![CDATA[TL;DR 53% of organizations experienced Microsoft 365 data loss in the past 12 months, but only 25% could fully restore their data, highlighting a critical protection gap despite Microsoft&#039;s infrastructure availability guarantees. Veeam Data Cloud for ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3821&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1884</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-02-28</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Webinar</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Microsoft 365 Backup</video:tag>
<video:tag>Backup-as-a-Service</video:tag>
<video:tag>SaaS Data Protection</video:tag>
<video:tag>Cloud Backup</video:tag>
<video:tag>Data Loss Prevention</video:tag>
<video:tag>Compliance and Governance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3818/minimum-viable-company-strategy-for-cyber-recovery/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3818_1773348595_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What to do (at a minimum) to recover after a cyber attack]]></video:title>
<video:description><![CDATA[TL;DR Minimum Viable Company (MVC) strategy focuses on rapidly restoring only the core business functions needed to operate immediately after a cyber attack, rather than attempting full system recovery. Organizations should deploy specialized tiger tea...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3818&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>153</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-02-28</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Business Continuity</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Minimum Viable Company</video:tag>
<video:tag>Cyber Recovery Strategy</video:tag>
<video:tag>Incident Response</video:tag>
<video:tag>Tiger Teams</video:tag>
<video:tag>Failover Planning</video:tag>
<video:tag>Recovery Testing</video:tag>
<video:tag>Critical System Identification</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3819/veeam-vault-secure-cloud-backup-ransomware-defense/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3819_1773347417_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Veeam Vault: Secure Cloud Backup &amp; Ransomware Defense]]></video:title>
<video:description><![CDATA[TL;DR Veeam Cloud Vault is a fully managed, immutable cloud storage solution with predictable all-inclusive pricing (starting at $14/TB/month for Foundation edition), eliminating unpredictable egress fees and API charges that plague traditional cloud s...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3819&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2232</video:duration>
<video:view_count>39</video:view_count>
<video:publication_date>2026-02-28</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Kubernetes</video:tag>
<video:tag>Disaster Recovery</video:tag>
<video:tag>Cloud Backup</video:tag>
<video:tag>Ransomware Defense</video:tag>
<video:tag>Immutable Storage</video:tag>
<video:tag>Kubernetes Data Protection</video:tag>
<video:tag>Hybrid Cloud Strategy</video:tag>
<video:tag>Cost Optimization</video:tag>
<video:tag>Business Continuity</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3816/ai-data-access-governance-for-multi-cloud-environments/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3816_1773348555_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Commvault: AI Data Access Governance for Multi-Cloud Environments]]></video:title>
<video:description><![CDATA[TL;DR Commvault&#039;s AI access governance platform, powered by Satori, provides unified visibility and policy enforcement across multi-cloud environments, SaaS platforms, databases, and AI workloads through continuous discovery and classification of sens...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3816&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>526</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-02-27</video:publication_date>
<video:tag>AI &amp; Machine Learning</video:tag>
<video:tag>Data Privacy</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>AI Data Governance</video:tag>
<video:tag>Multi-Cloud Security</video:tag>
<video:tag>Data Access Control</video:tag>
<video:tag>Prompt Redaction</video:tag>
<video:tag>Sensitive Data Discovery</video:tag>
<video:tag>Dynamic Data Masking</video:tag>
<video:tag>Compliance Auditing</video:tag>
<video:tag>DSPM</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3817/city-of-phoenix-achieves-sub-5-minute-recovery-with-veeam/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3817_1773347372_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[City of Phoenix Achieves Sub-5-Minute Recovery with Veeam]]></video:title>
<video:description><![CDATA[TL;DR City of Phoenix selected Veeam for data resilience leadership and seamless integration with Pure Storage virtualized environments to support disaster recovery initiatives across municipal services. The IT team restored a critical Dial-a-Ride serv...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3817&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>191</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-02-27</video:publication_date>
<video:tag>Customer Story</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Data resilience</video:tag>
<video:tag>Disaster recovery</video:tag>
<video:tag>Public sector IT</video:tag>
<video:tag>Virtualization backup</video:tag>
<video:tag>Pure Storage integration</video:tag>
<video:tag>CyberSecure maturity</video:tag>
<video:tag>Municipal services continuity</video:tag>
<video:tag>Rapid recovery</video:tag>
<video:tag>Customer testimonial</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3815/how-cyber-attacks-disproportionately-impact-vulnerable-populations/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3815_1773346921_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How Cyber Attacks Disproportionately Impact Vulnerable Populations]]></video:title>
<video:description><![CDATA[TL;DR Data weaponization uses data to manipulate, deceive, coerce, or attack, with impacts that disproportionately affect women and vulnerable populations due to their roles as caregivers and reliance on sensitive services like healthcare. Ransomware a...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3815&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1531</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-02-27</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Data Weaponization</video:tag>
<video:tag>Gender and Cybersecurity</video:tag>
<video:tag>Healthcare Ransomware</video:tag>
<video:tag>Critical Infrastructure Protection</video:tag>
<video:tag>Geopolitical Cybercrime</video:tag>
<video:tag>Sanctuary Jurisdictions</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3812/exclaimer-governing-the-last-mile-of-your-brand/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3812_1771955058_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Exclaimer: Governing the Last Mile of Your Brand]]></video:title>
<video:description><![CDATA[In this inBrief chat, Mike Matchett speaks with James Wayne of Exclaimer about how unmanaged email signatures and meeting themes create reputational and compliance risk.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3812&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>911</video:duration>
<video:live>no</video:live>
<video:view_count>64</video:view_count>
<video:publication_date>2026-02-24</video:publication_date>
<video:tag>inBrief</video:tag>
<video:tag>Matchett</video:tag>
<video:tag>Exclaimer</video:tag>
<video:tag>brand governance</video:tag>
<video:tag>email signatures</video:tag>
<video:tag>compliance risk</video:tag>
<video:tag>reputational risk</video:tag>
<video:tag>communication control</video:tag>
<video:tag>brand consistency</video:tag>
<video:tag>legal disclaimers</video:tag>
<video:tag>marketing governance</video:tag>
<video:tag>outbound communications</video:tag>
<video:tag>AI communications</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3809/bridging-the-it-security-gap-with-jane-frankland/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3809_1773348520_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Bridging the IT-Security Gap with Jane Frankland]]></video:title>
<video:description><![CDATA[TL;DR CIOs and CISOs have opposing mandates—innovation versus risk reduction—creating organizational friction that leaves security concerns filtered or dismissed, particularly when CISOs report to CIOs. Critical workflows like system patching, cyber re...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3809&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1409</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2026-02-22</video:publication_date>
<video:tag>Security Operations</video:tag>
<video:tag>Best Practices</video:tag>
<video:tag>Executive Briefing</video:tag>
<video:tag>Data Protection</video:tag>
<video:tag>Compliance &amp; Governance</video:tag>
<video:tag>IT-Security Alignment</video:tag>
<video:tag>CIO-CISO Dynamics</video:tag>
<video:tag>Organizational Risk Management</video:tag>
<video:tag>Cyber Recovery Planning</video:tag>
<video:tag>Security Culture</video:tag>
<video:tag>Cross-Functional Collaboration</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3810/granular-s3-restore-with-clumio-prefix-filtering/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3810_1773348485_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Granular S3 Restore with Clumio Prefix Filtering]]></video:title>
<video:description><![CDATA[TL;DR Clumio enables granular S3 restore operations at the prefix and file-type level, allowing selective recovery without restoring entire buckets. The demo shows a ransomware recovery scenario where compromised Excel files are overwritten with clean ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3810&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>159</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2026-02-22</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Cloud Security</video:tag>
<video:tag>Demo</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>S3 backup and recovery</video:tag>
<video:tag>Prefix-level data protection</video:tag>
<video:tag>Ransomware recovery</video:tag>
<video:tag>File-type filtering</video:tag>
<video:tag>Cloud object storage</video:tag>
<video:tag>Granular restore operations</video:tag>
<video:tag>AWS S3 management</video:tag>
<video:tag>Data corruption remediation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3807/adding-and-managing-tape-libraries-in-commvault/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3807_1773348445_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Adding and Managing Tape Libraries in Commvault]]></video:title>
<video:description><![CDATA[TL;DR Tape libraries provide cost-effective long-term retention with offline ransomware protection, functioning as either primary backup targets or secondary copy destinations within Commvault environments. The Scan Hardware feature automatically disco...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3807&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>123</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2026-02-22</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Getting Started</video:tag>
<video:tag>Tape library configuration</video:tag>
<video:tag>Hardware discovery automation</video:tag>
<video:tag>Ransomware protection strategies</video:tag>
<video:tag>Long-term data retention</video:tag>
<video:tag>Backup target management</video:tag>
<video:tag>Drive maintenance operations</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3808/cyber-extortion-response-with-coveware-by-veeam/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3808_1773347254_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cyber Extortion Response with Coveware by Veeam]]></video:title>
<video:description><![CDATA[TL;DR Coveware by Veeam provides comprehensive cyber extortion readiness and response services, including ransomware strain assessment, 24-7 professional negotiation, and data-driven recovery strategies to minimize downtime and financial loss. The serv...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3808&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>194</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2026-02-22</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Security Operations</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>Threat Intelligence</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Ransomware Response</video:tag>
<video:tag>Cyber Extortion</video:tag>
<video:tag>Incident Response</video:tag>
<video:tag>Data Recovery</video:tag>
<video:tag>Backup Security</video:tag>
<video:tag>Negotiation Services</video:tag>
<video:tag>Compliance Management</video:tag>
<video:tag>Recovery Forecasting</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3794/log-backup-with-caching-in-commvault-command-center/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3794_1773348392_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Commvault: Log Backup with Caching...A Step-by-Step Database Guide]]></video:title>
<video:description><![CDATA[This tutorial demonstrates how to configure and use log backup with caching in Commvault Command Center, a feature designed to improve the reliability and performance of transaction log backups for databases including SQL Server, Oracle, SAP HANA, and ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3794&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>332</video:duration>
<video:view_count>49</video:view_count>
<video:publication_date>2026-02-12</video:publication_date>
<video:tag>Data Protection</video:tag>
<video:tag>Backup &amp; Recovery</video:tag>
<video:tag>How-To</video:tag>
<video:tag>Technical Deep Dive</video:tag>
<video:tag>Demo</video:tag>
<video:tag>Transaction log backups</video:tag>
<video:tag>Database protection</video:tag>
<video:tag>Backup architecture</video:tag>
<video:tag>Control plane resilience</video:tag>
<video:tag>Job management</video:tag>
<video:tag>SLA monitoring</video:tag>
<video:tag>Commvault Command Center</video:tag>
<video:tag>Backup caching</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3785/simplifying-network-security-operations-with-netskope-one/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3785_1773350087_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Elevate Simplify - Simplify Operations]]></video:title>
<video:description><![CDATA[See how Netskope One simplifies network and security operations with dedicated egress IPs, unified policy management, and DEM troubleshooting capabilities.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3785&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>219</video:duration>
<video:view_count>75</video:view_count>
<video:publication_date>2026-02-04</video:publication_date>
<video:tag>sase</video:tag>
<video:tag>sse</video:tag>
<video:tag>network</video:tag>
<video:tag>security</video:tag>
<video:tag>operations</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3778/numecent-application-longevity-in-a-cloud-desktop-world/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3778_1769542364_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Numecent: Application Longevity in a Cloud Desktop World]]></video:title>
<video:description><![CDATA[In this inBrief chat, Mike Matchett speaks with Numecent CEO Arthur Hitomi about application containerization and cloud paging as a way to preserve application investments while simplifying migration and operations.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3778&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>836</video:duration>
<video:live>no</video:live>
<video:view_count>52</video:view_count>
<video:publication_date>2026-01-27</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>numecent</video:tag>
<video:tag>application</video:tag>
<video:tag>containerization</video:tag>
<video:tag>cloud</video:tag>
<video:tag>paging</video:tag>
<video:tag>legacy</video:tag>
<video:tag>apps</video:tag>
<video:tag>vdi</video:tag>
<video:tag>windows</video:tag>
<video:tag>migration</video:tag>
<video:tag>storage</video:tag>
<video:tag>optimization</video:tag>
<video:tag>app</video:tag>
<video:tag>portability</video:tag>
<video:tag>desktop</video:tag>
<video:tag>virtualization</video:tag>
<video:tag>os</video:tag>
<video:tag>compatibility</video:tag>
<video:tag>it</video:tag>
<video:tag>efficiency</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3741/verge-io-replacing-vmware-shouldnt-give-you-nightmares/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3741_1763141606_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Verge.io: Replacing VMware Shouldn’t Give You Nightmares]]></video:title>
<video:description><![CDATA[Mike Matchett sits down with George Crump, Chief Marketing Officer at Verge.io, to explore how the company’s infrastructure operating system is reshaping virtualization, data protection, and private AI deployment.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3741&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2574</video:duration>
<video:live>no</video:live>
<video:view_count>52</video:view_count>
<video:publication_date>2026-01-22</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>virtualization</video:tag>
<video:tag>platform</video:tag>
<video:tag>software-defined</video:tag>
<video:tag>data</video:tag>
<video:tag>center</video:tag>
<video:tag>hyperconverged</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>multitenancy</video:tag>
<video:tag>instant</video:tag>
<video:tag>vm</video:tag>
<video:tag>cloning</video:tag>
<video:tag>integrated</video:tag>
<video:tag>storage</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>it</video:tag>
<video:tag>simplicity</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3766/10zig-lean-secure-and-built-for-vdi/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3766_1766440012_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[10ZiG: Lean, Secure, and Built for VDI]]></video:title>
<video:description><![CDATA[In this inBrief chat, Mike Matchett sits down with Kevin Greenway, CTO of 10ZiG, to discuss the continued evolution of thin client computing in a post-COVID hybrid world.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3766&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1130</video:duration>
<video:live>no</video:live>
<video:view_count>65</video:view_count>
<video:publication_date>2026-01-19</video:publication_date>
<video:tag>10zig</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>thin</video:tag>
<video:tag>clients</video:tag>
<video:tag>endpoint</video:tag>
<video:tag>management</video:tag>
<video:tag>vdi</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>work</video:tag>
<video:tag>remote</video:tag>
<video:tag>desktop</video:tag>
<video:tag>secure</video:tag>
<video:tag>endpoints</video:tag>
<video:tag>linux</video:tag>
<video:tag>os</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3768/netarx-ai-deepfakes-human-trust-and-the-next-security-crisis/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3768_1767739914_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Netarx: AI Deepfakes, Human Trust, and the Next Security Crisis]]></video:title>
<video:description><![CDATA[In this inBrief conversation, Mike Matchett speaks with Netarx about how AI‑driven impersonation, deepfakes, and social engineering are reshaping cyber threats.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3768&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1400</video:duration>
<video:live>no</video:live>
<video:view_count>60</video:view_count>
<video:publication_date>2026-01-15</video:publication_date>
<video:tag>netarx</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>disinformation</video:tag>
<video:tag>deepfakes</video:tag>
<video:tag>social</video:tag>
<video:tag>engineering</video:tag>
<video:tag>impersonation</video:tag>
<video:tag>trust</video:tag>
<video:tag>security</video:tag>
<video:tag>ai</video:tag>
<video:tag>security</video:tag>
<video:tag>multimodal</video:tag>
<video:tag>attacks</video:tag>
<video:tag>identity</video:tag>
<video:tag>trust</video:tag>
<video:tag>zero</video:tag>
<video:tag>trust</video:tag>
<video:tag>post‑quantum</video:tag>
<video:tag>blockchain</video:tag>
<video:tag>security</video:tag>
<video:tag>trust</video:tag>
<video:tag>operations</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3751/stormagic-navigating-the-vmware-shakeup-with-lightweight-flexible-storage/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3751_1764005659_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[StorMagic: Navigating the VMware Shakeup with Lightweight, Flexible Storage]]></video:title>
<video:description><![CDATA[As Broadcom’s VMware acquisition sends shockwaves through the industry, StorMagic steps up with a software-defined, two-node HCI alternative built for simplicity, high availability, and centralized fleet management at scale.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3751&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1055</video:duration>
<video:live>no</video:live>
<video:view_count>46</video:view_count>
<video:publication_date>2026-01-14</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>stormagic</video:tag>
<video:tag>hci</video:tag>
<video:tag>hyperconverged</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>vmware</video:tag>
<video:tag>kvm</video:tag>
<video:tag>hypervisor</video:tag>
<video:tag>sds</video:tag>
<video:tag>software-defined</video:tag>
<video:tag>storage</video:tag>
<video:tag>vmware</video:tag>
<video:tag>migration</video:tag>
<video:tag>svhci</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3740/cycognito-rethinking-external-risk-with-real-time-exposure-mapping/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3740_1763053609_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[CyCognito: Rethinking External Risk with Real-Time Exposure Mapping]]></video:title>
<video:description><![CDATA[In this inBrief clip, Mike Matchett speaks with Amit Sheps of CyCognito to explore how traditional vulnerability and risk management approaches leave critical gaps, and how CyCognito’s platform addresses those blind spots.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3740&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>780</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2026-01-13</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cycognito</video:tag>
<video:tag>external</video:tag>
<video:tag>attack</video:tag>
<video:tag>surface</video:tag>
<video:tag>unknown</video:tag>
<video:tag>asset</video:tag>
<video:tag>discovery</video:tag>
<video:tag>continuous</video:tag>
<video:tag>risk</video:tag>
<video:tag>monitoring</video:tag>
<video:tag>seedless</video:tag>
<video:tag>asset</video:tag>
<video:tag>discovery</video:tag>
<video:tag>vulnerability</video:tag>
<video:tag>prioritization</video:tag>
<video:tag>shadow</video:tag>
<video:tag>it</video:tag>
<video:tag>exposure</video:tag>
<video:tag>exploitability</video:tag>
<video:tag>scoring</video:tag>
<video:tag>security</video:tag>
<video:tag>automation</video:tag>
<video:tag>threat</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3734/axoniq-live-demo-building-and-refactoring-apps-with-full-transparency/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3734_1763666849_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Axoniq Live Demo: Building and Refactoring Apps with Full Transparency]]></video:title>
<video:description><![CDATA[Mike Matchett of Small World Big Data sits down with AxonIQ CEO Jessica Reeves to explore the platform’s unique event-sourced architecture for application development. Through a live demo, Reeves walks through how AxonIQ empowers developers to model, b...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3734&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1265</video:duration>
<video:live>no</video:live>
<video:view_count>71</video:view_count>
<video:publication_date>2026-01-10</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>axoniq</video:tag>
<video:tag>ai</video:tag>
<video:tag>development</video:tag>
<video:tag>event</video:tag>
<video:tag>sourcing</video:tag>
<video:tag>vibe</video:tag>
<video:tag>coding</video:tag>
<video:tag>application</video:tag>
<video:tag>monitoring</video:tag>
<video:tag>developer</video:tag>
<video:tag>platform</video:tag>
<video:tag>explainable</video:tag>
<video:tag>ai</video:tag>
<video:tag>ci/cd</video:tag>
<video:tag>integration</video:tag>
<video:tag>business</video:tag>
<video:tag>ontology</video:tag>
<video:tag>rbac</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3762/kognitos-from-prompts-to-process-minus-the-hallucinations/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3762_1765914675_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Kognitos: From Prompts to Process, Minus the Hallucinations]]></video:title>
<video:description><![CDATA[In this inBrief chat, analyst Mike Matchett of Small World Big Data speaks with Binny Gill, Founder and CEO of Kognitos, about the company&#039;s approach to process automation using natural language.Kognitos enables business users to define, execute, and ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3762&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>935</video:duration>
<video:live>no</video:live>
<video:view_count>94</video:view_count>
<video:publication_date>2026-01-05</video:publication_date>
<video:tag>kognitos</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>business</video:tag>
<video:tag>automation</video:tag>
<video:tag>deterministic</video:tag>
<video:tag>ai</video:tag>
<video:tag>process</video:tag>
<video:tag>automation</video:tag>
<video:tag>plain</video:tag>
<video:tag>english</video:tag>
<video:tag>automation</video:tag>
<video:tag>sop</video:tag>
<video:tag>automation</video:tag>
<video:tag>ai</video:tag>
<video:tag>execution</video:tag>
<video:tag>layer</video:tag>
<video:tag>natural</video:tag>
<video:tag>language</video:tag>
<video:tag>workflows</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3763/tray-ai-building-controlled-ai-workflows-across-the-enterprise/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3763_1765916495_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Tray.ai: Building Controlled AI Workflows Across the Enterprise]]></video:title>
<video:description><![CDATA[In this inBrief conversation, Mike Matchett speaks with Rich Waldron, CEO of Tray.ai, about how AI is reshaping integration and automation inside modern enterprises.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3763&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1099</video:duration>
<video:live>no</video:live>
<video:view_count>54</video:view_count>
<video:publication_date>2026-01-04</video:publication_date>
<video:tag>tray</video:tag>
<video:tag>ai</video:tag>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>ai</video:tag>
<video:tag>orchestration</video:tag>
<video:tag>agentic</video:tag>
<video:tag>automation</video:tag>
<video:tag>ipaas</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>integration</video:tag>
<video:tag>ai</video:tag>
<video:tag>agents</video:tag>
<video:tag>agent</video:tag>
<video:tag>gateway</video:tag>
<video:tag>mcp</video:tag>
<video:tag>governance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3767/infinidat-resilient-storage-without-the-cfo-panic/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3767_1766519999_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Infinidat: Resilient Storage Without the CFO Panic]]></video:title>
<video:description><![CDATA[In this inBrief chat, Mike Matchett sits down with Eric Herzog, CMO of Infinidat to explore how they are delivering unmatched performance, availability, and resilience at scale, without the cost and complexity traditionally associated with Tier-1 infra...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3767&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1058</video:duration>
<video:live>no</video:live>
<video:view_count>44</video:view_count>
<video:publication_date>2026-01-02</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>infinidat</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>cloud</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>storage</video:tag>
<video:tag>caching</video:tag>
<video:tag>high</video:tag>
<video:tag>availability</video:tag>
<video:tag>ai</video:tag>
<video:tag>tiering</video:tag>
<video:tag>cyber</video:tag>
<video:tag>resilience</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>it</video:tag>
<video:tag>data</video:tag>
<video:tag>immutability</video:tag>
<video:tag>dr</video:tag>
<video:tag>automation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3765/calero-saas-apps-are-costing-you-more-than-you-think/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3765_1766081069_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Calero: SaaS Apps Are Costing You More Than You Think]]></video:title>
<video:description><![CDATA[In this chat, Mike Matchett sits down with Stephanie Day, VP of SaaS Management at Calero, to discuss the urgent challenges organizations face in managing their SaaS ecosystems.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3765&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>764</video:duration>
<video:live>no</video:live>
<video:view_count>47</video:view_count>
<video:publication_date>2025-12-28</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>calero</video:tag>
<video:tag>saas</video:tag>
<video:tag>sprawl</video:tag>
<video:tag>saas</video:tag>
<video:tag>security</video:tag>
<video:tag>saas</video:tag>
<video:tag>governance</video:tag>
<video:tag>software</video:tag>
<video:tag>visibility</video:tag>
<video:tag>license</video:tag>
<video:tag>management</video:tag>
<video:tag>shadow</video:tag>
<video:tag>it</video:tag>
<video:tag>consumption</video:tag>
<video:tag>billing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3753/trustmi-using-ai-to-secure-the-b2b-payment-lifecycle/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3753_1764620688_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Trustmi: Using AI to Secure the B2B Payment Lifecycle]]></video:title>
<video:description><![CDATA[In this inBrief episode, Mike Matchett of Small World Big Data sits down with Trustmi CEO Shai Gabay to discuss the growing risks around B2B payment fraud and how AI is being applied to prevent financial losses at scale.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3753&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1148</video:duration>
<video:live>no</video:live>
<video:view_count>45</video:view_count>
<video:publication_date>2025-12-21</video:publication_date>
<video:tag>trustmi</video:tag>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>b2b</video:tag>
<video:tag>payment</video:tag>
<video:tag>fraud</video:tag>
<video:tag>ai</video:tag>
<video:tag>fraud</video:tag>
<video:tag>prevention</video:tag>
<video:tag>ap</video:tag>
<video:tag>fraud</video:tag>
<video:tag>finance</video:tag>
<video:tag>security</video:tag>
<video:tag>behavioral</video:tag>
<video:tag>ai</video:tag>
<video:tag>payment</video:tag>
<video:tag>security</video:tag>
<video:tag>platform</video:tag>
<video:tag>vendor</video:tag>
<video:tag>impersonation</video:tag>
<video:tag>generative</video:tag>
<video:tag>ai</video:tag>
<video:tag>fraud</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>payments</video:tag>
<video:tag>invoice</video:tag>
<video:tag>fraud</video:tag>
<video:tag>payment</video:tag>
<video:tag>validation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3759/cy4data-labs-encrypt-everything-everywhere-all-at-once/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3759_1765483455_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cy4Data Labs: Encrypt Everything, Everywhere, All at Once]]></video:title>
<video:description><![CDATA[In this chat, Mike Matchett of Small World Big Data talks with Lance Smith, Co-Founder &amp; CEO of Cy4Data Labs about the growing disconnect between traditional data‑security models and the realities of modern cyber risk.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3759&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1181</video:duration>
<video:live>no</video:live>
<video:view_count>40</video:view_count>
<video:publication_date>2025-12-21</video:publication_date>
<video:tag>cy4data</video:tag>
<video:tag>labs</video:tag>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>encryption</video:tag>
<video:tag>threat</video:tag>
<video:tag>detection</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>cve</video:tag>
<video:tag>risk</video:tag>
<video:tag>database</video:tag>
<video:tag>encryption</video:tag>
<video:tag>endpoint</video:tag>
<video:tag>security</video:tag>
<video:tag>data</video:tag>
<video:tag>breach</video:tag>
<video:tag>protection</video:tag>
<video:tag>zero</video:tag>
<video:tag>trust</video:tag>
<video:tag>data</video:tag>
<video:tag>ai-driven</video:tag>
<video:tag>security</video:tag>
<video:tag>encryption</video:tag>
<video:tag>in</video:tag>
<video:tag>memory</video:tag>
<video:tag>selective</video:tag>
<video:tag>decryption</video:tag>
<video:tag>data</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3760/cayosoft-the-one-stop-admin-shop-you-didnt-know-you-needed/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3760_1765574436_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cayosoft: The One-Stop Admin Shop You Didn’t Know You Needed]]></video:title>
<video:description><![CDATA[In this chat, Mike Matchett of Small World Big Data sits down with Craig Birch, Principal Security Engineer at Cayosoft, to explore why identity has become the #1 attack vector and how most organizations are dangerously unprepared.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3760&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1181</video:duration>
<video:live>no</video:live>
<video:view_count>68</video:view_count>
<video:publication_date>2025-12-21</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cayosoft</video:tag>
<video:tag>security</video:tag>
<video:tag>active</video:tag>
<video:tag>directory</video:tag>
<video:tag>ad</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3729/tintri-unifying-storage-for-vms-containers-databases/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3729_1761763355_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Tintri: Unifying Storage for VMs, Containers &amp; Databases]]></video:title>
<video:description><![CDATA[In this inBrief chat, Mike Matchett of Small World Big Data speaks with Tintri CTO Brock Mowry about how their platform offers deep visibility and performance management at the granularity of a single VM, vDisk, or Kubernetes persistent volume.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3729&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1072</video:duration>
<video:live>no</video:live>
<video:view_count>62</video:view_count>
<video:publication_date>2025-12-03</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>tintri</video:tag>
<video:tag>vmstore</video:tag>
<video:tag>kubernetes</video:tag>
<video:tag>storage</video:tag>
<video:tag>containerized</video:tag>
<video:tag>workloads</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>cloud</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>csi</video:tag>
<video:tag>driver</video:tag>
<video:tag>persistent</video:tag>
<video:tag>volumes</video:tag>
<video:tag>storage</video:tag>
<video:tag>analytics</video:tag>
<video:tag>performance</video:tag>
<video:tag>optimization</video:tag>
<video:tag>scalable</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3748/storpool-infrastructure-stability-for-oracle-vm-environments/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3748_1764792293_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[StorPool: Infrastructure Stability for Oracle VM Environments]]></video:title>
<video:description><![CDATA[In this inBrief chat, Mike Matchett speaks with Alex Ivanov, Head of Product at StorPool, about the company’s continued presence in the software-defined block storage space.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3748&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>719</video:duration>
<video:live>no</video:live>
<video:view_count>56</video:view_count>
<video:publication_date>2025-12-03</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>storpool</video:tag>
<video:tag>block</video:tag>
<video:tag>storage</video:tag>
<video:tag>virtualization</video:tag>
<video:tag>oracle</video:tag>
<video:tag>virtualization</video:tag>
<video:tag>software</video:tag>
<video:tag>defined</video:tag>
<video:tag>storage</video:tag>
<video:tag>hci</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>it</video:tag>
<video:tag>vmware</video:tag>
<video:tag>alternatives</video:tag>
<video:tag>data</video:tag>
<video:tag>infrastructure</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3750/devolutions-rdm-a-leap-in-remote-it-management/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3750_1763660372_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Devolutions RDM: A Leap in Remote IT Management]]></video:title>
<video:description><![CDATA[In this chat, Mike Matchett sits down with Marc-Andre Moreau, CTO of Devolutions, to explore how AI can go from passive advisor to active IT assistant.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3750&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>909</video:duration>
<video:live>no</video:live>
<video:view_count>96</video:view_count>
<video:publication_date>2025-12-02</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>devolutions</video:tag>
<video:tag>rdm</video:tag>
<video:tag>remote</video:tag>
<video:tag>desktop</video:tag>
<video:tag>ai</video:tag>
<video:tag>integration</video:tag>
<video:tag>ai</video:tag>
<video:tag>remote</video:tag>
<video:tag>execution</video:tag>
<video:tag>mcp</video:tag>
<video:tag>protocol</video:tag>
<video:tag>llm</video:tag>
<video:tag>productivity</video:tag>
<video:tag>tools</video:tag>
<video:tag>devops</video:tag>
<video:tag>ai</video:tag>
<video:tag>assistant</video:tag>
<video:tag>secure</video:tag>
<video:tag>remote</video:tag>
<video:tag>access</video:tag>
<video:tag>tools</video:tag>
<video:tag>powershell</video:tag>
<video:tag>ai</video:tag>
<video:tag>automation</video:tag>
<video:tag>chatops</video:tag>
<video:tag>execution</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3728/env-zero-infrastructure-as-code-grows-up/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3728_1761687149_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[env zero: Infrastructure as Code Grows Up]]></video:title>
<video:description><![CDATA[Analyst Mike Matchett of Small World Big Data sits down with Chris Graham, Chief Marketing Officer of env zero, to explore the growing impact of Infrastructure as Code (IaC) and platform engineering in today’s cloud-native enterprises.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3728&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>974</video:duration>
<video:live>no</video:live>
<video:view_count>45</video:view_count>
<video:publication_date>2025-11-20</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>environment</video:tag>
<video:tag>zero</video:tag>
<video:tag>iac</video:tag>
<video:tag>governance</video:tag>
<video:tag>platform</video:tag>
<video:tag>engineering</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>as</video:tag>
<video:tag>code</video:tag>
<video:tag>ai-powered</video:tag>
<video:tag>devops</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
<video:tag>automation</video:tag>
<video:tag>drift</video:tag>
<video:tag>detection</video:tag>
<video:tag>terraform</video:tag>
<video:tag>compliance</video:tag>
<video:tag>gitops</video:tag>
<video:tag>pipelines</video:tag>
<video:tag>cloud</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>control</video:tag>
<video:tag>developer</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3731/celerdata-breaking-the-data-pipeline-for-real-time-analytics/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3731_1762458327_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[CelerData: Breaking the Data Pipeline for Real-Time Analytics]]></video:title>
<video:description><![CDATA[In this interview, Mike Matchett of Small World Big Data sits down with Sida Shen, Product Manager at CelerData, to discuss the release of StarRocks 4.0 and how it’s redefining performance for the modern data lakehouse.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3731&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1303</video:duration>
<video:live>no</video:live>
<video:view_count>61</video:view_count>
<video:publication_date>2025-11-20</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>celerdata</video:tag>
<video:tag>starrocks</video:tag>
<video:tag>starrocks</video:tag>
<video:tag>4</video:tag>
<video:tag>0</video:tag>
<video:tag>data</video:tag>
<video:tag>lakehouse</video:tag>
<video:tag>mpp</video:tag>
<video:tag>database</video:tag>
<video:tag>real-time</video:tag>
<video:tag>analytics</video:tag>
<video:tag>apache</video:tag>
<video:tag>iceberg</video:tag>
<video:tag>delta</video:tag>
<video:tag>lake</video:tag>
<video:tag>vectorized</video:tag>
<video:tag>execution</video:tag>
<video:tag>ai</video:tag>
<video:tag>data</video:tag>
<video:tag>infrastructure</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3749/inside-trend-micro-s-ai-security-report-exposed-inference-prompt-leaks-and-deepfake-abuse/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3749_1763586468_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Inside the Trend Micro AI Security Report: Exposed Inference, Prompt Leaks, and Deepfake Abuse]]></video:title>
<video:description><![CDATA[Trend Micro’s 1H 2025 AI Security Report reveals real attacks on AI infrastructure, exposed inference servers, evolving LLM risks, and rising deepfake-driven fraud.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3749&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>368</video:duration>
<video:view_count>48</video:view_count>
<video:publication_date>2025-11-19</video:publication_date>
<video:tag>trendmicro</video:tag>
<video:tag>security</video:tag>
<video:tag>ai</video:tag>
<video:tag>2025</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3746/huntress-how-siem-detected-vpn-compromise-before-became-intrusion/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3746_1763247788_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Huntress: How SIEM Detected a VPN Compromise Before It Became an Intrusion]]></video:title>
<video:description><![CDATA[Huntress shows how a SIEM alert exposed a VPN compromise at login and how MFA controls helped stop the intrusion before escalation.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3746&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>388</video:duration>
<video:view_count>47</video:view_count>
<video:publication_date>2025-11-15</video:publication_date>
<video:tag>huntress</video:tag>
<video:tag>itdr</video:tag>
<video:tag>edr</video:tag>
<video:tag>endpoint</video:tag>
<video:tag>detection</video:tag>
<video:tag>and</video:tag>
<video:tag>response</video:tag>
<video:tag>identity</video:tag>
<video:tag>threat</video:tag>
<video:tag>detection</video:tag>
<video:tag>siem</video:tag>
<video:tag>security</video:tag>
<video:tag>awareness</video:tag>
<video:tag>training</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>msp</video:tag>
<video:tag>it</video:tag>
<video:tag>information</video:tag>
<video:tag>security</video:tag>
<video:tag>infosec</video:tag>
<video:tag>network</video:tag>
<video:tag>security</video:tag>
<video:tag>anitvirus</video:tag>
<video:tag>av</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3745/wallarm-go-beyond-wafs-and-gateways/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3745_1763209623_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Wallarm: Go Beyond WAFs and Gateways – Manage API Risk, Resilience, and Response at Scale ]]></video:title>
<video:description><![CDATA[APIs are powering digital transformation but also exposing organizations to new risks. Securing them requires collaboration between CISOs, CIOs, and the board. This webinar will demystify the evolving API threat landscape, outline governance strategies...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3745&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3510</video:duration>
<video:view_count>46</video:view_count>
<video:publication_date>2025-11-15</video:publication_date>
<video:tag>wallarm</video:tag>
<video:tag>api</video:tag>
<video:tag>wafs</video:tag>
<video:tag>security</video:tag>
<video:tag>ciso</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3739/the-ethics-of-paying-up-compliance-vs-consequences-continuous-compliance-ep-3/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3739_1762909891_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Commvault: Cyber Resilience, Data Leak Impact, and Policy Trade‑offs]]></video:title>
<video:description><![CDATA[In this episode of Continuous Compliance, Danielle Sheer is joined by two of her Commvault colleagues: Darren Thomson, Field CTO EMEA, and Jakub Lewandowski, Associate General Counsel EMEA. Using the UK’s proposed ransomware payment ban as a springboar...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3739&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1954</video:duration>
<video:view_count>48</video:view_count>
<video:publication_date>2025-11-11</video:publication_date>
<video:tag>commvault</video:tag>
<video:tag>cleanroom</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>compliance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3738/coheisty-ai-powered-data-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3738_1762827016_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cohesity&#039;s AI-Powered Data Security: Protection, Advanced Security, and Insights at Enterprise Scale]]></video:title>
<video:description><![CDATA[Cohesity CEO &amp; President Sanjay Poonen outlines how we are delivering on our mission to protect, secure, and provide insights into the world’s data and why 70% of Global 500 companies rely on us for their cyber resilience. Learn more at: www.cohesity.c...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3738&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>600</video:duration>
<video:view_count>53</video:view_count>
<video:publication_date>2025-11-10</video:publication_date>
<video:tag>accelerate</video:tag>
<video:tag>your</video:tag>
<video:tag>cyber</video:tag>
<video:tag>resilience</video:tag>
<video:tag>journey</video:tag>
<video:tag>with</video:tag>
<video:tag>cohesity</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3737/veeam-phish-to-foothold-how-a-vpn-gap-became-an-enterprise-wide-incident—and-what-it-can-learn/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3737_1773347216_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[From Phish to Foothold: How a VPN Gap Became an Enterprise-Wide Incident and What IT Can Learn]]></video:title>
<video:description><![CDATA[Even the best defenses can be tested. In this episode of Wake Up, the podcast by Veeam, Caroline Wong and Michael Irwin unpack how one organization faced a nation-state cyberattack and what it revealed about leadership under pressure. Through real-worl...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3737&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2328</video:duration>
<video:view_count>46</video:view_count>
<video:publication_date>2025-11-10</video:publication_date>
<video:tag>veeam</video:tag>
<video:tag>virtualization</video:tag>
<video:tag>backup</video:tag>
<video:tag>disaster</video:tag>
<video:tag>recovery</video:tag>
<video:tag>availability</video:tag>
<video:tag>recovery</video:tag>
<video:tag>replication</video:tag>
<video:tag>data</video:tag>
<video:tag>availability</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>backup</video:tag>
<video:tag>and</video:tag>
<video:tag>restore</video:tag>
<video:tag>backup</video:tag>
<video:tag>and</video:tag>
<video:tag>recovery</video:tag>
<video:tag>data</video:tag>
<video:tag>recovery</video:tag>
<video:tag>veeam</video:tag>
<video:tag>availability</video:tag>
<video:tag>suite</video:tag>
<video:tag>veeam</video:tag>
<video:tag>availability</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3733/elevate-your-data-security-posture-with-managed-data-detection-and-response/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3733_1762777449_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Druva: Managed Data Detection and Response (MDDR) Shields Backups from Modern Ransomware]]></video:title>
<video:description><![CDATA[Learn how Druva’s Managed Data Detection and Response (MDDR) defends backup systems from modern ransomware, closing visibility gaps and enabling rapid, clean recovery for IT teams.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3733&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>468</video:duration>
<video:view_count>52</video:view_count>
<video:publication_date>2025-11-10</video:publication_date>
<video:tag>data</video:tag>
<video:tag>security</video:tag>
<video:tag>threat</video:tag>
<video:tag>hunting</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>deduplication</video:tag>
<video:tag>microsoft</video:tag>
<video:tag>365</video:tag>
<video:tag>backup</video:tag>
<video:tag>vmware</video:tag>
<video:tag>backup</video:tag>
<video:tag>disaster</video:tag>
<video:tag>recovery</video:tag>
<video:tag>ediscovery</video:tag>
<video:tag>saas</video:tag>
<video:tag>backup</video:tag>
<video:tag>data</video:tag>
<video:tag>center</video:tag>
<video:tag>backup</video:tag>
<video:tag>aws</video:tag>
<video:tag>backup</video:tag>
<video:tag>endpoint</video:tag>
<video:tag>backup</video:tag>
<video:tag>remote</video:tag>
<video:tag>office</video:tag>
<video:tag>backup</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>cloud</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3732/what-is-dspm-data-security-posture-management-how-it-protects-your-company-cyera-data-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3732_1762697461_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cyera: All About Data Security Posture Management (DSPM)]]></video:title>
<video:description><![CDATA[Learn exactly what DSPM (Data Security Posture Management) is and how it protects your company&#039;s sensitive data. In this video, Michael Ferguson, Cyera Data Security Services Architect, explains how DSPM integrates with your existing security tools, s...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3732&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>279</video:duration>
<video:view_count>58</video:view_count>
<video:publication_date>2025-11-09</video:publication_date>
<video:tag>dspm</video:tag>
<video:tag>data</video:tag>
<video:tag>security</video:tag>
<video:tag>posture</video:tag>
<video:tag>management</video:tag>
<video:tag>compliance</video:tag>
<video:tag>data</video:tag>
<video:tag>classification</video:tag>
<video:tag>data</video:tag>
<video:tag>governance</video:tag>
<video:tag>cloud</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3730/netskope-for-aws/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3730_1762697424_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How Netskope One Strengthens AWS Security: Posture, Rogue Account Governance, and Real-Time Enforcement]]></video:title>
<video:description><![CDATA[Learn how Netskope One strengthens AWS security posture, detects rogue accounts, and blocks destructive actions in real time across console and CLI.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3730&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>536</video:duration>
<video:view_count>49</video:view_count>
<video:publication_date>2025-11-04</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>aws</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3724/axoniq-why-ai-needs-an-event-driven-foundation/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3724_1758555198_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Axoniq: Why AI Needs an Event-Driven Foundation]]></video:title>
<video:description><![CDATA[Mike Matchett of Small World Big Data sits down with Jessica Reeves, CEO of AxonIQ, to explore how event-driven architecture is fast becoming the critical foundation for enabling intelligent AI agent networks.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3724&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>925</video:duration>
<video:live>no</video:live>
<video:view_count>108</video:view_count>
<video:publication_date>2025-09-30</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>axoniq</video:tag>
<video:tag>event-driven</video:tag>
<video:tag>architecture</video:tag>
<video:tag>ai</video:tag>
<video:tag>agents</video:tag>
<video:tag>event</video:tag>
<video:tag>sourcing</video:tag>
<video:tag>backend</video:tag>
<video:tag>modernization</video:tag>
<video:tag>microservices</video:tag>
<video:tag>data</video:tag>
<video:tag>lineage</video:tag>
<video:tag>application</video:tag>
<video:tag>orchestration</video:tag>
<video:tag>real-time</video:tag>
<video:tag>processing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3716/auditoria-ai-agents-take-on-finance-inbox-overload/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3716_1753980955_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Auditoria: AI Agents Take on Finance Inbox Overload]]></video:title>
<video:description><![CDATA[Mike Matchett of Small World Big Data speaks with Nick Ezzo from Auditoria about the growing role of AI in finance and accounting. While sales and marketing teams have long benefited from advanced tools, finance departments are often left managing larg...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3716&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1029</video:duration>
<video:live>no</video:live>
<video:view_count>95</video:view_count>
<video:publication_date>2025-08-27</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>auditoria</video:tag>
<video:tag>ai</video:tag>
<video:tag>in</video:tag>
<video:tag>finance</video:tag>
<video:tag>ap</video:tag>
<video:tag>automation</video:tag>
<video:tag>ar</video:tag>
<video:tag>automation</video:tag>
<video:tag>finance</video:tag>
<video:tag>bots</video:tag>
<video:tag>accounting</video:tag>
<video:tag>automation</video:tag>
<video:tag>erp</video:tag>
<video:tag>integration</video:tag>
<video:tag>ai</video:tag>
<video:tag>email</video:tag>
<video:tag>triage</video:tag>
<video:tag>financial</video:tag>
<video:tag>operations</video:tag>
<video:tag>natural</video:tag>
<video:tag>language</video:tag>
<video:tag>ai</video:tag>
<video:tag>for</video:tag>
<video:tag>finance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3715/c-gen-ai-observability-efficiency-and-a-physics-mindset/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3715_1753718916_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[C-Gen.ai: Observability, Efficiency and a Physics Mindset]]></video:title>
<video:description><![CDATA[Mike Matchett talks with C-Gen.ai founder Sami Kama, a physicist with roots at CERN, Nvidia, and AWS, about why GPU-heavy AI clusters still fall short of real efficiency.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3715&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1441</video:duration>
<video:live>no</video:live>
<video:view_count>51</video:view_count>
<video:publication_date>2025-08-27</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>c-gen</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>cluster</video:tag>
<video:tag>cern</video:tag>
<video:tag>nvidia</video:tag>
<video:tag>aws</video:tag>
<video:tag>gpu</video:tag>
<video:tag>efficiency</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>super</video:tag>
<video:tag>computer</video:tag>
<video:tag>converged</video:tag>
<video:tag>convergence</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3717/emergence-ai-automating-analytics-with-runtime-agent-creation/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3717_1755817095_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Emergence AI: Automating Analytics with Runtime Agent Creation]]></video:title>
<video:description><![CDATA[Emergence’s platform, CRAFT, allows users to create and deploy agents using only natural language, enabling both technical and non-technical users to access insights from data without writing code.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3717&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>904</video:duration>
<video:live>no</video:live>
<video:view_count>104</video:view_count>
<video:publication_date>2025-08-26</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>emergence</video:tag>
<video:tag>ai</video:tag>
<video:tag>ai</video:tag>
<video:tag>agents</video:tag>
<video:tag>data</video:tag>
<video:tag>science</video:tag>
<video:tag>automation</video:tag>
<video:tag>natural</video:tag>
<video:tag>language</video:tag>
<video:tag>analytics</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>ai</video:tag>
<video:tag>tools</video:tag>
<video:tag>no-code</video:tag>
<video:tag>data</video:tag>
<video:tag>workflows</video:tag>
<video:tag>multi-agent</video:tag>
<video:tag>systems</video:tag>
<video:tag>ai</video:tag>
<video:tag>orchestration</video:tag>
<video:tag>runtime</video:tag>
<video:tag>agent</video:tag>
<video:tag>creation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3703/mindgard-red-teaming-ai-so-you-dont-end-up-in-the-headlines/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3703_1749671297_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Mindgard: Red Teaming AI So You Don’t End Up in the Headlines]]></video:title>
<video:description><![CDATA[Mindgard brings automated and continuous red teaming to the world of AI, helping security teams identify vulnerabilities across not just models, but full AI-driven systems.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3703&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1378</video:duration>
<video:live>no</video:live>
<video:view_count>66</video:view_count>
<video:publication_date>2025-08-20</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>mindgard</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>ai</video:tag>
<video:tag>applications</video:tag>
<video:tag>ai</video:tag>
<video:tag>apps</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>redteaming</video:tag>
<video:tag>red</video:tag>
<video:tag>teaming</video:tag>
<video:tag>exploit</video:tag>
<video:tag>exploits</video:tag>
<video:tag>threat</video:tag>
<video:tag>model</video:tag>
<video:tag>attack</video:tag>
<video:tag>surface</video:tag>
<video:tag>devsecops</video:tag>
<video:tag>secops</video:tag>
<video:tag>devops</video:tag>
<video:tag>chatbot</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3707/zerve-building-llm-apps-and-apis-through-visual-coding/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3707_1753369394_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Zerve: Building LLM Apps and APIs Through Visual Coding]]></video:title>
<video:description><![CDATA[Zerve provides a code-first platform for data scientists and AI developers, aiming to streamline the journey from prototype to production.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3707&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>611</video:duration>
<video:live>no</video:live>
<video:view_count>71</video:view_count>
<video:publication_date>2025-08-20</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>zerve</video:tag>
<video:tag>data</video:tag>
<video:tag>science</video:tag>
<video:tag>productivity</video:tag>
<video:tag>llm</video:tag>
<video:tag>development</video:tag>
<video:tag>ai</video:tag>
<video:tag>agents</video:tag>
<video:tag>directed</video:tag>
<video:tag>acyclic</video:tag>
<video:tag>graphs</video:tag>
<video:tag>(dags)</video:tag>
<video:tag>human-agent</video:tag>
<video:tag>collaboration</video:tag>
<video:tag>ci/cd</video:tag>
<video:tag>cloud</video:tag>
<video:tag>provisioning</video:tag>
<video:tag>containerization</video:tag>
<video:tag>ai</video:tag>
<video:tag>agent</video:tag>
<video:tag>ai-powered</video:tag>
<video:tag>agent</video:tag>
<video:tag>dag</video:tag>
<video:tag>jupyter</video:tag>
<video:tag>api</video:tag>
<video:tag>secure</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3702/trustmi-its-not-just-ransomware-thats-draining-your-wallet/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3702_1752248947_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Trustmi: It’s Not Just Ransomware That’s Draining Your Wallet]]></video:title>
<video:description><![CDATA[From deepfaked vendor emails to weaponized invoice edits, TrustMi monitors multimodal signals across your business systems to spot fraud before funds fly out the door.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3702&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>817</video:duration>
<video:live>no</video:live>
<video:view_count>63</video:view_count>
<video:publication_date>2025-08-16</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>trustmi</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>cyberattack</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>ai</video:tag>
<video:tag>articial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>risk</video:tag>
<video:tag>monitoring</video:tag>
<video:tag>malware</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3706/spektion-from-static-lists-to-behavioral-threat-intelligence/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3706_1751482537_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Spektion: From Static Lists to Behavioral Threat Intelligence]]></video:title>
<video:description><![CDATA[With a sensor-based, passive deployment model and support for large-scale environments, Spektion’s platform brings visibility into both installed and running software, including components not easily captured by static scans.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3706&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>898</video:duration>
<video:live>no</video:live>
<video:view_count>69</video:view_count>
<video:publication_date>2025-07-10</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>spektion</video:tag>
<video:tag>runtime</video:tag>
<video:tag>vulnerability</video:tag>
<video:tag>management</video:tag>
<video:tag>cve</video:tag>
<video:tag>software</video:tag>
<video:tag>security</video:tag>
<video:tag>detection</video:tag>
<video:tag>risk</video:tag>
<video:tag>surface</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3701/cyware-playbooks-not-panic/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3701_1748465718_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cyware: Playbooks, Not Panic]]></video:title>
<video:description><![CDATA[ With a full SOAR stack, Cyware empowers security teams to ingest threat intel, automate playbooks, and collaborate across organizational boundaries in real time.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3701&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>667</video:duration>
<video:live>no</video:live>
<video:view_count>70</video:view_count>
<video:publication_date>2025-07-07</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cyware</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>soar</video:tag>
<video:tag>threat</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>playbooks</video:tag>
<video:tag>incident</video:tag>
<video:tag>response</video:tag>
<video:tag>security</video:tag>
<video:tag>automation</video:tag>
<video:tag>cyber</video:tag>
<video:tag>collaboration</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3700/nexsan-curating-value-from-data-across-the-enterprise/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3700_1751911363_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Nexsan: Curating Value From Data Across the Enterprise]]></video:title>
<video:description><![CDATA[In this inBrief interview, Mike Matchett of Small World Big Data sits down with Nexsan CEO Vincent Phillips to discuss changing industry trends in storage, including changing approaches to AI, the need to protect and recover from cybersecurity threats,...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3700&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1010</video:duration>
<video:live>no</video:live>
<video:view_count>93</video:view_count>
<video:publication_date>2025-06-27</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>nexsan</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>immutable</video:tag>
<video:tag>storage</video:tag>
<video:tag>air-gapped</video:tag>
<video:tag>backups</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>compliance</video:tag>
<video:tag>assureon</video:tag>
<video:tag>unity</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3698/lineaje-self-healing-code-or-just-magic/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3698_1747950364_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Lineaje: Self-Healing Code or Just Magic?]]></video:title>
<video:description><![CDATA[Mike Matchett talks with Nick Mistry of Lineaje about today’s open-source software risk and why your SBOM isn’t enough. Mistry explains how 90% of modern software is built on open-source components, often with 60+ layers of nested dependencies. With ba...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3698&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>564</video:duration>
<video:live>no</video:live>
<video:view_count>70</video:view_count>
<video:publication_date>2025-06-18</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>lineaje</video:tag>
<video:tag>sbom</video:tag>
<video:tag>security</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>data</video:tag>
<video:tag>security</video:tag>
<video:tag>open-source</video:tag>
<video:tag>dependency</video:tag>
<video:tag>dependencies</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3648/ferroque-systems-making-hybrid-work-less-of-a-hot-mess/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3648_1749221398_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Ferroque Systems: Making Hybrid Work Less of a Hot Mess]]></video:title>
<video:description><![CDATA[In this conversation, Michael Shuster, CEO of Ferroque Systems, joins Dave Littman to unpack the evolution of end user computing into a broader, more strategic discipline: End user infrastructure (EUI).]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3648&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1281</video:duration>
<video:live>no</video:live>
<video:view_count>63</video:view_count>
<video:publication_date>2025-06-13</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>ferroque</video:tag>
<video:tag>systems</video:tag>
<video:tag>euc</video:tag>
<video:tag>end-user</video:tag>
<video:tag>computing</video:tag>
<video:tag>end-user</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>eui</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>work</video:tag>
<video:tag>remote</video:tag>
<video:tag>work</video:tag>
<video:tag>services</video:tag>
<video:tag>vdi</video:tag>
<video:tag>cloud</video:tag>
<video:tag>distributed</video:tag>
<video:tag>work</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3697/cdata-talk-sql-to-me/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3697_1747949118_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[CData: Talk SQL to Me]]></video:title>
<video:description><![CDATA[In this recent interview, Mike Matchett of Small World Big Data talks with CData CEO Amit Sharma about connecting structured business data to generative AI.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3697&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>742</video:duration>
<video:live>no</video:live>
<video:view_count>136</video:view_count>
<video:publication_date>2025-05-28</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cdata</video:tag>
<video:tag>generative</video:tag>
<video:tag>ai</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>salesforce</video:tag>
<video:tag>mcp</video:tag>
<video:tag>server</video:tag>
<video:tag>llm</video:tag>
<video:tag>llms</video:tag>
<video:tag>sql</video:tag>
<video:tag>queries</video:tag>
<video:tag>saas</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3699/asigras-saasassure-for-when-your-saas-data-goes-poof/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3699_1748014686_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Asigra’s SaaSAssure: For When Your SaaS Data Goes Poof!]]></video:title>
<video:description><![CDATA[SaaSAssure offers dedicated backup and restore for M365, Google Workspace, HubSpot, QuickBooks, and more.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3699&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1234</video:duration>
<video:live>no</video:live>
<video:view_count>56</video:view_count>
<video:publication_date>2025-05-23</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>asigra</video:tag>
<video:tag>saasassure</video:tag>
<video:tag>backup</video:tag>
<video:tag>restore</video:tag>
<video:tag>m365</video:tag>
<video:tag>google</video:tag>
<video:tag>workspace</video:tag>
<video:tag>hubspot</video:tag>
<video:tag>quickbooks</video:tag>
<video:tag>saas</video:tag>
<video:tag>data</video:tag>
<video:tag>mpa</video:tag>
<video:tag>phishing</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3689/rsa-the-og-of-iam-still-has-moves/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3689_1746826596_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[RSA: The OG of IAM Still Has Moves]]></video:title>
<video:description><![CDATA[With deep roots in authentication, RSA has evolved to deliver modern IGA (Identity Governance and Administration) built to scale and adapt.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3689&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>893</video:duration>
<video:live>no</video:live>
<video:view_count>93</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>rsa</video:tag>
<video:tag>identity</video:tag>
<video:tag>governance</video:tag>
<video:tag>iga</video:tag>
<video:tag>iam</video:tag>
<video:tag>zero</video:tag>
<video:tag>trust</video:tag>
<video:tag>access</video:tag>
<video:tag>management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3688/sonicwall-firewalls-dont-have-to-be-fancy…just-fast/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3688_1746826496_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[SonicWall: Firewalls Don’t Have to Be Fancy…Just Fast]]></video:title>
<video:description><![CDATA[ With solutions that prioritize affordability, simplicity, and coverage, SonicWall continues to serve education, local government, and small enterprise with a practical approach.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3688&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>526</video:duration>
<video:live>no</video:live>
<video:view_count>63</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>sonicwall</video:tag>
<video:tag>firewall</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>prevention</video:tag>
<video:tag>endpoint</video:tag>
<video:tag>security</video:tag>
<video:tag>network</video:tag>
<video:tag>protection</video:tag>
<video:tag>smb</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3687/security-scorecard-dont-just-guess-score-your-supply-chain/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3687_1746826397_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[SecurityScorecard: Don’t Just Guess, Score Your Supply Chain]]></video:title>
<video:description><![CDATA[With threat intelligence, attack surface mapping, and a ‘clearinghouse’ model for remediation, Security Scorecard turns third-party risk into a measurable, manageable process. Because a signed form doesn’t stop a zero-day.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3687&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>556</video:duration>
<video:live>no</video:live>
<video:view_count>55</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>security</video:tag>
<video:tag>scorecard</video:tag>
<video:tag>third-party</video:tag>
<video:tag>risk</video:tag>
<video:tag>vendor</video:tag>
<video:tag>management</video:tag>
<video:tag>supply</video:tag>
<video:tag>chain</video:tag>
<video:tag>security</video:tag>
<video:tag>security</video:tag>
<video:tag>ratings</video:tag>
<video:tag>breach</video:tag>
<video:tag>likelihood</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3686/rewind-backups-youll-brag-about-restores-too/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3686_1746826303_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Rewind: Backups You’ll Brag About (Restores Too)]]></video:title>
<video:description><![CDATA[Rewind protects critical SaaS apps like GitHub, Jira, and QuickBooks, offering granular recovery, centralized control, and transparency into shared responsibility.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3686&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>353</video:duration>
<video:live>no</video:live>
<video:view_count>63</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>rewind</video:tag>
<video:tag>saas</video:tag>
<video:tag>backup</video:tag>
<video:tag>data</video:tag>
<video:tag>recovery</video:tag>
<video:tag>shared</video:tag>
<video:tag>responsibility</video:tag>
<video:tag>model</video:tag>
<video:tag>data</video:tag>
<video:tag>loss</video:tag>
<video:tag>prevention</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3685/n-able-patch-now-or-pay-later/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3685_1746826199_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[N-able: Patch Now or Pay Later]]></video:title>
<video:description><![CDATA[N-able empowers MSPs and mid-sized enterprises with unified solutions that span patching, asset management, detection, response, and data recovery.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3685&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>459</video:duration>
<video:live>no</video:live>
<video:view_count>88</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>nable</video:tag>
<video:tag>n-able</video:tag>
<video:tag>it</video:tag>
<video:tag>and</video:tag>
<video:tag>security</video:tag>
<video:tag>convergence</video:tag>
<video:tag>patch</video:tag>
<video:tag>management</video:tag>
<video:tag>resilience</video:tag>
<video:tag>xdr</video:tag>
<video:tag>msp</video:tag>
<video:tag>tools</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3684/mimecast-stop-phishing-with-a-human-firewall-and-ai-backup/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3684_1746826092_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Mimecast: Stop Phishing with a Human Firewall and AI Backup]]></video:title>
<video:description><![CDATA[Mimecast’s platform maps behavior across individuals, departments, and geographies, generating real-time risk scores that trigger smarter responses—from training to access adjustments.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3684&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>434</video:duration>
<video:live>no</video:live>
<video:view_count>58</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>mimecast</video:tag>
<video:tag>email</video:tag>
<video:tag>security</video:tag>
<video:tag>human</video:tag>
<video:tag>risk</video:tag>
<video:tag>insider</video:tag>
<video:tag>threats</video:tag>
<video:tag>dlp</video:tag>
<video:tag>ai</video:tag>
<video:tag>in</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3683/knowbe4-users-gonna-click-knowbe4s-got-your-back/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3683_1746825995_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[KnowBe4: Users Gonna Click, KnowBe4’s Got Your Back]]></video:title>
<video:description><![CDATA[KnowBe4’s human risk management platform goes beyond awareness training to influence behavior, build skepticism, and shape a security-minded culture.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3683&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>408</video:duration>
<video:live>no</video:live>
<video:view_count>44</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>knowbe4</video:tag>
<video:tag>security</video:tag>
<video:tag>awareness</video:tag>
<video:tag>phishing</video:tag>
<video:tag>prevention</video:tag>
<video:tag>human</video:tag>
<video:tag>risk</video:tag>
<video:tag>management</video:tag>
<video:tag>social</video:tag>
<video:tag>engineering</video:tag>
<video:tag>email</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3682/infinidat-backup-is-boring-until-it-saves-your-job/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3682_1746825890_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Infinidat: Backup Is Boring. Until It Saves Your Job!]]></video:title>
<video:description><![CDATA[With cyberattacks seen as inevitable, Infinidat focuses on both resilience—reducing threat windows—and recovery, validating clean data and orchestrating fast restores.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3682&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>498</video:duration>
<video:live>no</video:live>
<video:view_count>56</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>infinidat</video:tag>
<video:tag>cyber</video:tag>
<video:tag>resilience</video:tag>
<video:tag>storage</video:tag>
<video:tag>security</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>recovery</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3681/gitguardian-your-codebase-is-a-leaky-boat-gitguardian-brings-the-bucket/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3681_1746825774_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[GitGuardian: Your Codebase Is a Leaky Boat. GitGuardian Brings the Bucket]]></video:title>
<video:description><![CDATA[GitGuardian scans every corner of your codebase, CI/CD pipeline, and internal repos to detect hardcoded credentials and sensitive info.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3681&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>605</video:duration>
<video:live>no</video:live>
<video:view_count>55</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>gitguardian</video:tag>
<video:tag>secrets</video:tag>
<video:tag>management</video:tag>
<video:tag>devsecops</video:tag>
<video:tag>hardcoded</video:tag>
<video:tag>credentials</video:tag>
<video:tag>sdlc</video:tag>
<video:tag>security</video:tag>
<video:tag>code</video:tag>
<video:tag>scanning</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3680/blackpoint-cyber-mdr-that-doesnt-just-detect-it-hunts-back/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3680_1746825686_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Blackpoint Cyber: MDR That Doesn’t Just Detect, It Hunts Back]]></video:title>
<video:description><![CDATA[With real-time detection, 24/7 response, and a built-in security ecosystem, Blackpoint delivers SOC-level protection without the bloat.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3680&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>458</video:duration>
<video:live>no</video:live>
<video:view_count>79</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>blackpoint</video:tag>
<video:tag>cyber</video:tag>
<video:tag>mdr</video:tag>
<video:tag>soc</video:tag>
<video:tag>threat</video:tag>
<video:tag>detection</video:tag>
<video:tag>incident</video:tag>
<video:tag>response</video:tag>
<video:tag>endpoint</video:tag>
<video:tag>protection</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3679/black-duck-escape-dependency-hell-with-a-proper-sbom/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3679_1746825580_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Black Duck: Escape Dependency Hell with a Proper SBOM]]></video:title>
<video:description><![CDATA[Black Duck helps organizations build a real-time software bill of materials (SBOM), detect risky open-source components, and ensure licensing compliance.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3679&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>530</video:duration>
<video:live>no</video:live>
<video:view_count>51</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>black</video:tag>
<video:tag>duck</video:tag>
<video:tag>sbom</video:tag>
<video:tag>open</video:tag>
<video:tag>source</video:tag>
<video:tag>security</video:tag>
<video:tag>supply</video:tag>
<video:tag>chain</video:tag>
<video:tag>security</video:tag>
<video:tag>software</video:tag>
<video:tag>composition</video:tag>
<video:tag>analysis</video:tag>
<video:tag>license</video:tag>
<video:tag>compliance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3678/yubico-security-you-can-touch-literally/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3678_1746808850_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Yubico: Security You Can Touch (Literally)]]></video:title>
<video:description><![CDATA[Yubico’s phishing-resistant YubiKeys offer biometric and capacitive touch verification, supporting thousands of apps and identity providers.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3678&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>407</video:duration>
<video:live>no</video:live>
<video:view_count>81</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>yubico</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>mfa</video:tag>
<video:tag>hardware</video:tag>
<video:tag>authentication</video:tag>
<video:tag>yubikey</video:tag>
<video:tag>phishing-resistant</video:tag>
<video:tag>biometric</video:tag>
<video:tag>login</video:tag>
<video:tag>fido2</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3676/teleport-because-ssh-keys-are-so-last-decade/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3676_1746808083_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Teleport: Because SSH Keys Are So Last Decade]]></video:title>
<video:description><![CDATA[Teleport offers protocol-level visibility and certificate-based access controls, enabling zero trust at scale—even in hybrid, multi-cloud, and Kubernetes environments.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3676&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>283</video:duration>
<video:live>no</video:live>
<video:view_count>59</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>teleport</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>identity</video:tag>
<video:tag>security</video:tag>
<video:tag>zero</video:tag>
<video:tag>trust</video:tag>
<video:tag>machine</video:tag>
<video:tag>identity</video:tag>
<video:tag>certificate-based</video:tag>
<video:tag>access</video:tag>
<video:tag>kubernetes</video:tag>
<video:tag>security</video:tag>
<video:tag>access</video:tag>
<video:tag>control</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3675/graylog-your-logs-are-talking-are-you-listening/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3675_1746808243_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Graylog: Your Logs Are Talking. Are You Listening?]]></video:title>
<video:description><![CDATA[Graylog provides detailed threat insights through contextual asset-level risk modeling and secondary data lake storage—preserving logs without bloating the SOC.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3675&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>416</video:duration>
<video:live>no</video:live>
<video:view_count>52</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>graylog</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>log</video:tag>
<video:tag>management</video:tag>
<video:tag>siem</video:tag>
<video:tag>api</video:tag>
<video:tag>security</video:tag>
<video:tag>threat</video:tag>
<video:tag>detection</video:tag>
<video:tag>soc</video:tag>
<video:tag>optimization</video:tag>
<video:tag>microservices</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3674/ghangor-cloud-classify-everything-miss-nothing/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3674_1746808696_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Ghangor Cloud: Classify Everything, Miss Nothing]]></video:title>
<video:description><![CDATA[Mike Matchett catches up with Tarique Mustafa of Ghangor Cloud (now GC Security) to explore their patented AI-driven data protection platform, ISIS.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3674&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>411</video:duration>
<video:live>no</video:live>
<video:view_count>74</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>ghangor</video:tag>
<video:tag>cloud</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>ai</video:tag>
<video:tag>security</video:tag>
<video:tag>data</video:tag>
<video:tag>classification</video:tag>
<video:tag>dlp</video:tag>
<video:tag>casb</video:tag>
<video:tag>policy</video:tag>
<video:tag>enforcement</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3673/cy4data-labs-data-so-encrypted-even-your-dba-needs-a-permission-slip/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3673_1746808499_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cy4data Labs: Data So Encrypted Even Your DBA Needs a Permission Slip!]]></video:title>
<video:description><![CDATA[At RSAC 2025, Mike Matchett talks with Lance Smith of Cy4data Labs about field-level encryption for data in use—not just at rest or in transit. Each field in a database is encrypted with its own key, allowing control at unprecedented granularity. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3673&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>419</video:duration>
<video:live>no</video:live>
<video:view_count>69</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cy4data</video:tag>
<video:tag>labs</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>data</video:tag>
<video:tag>encryption</video:tag>
<video:tag>field-level</video:tag>
<video:tag>encryption</video:tag>
<video:tag>data</video:tag>
<video:tag>in</video:tag>
<video:tag>use</video:tag>
<video:tag>zero</video:tag>
<video:tag>trust</video:tag>
<video:tag>data</video:tag>
<video:tag>insider</video:tag>
<video:tag>threat</video:tag>
<video:tag>database</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3672/elastic-your-logs-deserve-better-than-a-csv-dump/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3672_1746808335_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Elastic: Your Logs Deserve Better Than a CSV Dump]]></video:title>
<video:description><![CDATA[Elastic’s SIEM solution is built on their high-speed search foundation and now includes AI-driven threat hunting and natural language investigation via vector databases.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3672&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>411</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>elastic</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>siem</video:tag>
<video:tag>threat</video:tag>
<video:tag>hunting</video:tag>
<video:tag>log</video:tag>
<video:tag>analytics</video:tag>
<video:tag>vector</video:tag>
<video:tag>search</video:tag>
<video:tag>ai</video:tag>
<video:tag>for</video:tag>
<video:tag>security</video:tag>
<video:tag>serverless</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3671/absolute-security-push-the-reset-button-even-after-a-ransomware-wipe/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3671_1746808606_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Absolute Security: Push the Reset Button Even After a Ransomware Wipe]]></video:title>
<video:description><![CDATA[Absolute delivers &#039;extreme resilience&#039; by operating below the OS, with embedded firmware agents capable of restoring devices—even from a ransomware attack.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3671&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>466</video:duration>
<video:live>no</video:live>
<video:view_count>108</video:view_count>
<video:publication_date>2025-05-09</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>matchett</video:tag>
<video:tag>absolute</video:tag>
<video:tag>security</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>recovery</video:tag>
<video:tag>firmware</video:tag>
<video:tag>agents</video:tag>
<video:tag>cyber</video:tag>
<video:tag>resilience</video:tag>
<video:tag>endpoint</video:tag>
<video:tag>security</video:tag>
<video:tag>device</video:tag>
<video:tag>recovery</video:tag>
<video:tag>embedded</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3670/secureframe-compliance-without-crying/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3670_1746556063_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Secureframe: Compliance Without Crying]]></video:title>
<video:description><![CDATA[Secureframe transforms compliance from a dreaded annual chore into a streamlined, automated workflow. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3670&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>367</video:duration>
<video:live>no</video:live>
<video:view_count>72</video:view_count>
<video:publication_date>2025-05-07</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>secureframe</video:tag>
<video:tag>compliance</video:tag>
<video:tag>automation</video:tag>
<video:tag>continuous</video:tag>
<video:tag>monitoring</video:tag>
<video:tag>ai</video:tag>
<video:tag>remediation</video:tag>
<video:tag>audit</video:tag>
<video:tag>readiness</video:tag>
<video:tag>cloud</video:tag>
<video:tag>compliance</video:tag>
<video:tag>msp</video:tag>
<video:tag>solutions</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3669/illumio-stop-the-spread-contain-the-chaos/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3669_1746555814_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Illumio: Stop the Spread, Contain the Chaos]]></video:title>
<video:description><![CDATA[Illumio focuses on containing cyberattacks before they become business disasters. Leveraging zero trust segmentation and dynamic policy response, they help enterprises mitigate ransomware spread and protect critical assets. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3669&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>338</video:duration>
<video:live>no</video:live>
<video:view_count>70</video:view_count>
<video:publication_date>2025-05-06</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>illumio</video:tag>
<video:tag>zero</video:tag>
<video:tag>trust</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>containment</video:tag>
<video:tag>lateral</video:tag>
<video:tag>movement</video:tag>
<video:tag>network</video:tag>
<video:tag>segmentation</video:tag>
<video:tag>incident</video:tag>
<video:tag>response</video:tag>
<video:tag>cyber</video:tag>
<video:tag>hygiene</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3668/conveyor-let-ai-handle-your-security-homework/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3668_1746555841_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Conveyor: Let AI Handle Your Security Homework]]></video:title>
<video:description><![CDATA[Conveyor takes the pain out of filling out security questionnaires by automating the vendor-side process using high-accuracy AI agents. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3668&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>336</video:duration>
<video:live>no</video:live>
<video:view_count>63</video:view_count>
<video:publication_date>2025-05-06</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>conveyor</video:tag>
<video:tag>ai</video:tag>
<video:tag>automation</video:tag>
<video:tag>vendor</video:tag>
<video:tag>security</video:tag>
<video:tag>grc</video:tag>
<video:tag>security</video:tag>
<video:tag>questionnaires</video:tag>
<video:tag>agentic</video:tag>
<video:tag>ai</video:tag>
<video:tag>supply</video:tag>
<video:tag>chain</video:tag>
<video:tag>trust</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3667/zimperium-your-phone-is-a-supercomputer-and-a-target/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3667_1746545044_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Zimperium: Your Phone Is a Supercomputer (and a Target)]]></video:title>
<video:description><![CDATA[Zimperium brings enterprise-grade security to mobile devices, with on-device detection that works even without network access. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3667&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>280</video:duration>
<video:live>no</video:live>
<video:view_count>73</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>zimperium</video:tag>
<video:tag>mobile</video:tag>
<video:tag>security</video:tag>
<video:tag>endpoint</video:tag>
<video:tag>protection</video:tag>
<video:tag>on-device</video:tag>
<video:tag>detection</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>phishing</video:tag>
<video:tag>zero-click</video:tag>
<video:tag>exploits</video:tag>
<video:tag>mdm</video:tag>
<video:tag>alternative</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3666/zafran-from-soc-to-ceo-get-the-message-right/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3666_1746545384_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Zafran: From SOC to CEO: Get the Message Right]]></video:title>
<video:description><![CDATA[Zafran turns cybersecurity strategy into human-friendly narratives—making it easier for CISOs to communicate risk, value, and roadmap priorities to stakeholders.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3666&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>211</video:duration>
<video:live>no</video:live>
<video:view_count>46</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>zafran</video:tag>
<video:tag>security</video:tag>
<video:tag>leadership</video:tag>
<video:tag>ciso</video:tag>
<video:tag>communication</video:tag>
<video:tag>cyber</video:tag>
<video:tag>strategy</video:tag>
<video:tag>executive</video:tag>
<video:tag>messaging</video:tag>
<video:tag>security</video:tag>
<video:tag>storytelling</video:tag>
<video:tag>cyber</video:tag>
<video:tag>risk</video:tag>
<video:tag>reporting</video:tag>
<video:tag>board-level</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3665/wallarm-like-a-bouncer-for-your-backend/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3665_1746545367_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Wallarm: Like a Bouncer for Your Backend]]></video:title>
<video:description><![CDATA[Wallarm defends modern web apps and APIs with a cloud-native platform that blocks attacks in real time. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3665&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>329</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>wallarm</video:tag>
<video:tag>web</video:tag>
<video:tag>app</video:tag>
<video:tag>security</video:tag>
<video:tag>api</video:tag>
<video:tag>protection</video:tag>
<video:tag>real-time</video:tag>
<video:tag>filtering</video:tag>
<video:tag>cloud-native</video:tag>
<video:tag>security</video:tag>
<video:tag>kubernetes</video:tag>
<video:tag>multi-cloud</video:tag>
<video:tag>runtime</video:tag>
<video:tag>protection</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3664/upguard-you-cant-patch-what-you-dont-see/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3664_1746545551_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[UpGuard: You Can’t Patch What You Don’t See]]></video:title>
<video:description><![CDATA[Upguard monitors your entire supply chain for cybersecurity risk, providing automated assessments of third- and fourth-party vendors.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3664&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>221</video:duration>
<video:live>no</video:live>
<video:view_count>113</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>upguard</video:tag>
<video:tag>supply</video:tag>
<video:tag>chain</video:tag>
<video:tag>risk</video:tag>
<video:tag>third-party</video:tag>
<video:tag>vendors</video:tag>
<video:tag>cyber</video:tag>
<video:tag>risk</video:tag>
<video:tag>security</video:tag>
<video:tag>assessments</video:tag>
<video:tag>attack</video:tag>
<video:tag>surface</video:tag>
<video:tag>vendor</video:tag>
<video:tag>risk</video:tag>
<video:tag>security</video:tag>
<video:tag>automation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3663/traceable-by-harness-your-api-just-leaked…-everything/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3663_1746545733_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Traceable by Harness: Your API Just Leaked… Everything]]></video:title>
<video:description><![CDATA[Traceable by Harness secures APIs by understanding application behavior and identifying anomalies in real time. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3663&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>248</video:duration>
<video:live>no</video:live>
<video:view_count>53</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>traceable</video:tag>
<video:tag>api</video:tag>
<video:tag>security</video:tag>
<video:tag>application</video:tag>
<video:tag>behavior</video:tag>
<video:tag>anomaly</video:tag>
<video:tag>detection</video:tag>
<video:tag>api</video:tag>
<video:tag>traffic</video:tag>
<video:tag>machine</video:tag>
<video:tag>learning</video:tag>
<video:tag>real-time</video:tag>
<video:tag>protection</video:tag>
<video:tag>zero</video:tag>
<video:tag>trust</video:tag>
<video:tag>apis</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3662/sentra-wheres-my-data-and-whos-touching-it/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3662_1746545968_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Sentra: Where’s My Data (and Who’s Touching It)?]]></video:title>
<video:description><![CDATA[Sentra helps organizations discover and classify sensitive data across multi-cloud environments. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3662&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>196</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>sentra</video:tag>
<video:tag>data</video:tag>
<video:tag>discovery</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
<video:tag>data</video:tag>
<video:tag>classification</video:tag>
<video:tag>pii</video:tag>
<video:tag>multi-cloud</video:tag>
<video:tag>visibility</video:tag>
<video:tag>data</video:tag>
<video:tag>governance</video:tag>
<video:tag>risk</video:tag>
<video:tag>scoring</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3661/security-journey-train-like-your-org-depends-on-it-because-it-does/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3661_1746546094_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Security Journey: Train Like Your Org Depends on It (Because It Does)]]></video:title>
<video:description><![CDATA[Security Journey blends education and engagement to build lasting security awareness across dev teams. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3661&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>185</video:duration>
<video:live>no</video:live>
<video:view_count>75</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>security</video:tag>
<video:tag>journey</video:tag>
<video:tag>security</video:tag>
<video:tag>training</video:tag>
<video:tag>developer</video:tag>
<video:tag>education</video:tag>
<video:tag>devsecops</video:tag>
<video:tag>culture</video:tag>
<video:tag>appsec</video:tag>
<video:tag>awareness</video:tag>
<video:tag>secure</video:tag>
<video:tag>coding</video:tag>
<video:tag>gamified</video:tag>
<video:tag>training</video:tag>
<video:tag>employee</video:tag>
<video:tag>security</video:tag>
<video:tag>engagement</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3660/mindgard-no-your-llm-isnt-safe-yet/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3660_1746546231_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Mindgard: No, Your LLM Isn’t Safe Yet]]></video:title>
<video:description><![CDATA[Mindgard is building tools to simulate adversarial threats against AI models, especially in high-risk sectors like finance and defense. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3660&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>265</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>mindgard</video:tag>
<video:tag>ai</video:tag>
<video:tag>security</video:tag>
<video:tag>adversarial</video:tag>
<video:tag>ai</video:tag>
<video:tag>llm</video:tag>
<video:tag>ai</video:tag>
<video:tag>red</video:tag>
<video:tag>teaming</video:tag>
<video:tag>machine</video:tag>
<video:tag>learning</video:tag>
<video:tag>threats</video:tag>
<video:tag>neural</video:tag>
<video:tag>network</video:tag>
<video:tag>security</video:tag>
<video:tag>ai</video:tag>
<video:tag>model</video:tag>
<video:tag>hardening</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3659/legit-security-legit-obsessed-with-sdlc-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3659_1746547678_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Legit Security: Legit Obsessed with SDLC Security]]></video:title>
<video:description><![CDATA[Legit Security maps your entire software supply chain and flags security issues across dev tools, repos, and CI/CD pipelines.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3659&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>323</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>legit</video:tag>
<video:tag>security</video:tag>
<video:tag>sdlc</video:tag>
<video:tag>supply</video:tag>
<video:tag>chain</video:tag>
<video:tag>security</video:tag>
<video:tag>ci/cd</video:tag>
<video:tag>devops</video:tag>
<video:tag>appsec</video:tag>
<video:tag>governance</video:tag>
<video:tag>compliance</video:tag>
<video:tag>secure</video:tag>
<video:tag>software</video:tag>
<video:tag>development</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3658/keepit-keepit-simple-keepit-compliant/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3658_1746553256_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Keepit: Keepit Simple, Keepit Compliant]]></video:title>
<video:description><![CDATA[Keepit delivers backup and recovery purpose-built for SaaS apps, including Microsoft 365 and Google Workspace. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3658&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>286</video:duration>
<video:live>no</video:live>
<video:view_count>49</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>keepit</video:tag>
<video:tag>backup</video:tag>
<video:tag>recovery</video:tag>
<video:tag>saas</video:tag>
<video:tag>data</video:tag>
<video:tag>cloud</video:tag>
<video:tag>resilience</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>protection</video:tag>
<video:tag>data</video:tag>
<video:tag>compliance</video:tag>
<video:tag>microsoft</video:tag>
<video:tag>365</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3657/hackerone-2-1m-security-researchers-walk-into-a-conference-booth…/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3657_1747060933_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[HackerOne: 2.1M Security Researchers Walk Into a Conference Booth…]]></video:title>
<video:description><![CDATA[HackerOne taps into a 2.1 million-strong army of security researchers to identify vulnerabilities before bad actors strike. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3657&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>237</video:duration>
<video:live>no</video:live>
<video:view_count>60</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>hackerone</video:tag>
<video:tag>bug</video:tag>
<video:tag>bounty</video:tag>
<video:tag>ethical</video:tag>
<video:tag>hacking</video:tag>
<video:tag>vdp</video:tag>
<video:tag>crowdsourced</video:tag>
<video:tag>security</video:tag>
<video:tag>penetration</video:tag>
<video:tag>testing</video:tag>
<video:tag>ai</video:tag>
<video:tag>threats</video:tag>
<video:tag>responsible</video:tag>
<video:tag>disclosure</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3656/cycode-ensuring-appsec-is-a-team-sport-not-a-finger-pointing-game/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3656_1746553590_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cycode: Ensuring AppSec Is a Team Sport, Not a Finger-Pointing Game]]></video:title>
<video:description><![CDATA[Cycode positions itself as a full-spectrum ASPM solution with proprietary and third-party scanners that address everything from hardcoded secrets to open-source vulnerabilities.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3656&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>291</video:duration>
<video:live>no</video:live>
<video:view_count>64</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cycode</video:tag>
<video:tag>aspm</video:tag>
<video:tag>appsec</video:tag>
<video:tag>devsecops</video:tag>
<video:tag>software</video:tag>
<video:tag>supply</video:tag>
<video:tag>chain</video:tag>
<video:tag>code</video:tag>
<video:tag>scanning</video:tag>
<video:tag>open</video:tag>
<video:tag>source</video:tag>
<video:tag>security</video:tag>
<video:tag>vulnerability</video:tag>
<video:tag>remediation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3655/check-point-vulnerabilities-not-in-this-house/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3655_1746553759_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Check Point: Vulnerabilities? Not in This House]]></video:title>
<video:description><![CDATA[Touting zero known vulnerabilities and a hardened development lifecycle, Check Point tackles the AI threat landscape with real-time threat countermeasures, a powerful threat cloud, and a serious no-nonsense approach to efficacy, especially around email...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3655&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>321</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>check</video:tag>
<video:tag>point</video:tag>
<video:tag>firewalls</video:tag>
<video:tag>ai</video:tag>
<video:tag>security</video:tag>
<video:tag>threat</video:tag>
<video:tag>prevention</video:tag>
<video:tag>secure</video:tag>
<video:tag>development</video:tag>
<video:tag>zero</video:tag>
<video:tag>vulnerabilities</video:tag>
<video:tag>email</video:tag>
<video:tag>security</video:tag>
<video:tag>application</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3654/cayosoft-active-directory-just-got-a-bodyguard/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3654_1746553981_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cayosoft: Active Directory Just Got a Bodyguard]]></video:title>
<video:description><![CDATA[Cayosoft delivers enterprise-grade management and recovery for Active Directory, especially in hybrid cloud environments]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3654&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>241</video:duration>
<video:live>no</video:live>
<video:view_count>57</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cayosoft</video:tag>
<video:tag>active</video:tag>
<video:tag>directory</video:tag>
<video:tag>identity</video:tag>
<video:tag>management</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>cloud</video:tag>
<video:tag>directory</video:tag>
<video:tag>services</video:tag>
<video:tag>cyber</video:tag>
<video:tag>readiness</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>it</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>recovery</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3653/blumira-siem-ingly-simple-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3653_1746553966_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Blumira: SIEM-ingly Simple Security]]></video:title>
<video:description><![CDATA[Blumira is shaking up the SIEM world with a no-fuss, user-friendly approach that delivers rapid detection and response for IT teams without the need for deep security expertise.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3653&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>281</video:duration>
<video:live>no</video:live>
<video:view_count>56</video:view_count>
<video:publication_date>2025-05-05</video:publication_date>
<video:tag>rsac2025</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>matchett</video:tag>
<video:tag>blumira</video:tag>
<video:tag>siem</video:tag>
<video:tag>xdr</video:tag>
<video:tag>threat</video:tag>
<video:tag>detection</video:tag>
<video:tag>incident</video:tag>
<video:tag>response</video:tag>
<video:tag>msp</video:tag>
<video:tag>security</video:tag>
<video:tag>midmarket</video:tag>
<video:tag>it</video:tag>
<video:tag>automated</video:tag>
<video:tag>playbooks</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3647/trusted-tech-team-license-like-a-pro-support-like-a-boss/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3647_1746112622_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Trusted Tech Team: License Like a Pro, Support Like a Boss]]></video:title>
<video:description><![CDATA[Trusted Tech Team isn’t just another CSP, they’re laser-focused on simplifying Microsoft licensing, delivering rapid quotes, and offering enterprise-grade support without the enterprise-grade price tag.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3647&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1187</video:duration>
<video:live>no</video:live>
<video:view_count>176</video:view_count>
<video:publication_date>2025-05-02</video:publication_date>
<video:tag>trusted</video:tag>
<video:tag>tech</video:tag>
<video:tag>team</video:tag>
<video:tag>microsoft</video:tag>
<video:tag>365</video:tag>
<video:tag>it</video:tag>
<video:tag>infrastructure</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3649/yellowbrick-the-fast-lane-for-your-data-hungry-ai/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3649_1745437287_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Yellowbrick: The Fast Lane for Your Data-Hungry AI]]></video:title>
<video:description><![CDATA[Built on Kubernetes, Yellowbrick delivers high-performance analytics across clouds and on-prem environments-enabling full control over data sovereignty, latency, and cost. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3649&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1063</video:duration>
<video:live>no</video:live>
<video:view_count>64</video:view_count>
<video:publication_date>2025-04-30</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>yellowbrick</video:tag>
<video:tag>kubernetes</video:tag>
<video:tag>data</video:tag>
<video:tag>warehouse</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>cloud</video:tag>
<video:tag>on-prem</video:tag>
<video:tag>data</video:tag>
<video:tag>sovereignty</video:tag>
<video:tag>workload</video:tag>
<video:tag>optimization</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3635/arcitecta-mediaflux-your-data/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3635_1745078823_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[Arcitecta: Mediaflux Your Data]]></video:title>
<video:description><![CDATA[In a conversation with Mike Matchett of Small World Big Data, Eric Polet, Director of Product Marketing at Arcitecta, explores how Mediaflux is redefining global data management.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3635&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>949</video:duration>
<video:live>no</video:live>
<video:view_count>70</video:view_count>
<video:publication_date>2025-04-16</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>arcitecta</video:tag>
<video:tag>data</video:tag>
<video:tag>volumes</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>cifs</video:tag>
<video:tag>nfs</video:tag>
<video:tag>s3</video:tag>
<video:tag>amazon</video:tag>
<video:tag>s3</video:tag>
<video:tag>mediaflux</video:tag>
<video:tag>metadata</video:tag>
<video:tag>mfa</video:tag>
<video:tag>active</video:tag>
<video:tag>directory</video:tag>
<video:tag>storage</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3634/controltheory-cutting-through-observability-clutter/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3634_1744060757_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[ControlTheory: Cutting Through Observability Clutter]]></video:title>
<video:description><![CDATA[In a conversation with Mike Matchett from Small World Big Data, Bob Quillin, CEO &amp; Co-Founder of ControlTheory, discusses the evolving landscape of modern observability and its escalating costs.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3634&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1687</video:duration>
<video:live>no</video:live>
<video:view_count>51</video:view_count>
<video:publication_date>2025-04-07</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>controltheory</video:tag>
<video:tag>data</video:tag>
<video:tag>observability</video:tag>
<video:tag>controllability</video:tag>
<video:tag>data</video:tag>
<video:tag>ingestion</video:tag>
<video:tag>opentelemetry</video:tag>
<video:tag>intelligent</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3632/couchbase-sql-and-chill-more-like-develop-and-thrill/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3632_1744209133_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Couchbase: SQL++ and Chill? More Like Develop and Thrill!]]></video:title>
<video:description><![CDATA[Couchbase has evolved from a JSON database to incorporate advanced features like SQL++, Acid transactions, columnar analytics, and comprehensive AI services.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3632&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1519</video:duration>
<video:live>no</video:live>
<video:view_count>115</video:view_count>
<video:publication_date>2025-03-31</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>couchbase</video:tag>
<video:tag>json</video:tag>
<video:tag>sql++</video:tag>
<video:tag>analytics</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>mobile</video:tag>
<video:tag>data</video:tag>
<video:tag>vector</video:tag>
<video:tag>search</video:tag>
<video:tag>kubernetes</video:tag>
<video:tag>capella</video:tag>
<video:tag>database-as-a-service</video:tag>
<video:tag>rag</video:tag>
<video:tag>data</video:tag>
<video:tag>vector</video:tag>
<video:tag>management</video:tag>
<video:tag>deployment</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3597/enkrypt-ai-s-guide-to-taming-rogue-ai/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3597_1738949684_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Enkrypt AI&#039;s Guide to Taming Rogue AI]]></video:title>
<video:description><![CDATA[In this discussion, Mike Matchett of Small World Big Data chats with Sahil Agarwal, Co-Founder &amp; CEO of Enkrypt AI, about making AI safe for businesses to use]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3597&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>943</video:duration>
<video:live>no</video:live>
<video:view_count>51</video:view_count>
<video:publication_date>2025-03-31</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>enkrypt</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>ai</video:tag>
<video:tag>deep</video:tag>
<video:tag>sea</video:tag>
<video:tag>security</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>malware</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3628/achieving-passwordless-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3628_1743276251_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Achieving Passwordless Security]]></video:title>
<video:description><![CDATA[YubiKey serves as a foundational tool for establishing user identity, contributing to the creation of phishing-resistant users and advancing a passwordless environment.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3628&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>163</video:duration>
<video:live>no</video:live>
<video:view_count>43</video:view_count>
<video:publication_date>2025-03-29</video:publication_date>
<video:tag>yubico</video:tag>
<video:tag>yubikey</video:tag>
<video:tag>passwordless</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3621/anchore-keeping-your-code-shipshape-with-sboms/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3621_1742598230_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Anchore: Keeping Your Code Shipshape with SBOMs!]]></video:title>
<video:description><![CDATA[In this conversation with Mike Matchett from Small World Big Data, Neil Levine, SVP-Product at Anchore, sheds light on the complexities of software supply chain security, especially within open-source environments.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3621&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>870</video:duration>
<video:live>no</video:live>
<video:view_count>104</video:view_count>
<video:publication_date>2025-03-25</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>anchore</video:tag>
<video:tag>sbom</video:tag>
<video:tag>sboms</video:tag>
<video:tag>software</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>open-source</video:tag>
<video:tag>fedramp</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3615/neushield-hit-ctrl-z-on-ransomware-attacks/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3615_1742318832_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[NeuShield: Hit CTRL+Z on Ransomware Attacks!]]></video:title>
<video:description><![CDATA[In a recent discussion with Mike Matchett from Small World Big Data, Elisha Riedlinger, COO of NeuShield, shed light on innovative strategies for cyber resilience, focusing on data recovery rather than conventional security or backup methods.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3615&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1006</video:duration>
<video:live>no</video:live>
<video:view_count>145</video:view_count>
<video:publication_date>2025-03-19</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>neushield</video:tag>
<video:tag>elisha</video:tag>
<video:tag>riedlinger</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>cyberresilience</video:tag>
<video:tag>cyber</video:tag>
<video:tag>resilience</video:tag>
<video:tag>data</video:tag>
<video:tag>recovery</video:tag>
<video:tag>data</video:tag>
<video:tag>security</video:tag>
<video:tag>data</video:tag>
<video:tag>backup</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>encryption</video:tag>
<video:tag>rapid</video:tag>
<video:tag>recovery</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3595/servquik-ai-powered-convos-that-convert/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3595_1738266368_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[ServQuik: AI-Powered Convos that Convert!]]></video:title>
<video:description><![CDATA[In this webcast, Mike Matchett of Small World Big Data sits down with Ashar Baig, CEO of ServQuik, to delve into how artificial intelligence is revolutionizing customer service roles.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3595&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>794</video:duration>
<video:live>no</video:live>
<video:view_count>69</video:view_count>
<video:publication_date>2025-02-21</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>ashar</video:tag>
<video:tag>baig</video:tag>
<video:tag>servquik</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>automation</video:tag>
<video:tag>operations</video:tag>
<video:tag>customer</video:tag>
<video:tag>engagement</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3601/dependency-dilemmas-lineaje-secures-the-open-source-jungle/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3601_1739809888_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Dependency Dilemmas: Lineaje Secures the Open Source Jungle]]></video:title>
<video:description><![CDATA[Nick Mistry, SVP &amp; CISO of Lineaje, joins Mike Matchett of Small World Big Data to delve into how businesses can fortify their applications against security risks inherent in open-source components. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3601&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1162</video:duration>
<video:live>no</video:live>
<video:view_count>284</video:view_count>
<video:publication_date>2025-02-18</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>lineaje</video:tag>
<video:tag>security</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>data</video:tag>
<video:tag>security</video:tag>
<video:tag>open-source</video:tag>
<video:tag>dependency</video:tag>
<video:tag>dependencies</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3598/don-t-trust-just-verify-leostream-s-zero-trust-playbook-for-vendors/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3598_1739909796_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Don&#039;t Trust, Just Verify: Leostream&#039;s Zero-Trust Playbook for Vendors]]></video:title>
<video:description><![CDATA[In this conversation, Mike Matchett from Small World Big Data sits down with Karen Gondoly, CEO of Leostream, to explore vendor privileged access management. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3598&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>878</video:duration>
<video:live>no</video:live>
<video:view_count>278</video:view_count>
<video:publication_date>2025-02-17</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>leostream</video:tag>
<video:tag>remote</video:tag>
<video:tag>desktop</video:tag>
<video:tag>vendor</video:tag>
<video:tag>access</video:tag>
<video:tag>management</video:tag>
<video:tag>privileged</video:tag>
<video:tag>access</video:tag>
<video:tag>management</video:tag>
<video:tag>security</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>remote</video:tag>
<video:tag>access</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3599/storpool-disaster-recovery-just-got-a-makeover/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3599_1740667360_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[StorPool: Disaster Recovery Just Got a Makeover]]></video:title>
<video:description><![CDATA[Mike Matchett of Small World Big Data recently learned more about StorPool’s disaster recovery solutions via a discussion with Alexander Ivanov, Product Lead at StorPool. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3599&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>853</video:duration>
<video:live>no</video:live>
<video:view_count>67</video:view_count>
<video:publication_date>2025-02-10</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>storpool</video:tag>
<video:tag>disaster</video:tag>
<video:tag>recovery</video:tag>
<video:tag>dr</video:tag>
<video:tag>business</video:tag>
<video:tag>continuity</video:tag>
<video:tag>bc</video:tag>
<video:tag>kvm</video:tag>
<video:tag>vmware</video:tag>
<video:tag>hyper-v</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3581/localstack-bringing-the-cloud-down-to-earth/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3581_1734637389_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[LocalStack: Bringing the Cloud Down to Earth]]></video:title>
<video:description><![CDATA[In this chat, Mike Matchett from Small World Big Data unpacks the cloud and cloud development with Waldemar Hummer, Co-Founder and CTO of LocalStack.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3581&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>973</video:duration>
<video:live>no</video:live>
<video:view_count>57</video:view_count>
<video:publication_date>2025-02-10</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>localstack</video:tag>
<video:tag>cloud</video:tag>
<video:tag>cloud</video:tag>
<video:tag>management</video:tag>
<video:tag>local</video:tag>
<video:tag>cloud</video:tag>
<video:tag>deployment</video:tag>
<video:tag>cloud</video:tag>
<video:tag>deployment</video:tag>
<video:tag>multicloud</video:tag>
<video:tag>multi-cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3631/mastering-phishing-resistant-authentication-engage-and-educate/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3631_1743332746_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Mastering Phishing-Resistant Authentication: Engage and Educate!]]></video:title>
<video:description><![CDATA[Educating the corporate workforce on the importance of social engineering and security can&#039;t be under-estimated. Yubico is an important component to this.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3631&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>46</video:duration>
<video:live>no</video:live>
<video:view_count>35</video:view_count>
<video:publication_date>2025-01-15</video:publication_date>
<video:tag>yubico</video:tag>
<video:tag>phishing</video:tag>
<video:tag>social</video:tag>
<video:tag>engineering</video:tag>
<video:tag>mfa</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3579/thesys-ai-upgraded-–-hello-generative-ui/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3579_1734109668_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Thesys: AI Upgraded – Hello, Generative UI!]]></video:title>
<video:description><![CDATA[Mike Matchett from Small World Big Data talked with Rabi Shanker Guha, Co-Founder of Thesys, about generative UI and artificial intelligence.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3579&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>883</video:duration>
<video:live>no</video:live>
<video:view_count>62</video:view_count>
<video:publication_date>2025-01-14</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>thesys</video:tag>
<video:tag>ai</video:tag>
<video:tag>generative</video:tag>
<video:tag>ai</video:tag>
<video:tag>generative</video:tag>
<video:tag>ui</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>user</video:tag>
<video:tag>interface</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3413/scale-computing-innovations-in-hyperconvergence-and-the-edge/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3413_1715961653_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Scale Computing: Innovations in Hyperconvergence and the Edge]]></video:title>
<video:description><![CDATA[Amidst the backdrop of VMware&#039;s acquisition by Broadcom stirring the market, Mitchell Etchason discusses how Scale Computing offers a cost-effective alternative that ensures operational ease and reliability.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3413&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>777</video:duration>
<video:live>no</video:live>
<video:view_count>61</video:view_count>
<video:publication_date>2025-01-09</video:publication_date>
<video:tag>scale</video:tag>
<video:tag>computing</video:tag>
<video:tag>scale</video:tag>
<video:tag>vmware</video:tag>
<video:tag>hyperconvergence</video:tag>
<video:tag>hci</video:tag>
<video:tag>edge</video:tag>
<video:tag>edge</video:tag>
<video:tag>computing</video:tag>
<video:tag>broadcom</video:tag>
<video:tag>data</video:tag>
<video:tag>portability</video:tag>
<video:tag>inbrief</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3587/deeptempo-turning-the-tables-on-ai-driven-cyberattacks/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3587_1735331092_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[DeepTempo: Turning the Tables on AI-Driven Cyberattacks]]></video:title>
<video:description><![CDATA[ Using proprietary log language models, DeepTempo isn&#039;t just responding to threats—it&#039;s staying two steps ahead, predicting and neutralizing AI-driven attacks before they strike.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3587&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1325</video:duration>
<video:live>no</video:live>
<video:view_count>60</video:view_count>
<video:publication_date>2024-12-31</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>deeptempo</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>ai</video:tag>
<video:tag>cyberthreats</video:tag>
<video:tag>cyberattack</video:tag>
<video:tag>hacker</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3630/essential-tips-for-yubikey-delivery-timelines/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3630_1743332451_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Essential Tips for YubiKey Delivery Timelines]]></video:title>
<video:description><![CDATA[When planning to deploy Yubikeys, it&#039;s crucial to establish clear delivery timelines to ensure they reach end users when needed.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3630&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>32</video:duration>
<video:live>no</video:live>
<video:view_count>36</video:view_count>
<video:publication_date>2024-12-14</video:publication_date>
<video:tag>yubico</video:tag>
<video:tag>passwords</video:tag>
<video:tag>security</video:tag>
<video:tag>phishing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3629/embrace-passwordless-authentication-secure-your-organization-now/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3629_1743332086_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Embrace Passwordless Authentication]]></video:title>
<video:description><![CDATA[This video focuses on the evolving authentication landscape, focusing on transitioning to passwordless authentication efficiently and securely. It begins with a discussion on organizations moving towards phishing-resistant practices due to a paradigm s...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3629&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>74</video:duration>
<video:live>no</video:live>
<video:view_count>37</video:view_count>
<video:publication_date>2024-11-30</video:publication_date>
<video:tag>yubico</video:tag>
<video:tag>passwordless</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3560/solidatus-using-ai-for-advanced-data-lineage/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3560_1729783629_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Solidatus: Using AI for Advanced Data Lineage]]></video:title>
<video:description><![CDATA[In this exchange, Mike Matchett of Small World Big Data speaks with Tina Chace, VP of Product Management at Solidatus, about the critical role of data lineage in enhancing AI models and operational efficiency.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3560&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>962</video:duration>
<video:live>no</video:live>
<video:view_count>183</video:view_count>
<video:publication_date>2024-11-22</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>solidatus</video:tag>
<video:tag>data</video:tag>
<video:tag>lineage</video:tag>
<video:tag>data</video:tag>
<video:tag>governance</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>metadata</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3555/lambdatest-innovating-qa-with-ai/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3555_1728922014_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[LambdaTest: Innovating QA with AI]]></video:title>
<video:description><![CDATA[ Mike Matchett of Small World Big Data recently invited Mudit Singh from LambdaTest to discuss the role of testing in the software development lifecycle.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3555&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>961</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2024-11-21</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>lambdatest</video:tag>
<video:tag>testing</video:tag>
<video:tag>ci/cd</video:tag>
<video:tag>qc</video:tag>
<video:tag>quality</video:tag>
<video:tag>control</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>orchestration</video:tag>
<video:tag>platform</video:tag>
<video:tag>cloud</video:tag>
<video:tag>automation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3563/that-phishy-feeling-learning-to-spot-modern-phishing/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3563_1730725459_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[That Phishy Feeling: Learning to Spot Modern Phishing]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3563&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2907</video:duration>
<video:live>no</video:live>
<video:view_count>78</video:view_count>
<video:publication_date>2024-11-04</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3559/zilla-security-intelligent-identity-management-powered-by-ai/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3559_1729721334_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Zilla Security: Intelligent Identity Management Powered by AI]]></video:title>
<video:description><![CDATA[In this discussion, Mike Matchett of Small World Big Data explores identity management with Deepak Taneja, Co-Founder &amp; CEO of Zilla Security. Matchett and Taneja examine how identity management has shifted from focusing on simple authentication to bec...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3559&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1109</video:duration>
<video:live>no</video:live>
<video:view_count>110</video:view_count>
<video:publication_date>2024-10-30</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>zilla</video:tag>
<video:tag>security</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>authentication</video:tag>
<video:tag>cloud</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>security</video:tag>
<video:tag>ai</video:tag>
<video:tag>automation</video:tag>
<video:tag>saas</video:tag>
<video:tag>identity</video:tag>
<video:tag>governance</video:tag>
<video:tag>data</video:tag>
<video:tag>governance</video:tag>
<video:tag>identity</video:tag>
<video:tag>management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3558/codiac-software-deployment-with-simplified-sdlc-integration/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3558_1729536536_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Codiac: Software Deployment with Simplified SDLC Integration]]></video:title>
<video:description><![CDATA[Mike Matchett spoke with Michael Levan from Codiac to discuss the complexity of deploying software applications across diverse environments, which demands significant time and expertise, leading to inefficiencies and professional burnout.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3558&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>777</video:duration>
<video:live>no</video:live>
<video:view_count>76</video:view_count>
<video:publication_date>2024-10-29</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>codiac</video:tag>
<video:tag>sdlc</video:tag>
<video:tag>devops</video:tag>
<video:tag>software</video:tag>
<video:tag>software</video:tag>
<video:tag>deployment</video:tag>
<video:tag>deployment</video:tag>
<video:tag>it</video:tag>
<video:tag>infrastructure</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3554/exclaimer-how-email-signatures-can-elevate-brand-identity-and-compliance/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3554_1729797645_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Exclaimer: How Email Signatures Can Elevate Brand Identity and Compliance]]></video:title>
<video:description><![CDATA[In this discussion hosted by Mike Matchett of Small World Big Data, Vicky Wills, CTO of Exclaimer, dives into the often-overlooked yet crucial aspect of corporate communication: email signatures. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3554&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>688</video:duration>
<video:live>no</video:live>
<video:view_count>100</video:view_count>
<video:publication_date>2024-10-24</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>exclaimer</video:tag>
<video:tag>branding</video:tag>
<video:tag>marketing</video:tag>
<video:tag>email</video:tag>
<video:tag>signature</video:tag>
<video:tag>ai</video:tag>
<video:tag>legal</video:tag>
<video:tag>legal</video:tag>
<video:tag>compliance</video:tag>
<video:tag>compliance</video:tag>
<video:tag>digital</video:tag>
<video:tag>marketing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3553/tines-ai-transforms-crowdstrike-alert-management/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3553_1728418361_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Tines AI Transforms CrowdStrike Alert Management]]></video:title>
<video:description><![CDATA[Tines showcases how you can leverage AI to streamline the process of creating cases and acting on CrowdStrike alerts. Learn about: 1. Efficient Data Simplification and Case Creation: Tines’ integration of AI simplifies complex data from CrowdStrike ale...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3553&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>493</video:duration>
<video:live>no</video:live>
<video:view_count>359</video:view_count>
<video:publication_date>2024-10-08</video:publication_date>
<video:tag>tines</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3552/automate-device-checks-crowdstrike-integration-in-jamf-with-tines/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3552_1728417629_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Automate Device Checks: CrowdStrike Integration in Jamf with Tines]]></video:title>
<video:description><![CDATA[Ensure CrowdStrike is properly installed on new devices enrolled via Jamf. This webcast covers a practical workflow that IT teams can leverage to ensure Crowdstrike is properly installed on new devices enrolled in Jamf. Key takeaways: 1. Automation of ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3552&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>445</video:duration>
<video:live>no</video:live>
<video:view_count>301</video:view_count>
<video:publication_date>2024-10-08</video:publication_date>
<video:tag>tines</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3551/ai-for-smarter-it-workflows-a-tines-platform-overview/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3551_1728417192_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[AI for Smarter IT Workflows: A Tines Platform Overview]]></video:title>
<video:description><![CDATA[This informative webinar features MyFitnessPal and highlights the integration of AI into change control processes using Tines including practical demonstrations and insights regarding the new AI capabilities within the Tines platform. You will learn ab...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3551&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>695</video:duration>
<video:live>no</video:live>
<video:view_count>392</video:view_count>
<video:publication_date>2024-10-08</video:publication_date>
<video:tag>tines</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3550/building-a-culture-of-automation-intercom-s-success-story-with-tines/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3550_1728413412_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Building a Culture of Automation: Intercom&#039;s Success Story with Tines]]></video:title>
<video:description><![CDATA[In this webcast, learn about the transformative journey Intercom&#039;s IT team undertook as they adopted Tines to establish an IT Automation Center of Excellence. This session delved into the technical and strategic aspects of integrating Tines for busine...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3550&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2441</video:duration>
<video:live>no</video:live>
<video:view_count>274</video:view_count>
<video:publication_date>2024-10-08</video:publication_date>
<video:tag>tines</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3549/accelerating-application-modernization-on-aws/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3549_1728388582_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Accelerating Application Modernization on AWS]]></video:title>
<video:description><![CDATA[Moving mainframe and midrange workloads to AWS can significantly reduce costs, with some organizations saving up to 60-90% on their IT expenses. This migration also offers improved agility by facilitating faster deployment of new business functions lev...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3549&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3598</video:duration>
<video:live>no</video:live>
<video:view_count>46</video:view_count>
<video:publication_date>2024-10-08</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3501/chorology-ai-driven-data-management-for-compliance/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3501_1722540206_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Chorology: AI-Driven Data Management for Compliance]]></video:title>
<video:description><![CDATA[Chorology&#039;s solution is designed to ease the burden on businesses navigating the evolving regulatory compliance landscape, ensuring that data management strategies align with legal mandates without compromising operational efficacy.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3501&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1369</video:duration>
<video:live>no</video:live>
<video:view_count>89</video:view_count>
<video:publication_date>2024-10-07</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>chorology</video:tag>
<video:tag>data</video:tag>
<video:tag>compliance</video:tag>
<video:tag>compliance</video:tag>
<video:tag>ciso</video:tag>
<video:tag>cape</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>regulatory</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3538/nasuni-cloud-ai-synergy-for-global-data-access/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3538_1727953962_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[Nasuni: Cloud &amp; AI Synergy for Global Data Access]]></video:title>
<video:description><![CDATA[Mike Matchett recently spoke with Jim Liddle, Chief Innovation Officer at Nasuni, where they discussed the role of hybrid cloud infrastructures in enhancing enterprise data management and AI applications. Nasuni&#039;s approach eliminates the need for trad...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3538&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1287</video:duration>
<video:live>no</video:live>
<video:view_count>272</video:view_count>
<video:publication_date>2024-09-27</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3537/view-io-harnessing-in-house-data-for-ai/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3537_1727258720_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[View.IO: Harnessing In-House Data for AI]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3537&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>863</video:duration>
<video:live>no</video:live>
<video:view_count>259</video:view_count>
<video:publication_date>2024-09-25</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3513/kpmg-powered-enterprise-global-business-services-enabled-by-servicenow/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3513_1723155197_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[KPMG Powered Enterprise Global Business Services enabled by ServiceNow]]></video:title>
<video:description><![CDATA[KPMG Powered Enterprise Global Business Services, enabled by ServiceNow, is designed to help organizations overcome the challenges associated with creating more effective business services, and better manage the change program to get there. It provides...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3513&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>309</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2024-08-08</video:publication_date>
<video:tag>kpmg</video:tag>
<video:tag>servicenow</video:tag>
<video:tag>powered</video:tag>
<video:tag>gbs</video:tag>
<video:tag>powered</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>global</video:tag>
<video:tag>business</video:tag>
<video:tag>services</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3514/thrive-through-todays-challenges-and-innovate-tomorrows-possibilities-with-kpmg-and-servicenow/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3514_1723155198_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Thrive through today’s challenges and innovate tomorrow’s possibilities with KPMG and ServiceNow]]></video:title>
<video:description><![CDATA[Discover how KPMG firms and ServiceNow can help you transform service delivery operations, meet regulatory requirements specific to your industry, and connect workflows across front, middle and back-office functions.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3514&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>96</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-08-08</video:publication_date>
<video:tag>thrive</video:tag>
<video:tag>through</video:tag>
<video:tag>today’s</video:tag>
<video:tag>challenges</video:tag>
<video:tag>and</video:tag>
<video:tag>innovate</video:tag>
<video:tag>tomorrow’s</video:tag>
<video:tag>possibilities</video:tag>
<video:tag>with</video:tag>
<video:tag>kpmg</video:tag>
<video:tag>and</video:tag>
<video:tag>servicenow</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3515/back-to-baseline-with-kpmg-and-servicenow/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3515_1723155200_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Back to Baseline with KPMG and ServiceNow]]></video:title>
<video:description><![CDATA[Get back to baseline and realize more value with your ServiceNow platform.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3515&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>101</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2024-08-08</video:publication_date>
<video:tag>back</video:tag>
<video:tag>to</video:tag>
<video:tag>baseline</video:tag>
<video:tag>servicenow</video:tag>
<video:tag>platform</video:tag>
<video:tag>kpmg</video:tag>
<video:tag>servicenow</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3516/earn-stakeholder-trust-and-enhance-resilience-with-kpmg-and-servicenow/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3516_1723155202_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Earn stakeholder trust and enhance resilience with KPMG and ServiceNow]]></video:title>
<video:description><![CDATA[With the assistance of KPMG and ServiceNow, you can build resilience and earn stakeholder trust by taking a dynamic approach to risk. When you gain the trust of your stakeholders, you lay the groundwork for responsible growth, bold innovation, and long...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3516&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>36</video:duration>
<video:view_count>39</video:view_count>
<video:publication_date>2024-08-08</video:publication_date>
<video:tag>kpmg</video:tag>
<video:tag>servicenow</video:tag>
<video:tag>business</video:tag>
<video:tag>solutions</video:tag>
<video:tag>trust</video:tag>
<video:tag>partnership</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3517/kpmg-lighthouse-servicenow/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3517_1723155204_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[KPMG Lighthouse ServiceNow]]></video:title>
<video:description><![CDATA[Meet members of the KPMG Lighthouse ServiceNow team as they share how working across different client projects creates a diverse and exciting opportunity to think outside the box. And with KPMG’s investment in our people and their development, discover...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3517&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>98</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-08-08</video:publication_date>
<video:tag>kpmg</video:tag>
<video:tag>lighthouse</video:tag>
<video:tag>servicenow</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3518/kpmg-and-servicenow-expand-commitment-to-reimagine-finance-supply-chain-and-procurement-operations/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3518_1723155206_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[KPMG and ServiceNow expand commitment to reimagine finance, supply chain, and procurement operations]]></video:title>
<video:description><![CDATA[KPMG and ServiceNow announced an expanded commitment to reimagine finance, supply chain, and procurement operations. The expanded partnership is part of a decade-long relationship that spans IT, HR, risk, cybersecurity, and environmental, social and go...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3518&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>51</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2024-08-08</video:publication_date>
<video:tag>kpmg</video:tag>
<video:tag>and</video:tag>
<video:tag>servicenow</video:tag>
<video:tag>expand</video:tag>
<video:tag>commitment</video:tag>
<video:tag>to</video:tag>
<video:tag>reimagine</video:tag>
<video:tag>finance</video:tag>
<video:tag>supply</video:tag>
<video:tag>chain</video:tag>
<video:tag>and</video:tag>
<video:tag>procurement</video:tag>
<video:tag>operations</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3504/the-ey-servicenow-alliance/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3504_1723080695_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The EY-ServiceNow alliance]]></video:title>
<video:description><![CDATA[The EY-ServiceNow alliance is reimagining what businesses can be, and what people can do. Together we build a better working world, where businesses work smoother, employees work smarter, and customers don’t have to work at all.Get more insights from E...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3504&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>79</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2024-08-07</video:publication_date>
<video:tag>eyllp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3505/how-servicenow-and-ey-are-working-together-to-digitize-tax-functions/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3505_1723080697_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How ServiceNow and EY are working together to digitize tax functions]]></video:title>
<video:description><![CDATA[ServiceNow CEO Bill McDermott and EY Global CEO Carmine Di Sibio join &#039;TechCheck&#039; to discuss how expanding the two companies partnership has helped digitize tax functions. For access to live and exclusive video from CNBC subscribe to CNBC PRO: https:...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3505&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>253</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-08-07</video:publication_date>
<video:tag>eyllp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3506/ey-and-servicenow®-helping-organizations-succeed-in-the-transformative-age/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3506_1723080698_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[EY and ServiceNow® : Helping organizations succeed in the Transformative Age]]></video:title>
<video:description><![CDATA[Dave Padmos, EY Global Technology Sector Leader – Advisory Services shares his insights and perspective on how EY and our ServiceNow alliance are helping clients transform to embrace a digital future.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3506&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>115</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-08-07</video:publication_date>
<video:tag>eyllp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3507/ey-and-servicenow-how-can-you-turn-it-insights-into-business-breakthroughs/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3507_1723080700_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[EY and ServiceNow: How can you turn IT insights into business breakthroughs?]]></video:title>
<video:description><![CDATA[EY and ServiceNow are innovating to help solve our clients’ toughest business challenges in this Transformative Age. For more information, explore ey.com/servicenow and follow @EY_Alliances.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3507&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>99</video:duration>
<video:view_count>39</video:view_count>
<video:publication_date>2024-08-07</video:publication_date>
<video:tag>eyllp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3508/servicenow-series-e77-paul-webb-global-servicenow-alliance-leader-at-ey/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3508_1723080702_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[ServiceNow Series E77: Paul Webb, Global ServiceNow Alliance Leader at EY]]></video:title>
<video:description><![CDATA[Today’s guest is Paul Webb, Global ServiceNow Alliance Leader at EY in San Francisco. The EY–ServiceNow Alliance combines ingenuity with a leading digital workflow platform. They innovate together to deliver workflow automation that enables better conn...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3508&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>884</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-08-07</video:publication_date>
<video:tag>eyllp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3509/ey-ai-the-face-of-the-future/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3509_1723080704_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[EY.ai - The Face of the Future]]></video:title>
<video:description><![CDATA[“The Face of the Future” is an assertion of the EY belief that confidence in AI needs to be instilled by prioritizing a people-first approach.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3509&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>66</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2024-08-07</video:publication_date>
<video:tag>eyllp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3510/use-genai-to-revolutionize-your-business/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3510_1723080706_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Use GenAI to Revolutionize Your Business]]></video:title>
<video:description><![CDATA[Dive into the future of business with Jeff Wray, EY Parthenon leader, as he reveals how Generative AI is reshaping industries worldwide. Whether you&#039;re a business leader or tech enthusiast, this is your guide to understanding the transformative power ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3510&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1108</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-08-07</video:publication_date>
<video:tag>eyllp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3511/ey-insurance-leaders-discuss-key-industry-trends-as-outlined-in-the-2024-global-insurance-outlook/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3511_1723080707_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[EY insurance leaders discuss key industry trends as outlined in the 2024 global insurance outlook]]></video:title>
<video:description><![CDATA[EY leaders discuss findings from this year’s Outlook report, which focuses on the rise of artificial intelligence, unlocking societal value and the need for innovation.Visit https://ey.com/insuranceoutlook2024 to read the full report.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3511&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>839</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-08-07</video:publication_date>
<video:tag>eyllp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3512/ey-ecosystems-orchestrating-technology-data-and-relationships/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3512_1723080709_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[EY Ecosystems: orchestrating technology, data and relationships]]></video:title>
<video:description><![CDATA[By orchestrating the right technology, data, capabilities and relationships, EY creates ecosystem strategies that unlock new sources of value and competitive advantage and drive agility, efficiency and resilience across our clients’ organizations.Get m...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3512&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>73</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2024-08-07</video:publication_date>
<video:tag>eyllp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3481/qumulo-cloud-storage-for-ai-workloads-with-efficient-gpu-utilization/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3481_1721923656_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Qumulo: Cloud Storage for AI Workloads with Efficient GPU Utilization]]></video:title>
<video:description><![CDATA[Mike Matchett met with Ryan Farris, VP of Product and Marketing at Qumulo, to discuss the use of cloud storage for AI workloads.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3481&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1179</video:duration>
<video:live>no</video:live>
<video:view_count>71</video:view_count>
<video:publication_date>2024-08-01</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>qumulo</video:tag>
<video:tag>ai</video:tag>
<video:tag>cloud</video:tag>
<video:tag>storage</video:tag>
<video:tag>cloud</video:tag>
<video:tag>storage</video:tag>
<video:tag>scalable</video:tag>
<video:tag>object</video:tag>
<video:tag>storage</video:tag>
<video:tag>onprem</video:tag>
<video:tag>gpu</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>elasticity</video:tag>
<video:tag>mlperf</video:tag>
<video:tag>spec</video:tag>
<video:tag>storage</video:tag>
<video:tag>azure</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3350/ddn-infinia-pioneering-a-new-era-of-multi-tenant-data-solutions/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3350_1707950766_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[DDN Infinia: Pioneering a New Era of Multi-Tenant Data Solutions]]></video:title>
<video:description><![CDATA[In the face of today&#039;s unprecedented data explosion, enterprises are in dire need of a solution that can not only manage but also harness the power of vast volumes of distributed data with unmatched efficiency. Enter DDN&#039;s Infinia: a revolutionary pl...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3350&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>540</video:duration>
<video:live>no</video:live>
<video:view_count>133</video:view_count>
<video:publication_date>2024-07-31</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>ddn</video:tag>
<video:tag>infinia</video:tag>
<video:tag>multi-tenant</video:tag>
<video:tag>multitenant</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>software-defined</video:tag>
<video:tag>security</video:tag>
<video:tag>scalability</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3388/ddn-and-nvidia-performance-boosted-storage-that-hpc-and-ai-workloads-need/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3388_1712176261_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[DDN and Nvidia: Performance Boosted Storage that HPC and AI Workloads Need]]></video:title>
<video:description><![CDATA[Mike Matchett and James Coomer delve into the AI and high-performance computing (HPC) partnership between DDN (DataDirect Networks) and Nvidia.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3388&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1159</video:duration>
<video:live>no</video:live>
<video:view_count>69</video:view_count>
<video:publication_date>2024-07-30</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>ddn</video:tag>
<video:tag>datadirect</video:tag>
<video:tag>networks</video:tag>
<video:tag>coomer</video:tag>
<video:tag>ai</video:tag>
<video:tag>hpc</video:tag>
<video:tag>high-performance</video:tag>
<video:tag>computing</video:tag>
<video:tag>nvidia</video:tag>
<video:tag>bluefield</video:tag>
<video:tag>dpu</video:tag>
<video:tag>storage</video:tag>
<video:tag>ai</video:tag>
<video:tag>workload</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>supercomputer</video:tag>
<video:tag>supercomputers</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3470/cirata-seamless-data-migration-for-growing-data-volumes/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3470_1719508276_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cirata: Seamless Data Migration for Growing Data Volumes]]></video:title>
<video:description><![CDATA[In a recent discussion with Mike Matchett of Small World Big Data, Paul Scott-Murphy, CTO of Cirata, talked about the complexities of managing and migrating multi-petabyte data environments. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3470&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>947</video:duration>
<video:live>no</video:live>
<video:view_count>257</video:view_count>
<video:publication_date>2024-07-24</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>cirata</video:tag>
<video:tag>petabyte</video:tag>
<video:tag>storage</video:tag>
<video:tag>migration</video:tag>
<video:tag>data</video:tag>
<video:tag>migration</video:tag>
<video:tag>data</video:tag>
<video:tag>availability</video:tag>
<video:tag>devops</video:tag>
<video:tag>wandisco</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3478/digital-dopplegangers-the-dual-faces-of-deepfake-technology/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3478_1721392445_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Digital Dopplegangers: The Dual Faces of Deepfake Technology]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3478&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3437</video:duration>
<video:live>no</video:live>
<video:view_count>475</video:view_count>
<video:publication_date>2024-07-15</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3409/veeam-s-blueprint-for-modern-resilience/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3409_1715196353_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Veeam&#039;s Blueprint for Modern Resilience]]></video:title>
<video:description><![CDATA[Analyst Mike Matchett and Rick Vanover, VP, Product Strategy from Veeam, sat down for a deep dive into the data protection landscape in today&#039;s cybersecurity-centric world. The discussion unveils Veeam&#039;s strategic advancements in ensuring data resili...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3409&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>977</video:duration>
<video:live>no</video:live>
<video:view_count>87</video:view_count>
<video:publication_date>2024-07-01</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>vanover</video:tag>
<video:tag>veeam</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>data</video:tag>
<video:tag>resilience</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>data</video:tag>
<video:tag>security</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>ai</video:tag>
<video:tag>data</video:tag>
<video:tag>recovery</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3469/asigra-saasassure-reliable-backup-for-hundreds-of-saas-platforms/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3469_1719500405_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Asigra SaaSAssure: Reliable Backup for Hundreds of SaaS Platforms]]></video:title>
<video:description><![CDATA[With 80-85% of organizational data outside traditional IT environments—and this number is expected to rise to 95%—the risk of unprotected SaaS data is significant. SaaSAssure offers backup capabilities not just for Microsoft 365, Salesforce, and Google...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3469&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>989</video:duration>
<video:live>no</video:live>
<video:view_count>271</video:view_count>
<video:publication_date>2024-06-27</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>asigra</video:tag>
<video:tag>saasassure</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>saas</video:tag>
<video:tag>data</video:tag>
<video:tag>data</video:tag>
<video:tag>storage</video:tag>
<video:tag>backup</video:tag>
<video:tag>microsoft</video:tag>
<video:tag>365</video:tag>
<video:tag>m365</video:tag>
<video:tag>goodle</video:tag>
<video:tag>google</video:tag>
<video:tag>workspace</video:tag>
<video:tag>salesforce</video:tag>
<video:tag>saas</video:tag>
<video:tag>platforms</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>cyberthreats</video:tag>
<video:tag>data</video:tag>
<video:tag>recoverability</video:tag>
<video:tag>data</video:tag>
<video:tag>loss</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3463/xebia-cloud-native-aws-premier-partner-with-a-focus-on-migration-data-genai-and-finops/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3463_1718823276_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Xebia - Cloud-Native AWS Premier Partner with a focus on Migration, Data, GenAI, and FinOps]]></video:title>
<video:description><![CDATA[Xebia is an AWS Premier Consulting partner and authorized training partner boasting a broad range of AWS competencies and service delivery designations across multiple verticals, such as Financial Services and Retail. Our AWS specializations are cloud ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3463&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>118</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>xebia</video:tag>
<video:tag>it</video:tag>
<video:tag>consultancy</video:tag>
<video:tag>agile</video:tag>
<video:tag>quality</video:tag>
<video:tag>&amp;</video:tag>
<video:tag>test</video:tag>
<video:tag>automation</video:tag>
<video:tag>devops</video:tag>
<video:tag>full</video:tag>
<video:tag>stack</video:tag>
<video:tag>development</video:tag>
<video:tag>continuous</video:tag>
<video:tag>delivery</video:tag>
<video:tag>big</video:tag>
<video:tag>data</video:tag>
<video:tag>deployment</video:tag>
<video:tag>automation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3464/retrieval-augmented-generation-rag-using-aws-bedrock/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3464_1718823278_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Retrieval Augmented Generation (RAG) using AWS Bedrock]]></video:title>
<video:description><![CDATA[Amazon Bedrock is a fully managed service that makes high-performing foundation models (FMs) from leading AI startups and Amazon available for your use through a unified API. It also offers a broad set of capabilities to build generative AI application...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3464&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>70</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>#rag</video:tag>
<video:tag>#aws</video:tag>
<video:tag>bedrock</video:tag>
<video:tag>#gen</video:tag>
<video:tag>ai</video:tag>
<video:tag>#generative</video:tag>
<video:tag>ai</video:tag>
<video:tag>llm</video:tag>
<video:tag>#vector</video:tag>
<video:tag>db</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3465/agents-for-amazon-bedrock-amazon-web-services/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3465_1718823280_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Agents for Amazon Bedrock | Amazon Web Services]]></video:title>
<video:description><![CDATA[With Amazon Bedrock, you can easily build and scale generative AI applications with security, privacy, and responsible AI. This demo shows you how to use Agents for Amazon Bedrock to configure specialized generative agents that seamlessly execute multi...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3465&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>778</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>chain</video:tag>
<video:tag>of</video:tag>
<video:tag>thought</video:tag>
<video:tag>foundation</video:tag>
<video:tag>models</video:tag>
<video:tag>generative</video:tag>
<video:tag>agents</video:tag>
<video:tag>llms</video:tag>
<video:tag>prompt</video:tag>
<video:tag>engineering</video:tag>
<video:tag>task</video:tag>
<video:tag>orchestration</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3466/monitor-your-aws-generative-ai-stack-with-datadog/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3466_1718823282_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Monitor your AWS generative AI Stack with Datadog]]></video:title>
<video:description><![CDATA[As organizations increasingly leverage generative AI in their applications, ensuring end-to-end observability throughout the development and deployment lifecycle becomes crucial. This webinar showcases how to achieve comprehensive observability when de...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3466&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3051</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>monitor</video:tag>
<video:tag>your</video:tag>
<video:tag>aws</video:tag>
<video:tag>generative</video:tag>
<video:tag>ai</video:tag>
<video:tag>stack</video:tag>
<video:tag>with</video:tag>
<video:tag>datadog</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3460/rust-for-the-impatient/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3460_1718817806_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Rust for the impatient]]></video:title>
<video:description><![CDATA[A 10-minute lightning talk taking you from zero to Rust!If you would like to support what I do, I have set up a patreon here: https://www.patreon.com/noboilerplate Thank you!This video is based on the excellent article https://fasterthanli.me/articles/...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3460&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>643</video:duration>
<video:view_count>39</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>rust</video:tag>
<video:tag>for</video:tag>
<video:tag>the</video:tag>
<video:tag>impatient</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3461/the-rust-survival-guide/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3461_1718817807_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Rust Survival Guide]]></video:title>
<video:description><![CDATA[Think Rust is hard? In this video, I&#039;ll guide you through the essential aspects of Rust programming. These topics often pose challenges, leading developers to the brink of frustration. By the end of this tutorial, you&#039;ll be armed with the knowledge t...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3461&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>754</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>rust</video:tag>
<video:tag>language</video:tag>
<video:tag>rust</video:tag>
<video:tag>tutorial</video:tag>
<video:tag>rust</video:tag>
<video:tag>basics</video:tag>
<video:tag>rust</video:tag>
<video:tag>concepts</video:tag>
<video:tag>rust</video:tag>
<video:tag>lifetimes</video:tag>
<video:tag>rust</video:tag>
<video:tag>borrowing</video:tag>
<video:tag>rust</video:tag>
<video:tag>ownerships</video:tag>
<video:tag>rust</video:tag>
<video:tag>memory</video:tag>
<video:tag>management</video:tag>
<video:tag>rust</video:tag>
<video:tag>coding</video:tag>
<video:tag>programming</video:tag>
<video:tag>tips</video:tag>
<video:tag>coding</video:tag>
<video:tag>tutorial</video:tag>
<video:tag>learn</video:tag>
<video:tag>rust</video:tag>
<video:tag>rust</video:tag>
<video:tag>best</video:tag>
<video:tag>practices</video:tag>
<video:tag>rust</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3462/the-ultimate-rust-ide-is-here/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3462_1718817809_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The ultimate Rust IDE is here]]></video:title>
<video:description><![CDATA[Let&#039;s take a look at the new Rust IDE by JetBrains. I&#039;ll compare it to the other editors and IDEs like VSCode, Fleet and the existing IntelliJ Rust plugin. Is it going to radically change how we develop our Rust apps? Let&#039;s find out!FREE Rust cheat ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3462&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>413</video:duration>
<video:view_count>40</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>rust</video:tag>
<video:tag>rust</video:tag>
<video:tag>languange</video:tag>
<video:tag>rust</video:tag>
<video:tag>news</video:tag>
<video:tag>rust</video:tag>
<video:tag>update</video:tag>
<video:tag>2023</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>rust</video:tag>
<video:tag>2023</video:tag>
<video:tag>rust</video:tag>
<video:tag>languange</video:tag>
<video:tag>2023</video:tag>
<video:tag>rust</video:tag>
<video:tag>for</video:tag>
<video:tag>beginners</video:tag>
<video:tag>rust</video:tag>
<video:tag>coding</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>languange</video:tag>
<video:tag>learn</video:tag>
<video:tag>how</video:tag>
<video:tag>to</video:tag>
<video:tag>code</video:tag>
<video:tag>in</video:tag>
<video:tag>rust</video:tag>
<video:tag>coding</video:tag>
<video:tag>in</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3457/aws-re-invent-2022-rust-is-interesting-but-does-it-really-make-sense-for-me-boa201/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3457_1718817364_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[AWS re:Invent 2022 - Rust is interesting, but does it really make sense for me? (BOA201)]]></video:title>
<video:description><![CDATA[In this session, see some of the seemingly outlandish claims made by Rust and its ever-growing community put to the test. Rust has won Stack Overflow’s most loved programming language award in its annual developer survey—7 years in a row! But how good ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3457&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2243</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>aws</video:tag>
<video:tag>amazon</video:tag>
<video:tag>web</video:tag>
<video:tag>services</video:tag>
<video:tag>aws</video:tag>
<video:tag>cloud</video:tag>
<video:tag>amazon</video:tag>
<video:tag>cloud</video:tag>
<video:tag>aws</video:tag>
<video:tag>reinvent</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3458/rust-and-raii-memory-management-computerphile/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3458_1718817366_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Rust and RAII Memory Management - Computerphile]]></video:title>
<video:description><![CDATA[Rust has memory management built in. Ian Knight takes us through some of its features.Garbage Collection video: https://youtu.be/c32zXYAK7CI https://www.facebook.com/computerphilehttps://twitter.com/computer_phileThis video was filmed and edited by Sea...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3458&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1462</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>computers</video:tag>
<video:tag>computerphile</video:tag>
<video:tag>computer</video:tag>
<video:tag>science</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3459/this-is-how-rust-stops-memory-leaks/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3459_1718817369_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[This Is How Rust Stops Memory Leaks]]></video:title>
<video:description><![CDATA[LOW LEVEL RUSTACEANS! Welcome back! In today&#039;s video we discuss Rust Ownership. Rust Ownership is a concept that prevents variables from being lost in runtime, ultimately preventing memory leaks. By assigning ownership and allowing for the borrowing o...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3459&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>353</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>rust</video:tag>
<video:tag>ownership</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>embedded</video:tag>
<video:tag>rust</video:tag>
<video:tag>rust</video:tag>
<video:tag>memory</video:tag>
<video:tag>safety</video:tag>
<video:tag>rust</video:tag>
<video:tag>hello</video:tag>
<video:tag>world</video:tag>
<video:tag>arduino</video:tag>
<video:tag>maker</video:tag>
<video:tag>craft</video:tag>
<video:tag>hobby</video:tag>
<video:tag>electronics</video:tag>
<video:tag>wires</video:tag>
<video:tag>temperature</video:tag>
<video:tag>safety</video:tag>
<video:tag>project</video:tag>
<video:tag>board</video:tag>
<video:tag>electric</video:tag>
<video:tag>leds</video:tag>
<video:tag>led</video:tag>
<video:tag>thonny</video:tag>
<video:tag>python</video:tag>
<video:tag>micropython</video:tag>
<video:tag>os</video:tag>
<video:tag>ide</video:tag>
<video:tag>onewire</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3447/how-to-create-an-aws-s3-file-upload-service-in-rust-axum/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3447_1718817070_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How to create an AWS S3  File Upload Service in Rust Axum]]></video:title>
<video:description><![CDATA[Learn how to build a Rust web service to upload files to an AWS S3 bucket with this step-by-step tutorial. For consultancy services, please visit my website at https://cudi.dev or email me at cudidotdev@gmail.com.Please support me by buying me a coffee...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3447&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>735</video:duration>
<video:view_count>77</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>rust</video:tag>
<video:tag>web</video:tag>
<video:tag>development</video:tag>
<video:tag>aws</video:tag>
<video:tag>s3</video:tag>
<video:tag>file</video:tag>
<video:tag>upload</video:tag>
<video:tag>axum</video:tag>
<video:tag>multipart</video:tag>
<video:tag>aws</video:tag>
<video:tag>sdk</video:tag>
<video:tag>rust</video:tag>
<video:tag>rust</video:tag>
<video:tag>production</video:tag>
<video:tag>rust</video:tag>
<video:tag>async</video:tag>
<video:tag>await</video:tag>
<video:tag>request</video:tag>
<video:tag>body</video:tag>
<video:tag>limit</video:tag>
<video:tag>json</video:tag>
<video:tag>response</video:tag>
<video:tag>unique</video:tag>
<video:tag>filenames</video:tag>
<video:tag>secure</video:tag>
<video:tag>file</video:tag>
<video:tag>handling</video:tag>
<video:tag>scalable</video:tag>
<video:tag>deployment</video:tag>
<video:tag>rust</video:tag>
<video:tag>error</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3448/rust-for-web-assembly-setup-tutorial-guide/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3448_1718817071_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Rust for Web Assembly | Setup + Tutorial Guide]]></video:title>
<video:description><![CDATA[A tutorial on building web applications using Rust through Web Assembly. I compared the speed between web assembly and JavaScript by running a prime number checker written in Rust and one written in Javascript while measuring their execution speed.I ho...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3448&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>494</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>rust</video:tag>
<video:tag>rist</video:tag>
<video:tag>web</video:tag>
<video:tag>assemmbly</video:tag>
<video:tag>web</video:tag>
<video:tag>asembly</video:tag>
<video:tag>web</video:tag>
<video:tag>asemmbly</video:tag>
<video:tag>js</video:tag>
<video:tag>javascrupt</video:tag>
<video:tag>javascropt</video:tag>
<video:tag>wasm</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3449/using-aws-cli-profiles-in-rust/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3449_1718817073_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Using AWS CLI Profiles in Rust]]></video:title>
<video:description><![CDATA[A short video on how to use AWS CLI profiles in Rust SDK for AWS. A comment on a previous video gave me this idea, I just have been late to produce this :| #aws #rust #sdk #cliprofiles #identity #security Attributions-----------------Alarm icons create...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3449&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>373</video:duration>
<video:view_count>42</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>aws</video:tag>
<video:tag>amazon</video:tag>
<video:tag>web</video:tag>
<video:tag>services</video:tag>
<video:tag>rust</video:tag>
<video:tag>rust</video:tag>
<video:tag>sdk</video:tag>
<video:tag>aws</video:tag>
<video:tag>cli</video:tag>
<video:tag>aws</video:tag>
<video:tag>cli</video:tag>
<video:tag>profiles</video:tag>
<video:tag>aws</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3450/process-kinesis-streams-with-aws-lambda-rust/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3450_1718817075_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Process Kinesis Streams with AWS Lambda &amp; Rust]]></video:title>
<video:description><![CDATA[Hi, I&#039;m James. And in this video you&#039;re going to learn how to build a high performance, safe and sustainable stream processing using Rust, AWS Lambda and Amazon Kinesis.00:00 - Introduction01:30 - Handling Kinesis events03:40 - Processing a Kinesis r...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3450&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>835</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>rustlang</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>serverless</video:tag>
<video:tag>sqs</video:tag>
<video:tag>aws</video:tag>
<video:tag>lambda</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3451/rustls-now-using-aws-libcrypto-for-rust-aws-onair-s05/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3451_1718817077_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Rust ls Now Using AWS Libcrypto for Rust | AWS OnAir S05]]></video:title>
<video:description><![CDATA[Watch this session as we talk about how Rustls is using #AWS-LC to help their users improve performance and security of TLS-enabled Rust applications. Learn more at https://aws.amazon.com/security/opensource/cryptography/Follow AWS OnAir: LinkedIn: htt...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3451&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1366</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>aws</video:tag>
<video:tag>amazon</video:tag>
<video:tag>web</video:tag>
<video:tag>services</video:tag>
<video:tag>aws</video:tag>
<video:tag>cloud</video:tag>
<video:tag>amazon</video:tag>
<video:tag>cloud</video:tag>
<video:tag>aws</video:tag>
<video:tag>onair</video:tag>
<video:tag>aws</video:tag>
<video:tag>on</video:tag>
<video:tag>air</video:tag>
<video:tag>am</video:tag>
<video:tag>grobelny</video:tag>
<video:tag>adrian</video:tag>
<video:tag>san</video:tag>
<video:tag>miguel</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3452/easily-build-and-deploy-serverless-functions-on-aws-with-rust/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3452_1718817079_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Easily Build and Deploy Serverless Functions on AWS with Rust]]></video:title>
<video:description><![CDATA[As a high-performance programming language, Rust is useful for building responsive services across a variety of compute models. In this video, we&#039;ll take a look at an open-source tool that simplifies the process of packaging, testing, and deploying yo...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3452&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1003</video:duration>
<video:view_count>35</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>easily</video:tag>
<video:tag>build</video:tag>
<video:tag>and</video:tag>
<video:tag>deploy</video:tag>
<video:tag>serverless</video:tag>
<video:tag>functions</video:tag>
<video:tag>on</video:tag>
<video:tag>aws</video:tag>
<video:tag>with</video:tag>
<video:tag>rust</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3453/how-to-build-and-deploy-your-rust-aws-lambda-function-full-tutorial/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3453_1718817081_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How to Build and Deploy Your Rust AWS Lambda Function (Full Tutorial)]]></video:title>
<video:description><![CDATA[Today we are going to learn how you can build and deploy your own AWS Lambda function with Rust! Leveraging on Cargo Lambda!Timestamps:0:00 - Introduction0:20 - Initial Setup2:40 - The Rust Lambda function3:57 - Running locally6:09 - Configuring AWS11:...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3453&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1332</video:duration>
<video:view_count>39</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>technology</video:tag>
<video:tag>coding</video:tag>
<video:tag>development</video:tag>
<video:tag>programming</video:tag>
<video:tag>react</video:tag>
<video:tag>react</video:tag>
<video:tag>native</video:tag>
<video:tag>software</video:tag>
<video:tag>a</video:tag>
<video:tag>i</video:tag>
<video:tag>machine</video:tag>
<video:tag>learning</video:tag>
<video:tag>coding</video:tag>
<video:tag>tips</video:tag>
<video:tag>programming</video:tag>
<video:tag>tips</video:tag>
<video:tag>programming</video:tag>
<video:tag>tricks</video:tag>
<video:tag>design</video:tag>
<video:tag>tricks</video:tag>
<video:tag>nextjs</video:tag>
<video:tag>13</video:tag>
<video:tag>next</video:tag>
<video:tag>js</video:tag>
<video:tag>13</video:tag>
<video:tag>rust</video:tag>
<video:tag>crash</video:tag>
<video:tag>course</video:tag>
<video:tag>rust</video:tag>
<video:tag>2023</video:tag>
<video:tag>rust</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3454/rust-on-aws-really-fast-lambdas/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3454_1718817082_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Rust On AWS (Really FAST Lambdas)]]></video:title>
<video:description><![CDATA[Learn about why you should consider the Rust language when using AWS Lambdas, especially when you need to minimize cold start times.We walk through using the Rust AWS SDK and creating a Rust based Lambda.Code can be found here: https://github.com/Me163...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3454&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>634</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>rust</video:tag>
<video:tag>aws</video:tag>
<video:tag>fast</video:tag>
<video:tag>walkthrough</video:tag>
<video:tag>tutorial</video:tag>
<video:tag>lambda</video:tag>
<video:tag>rustacean</video:tag>
<video:tag>rustlang</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3455/build-your-entire-tech-stack-in-rust/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3455_1718817084_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Build your entire tech stack in Rust]]></video:title>
<video:description><![CDATA[Today we are talking about a brand new tech stack which allows you to build your entire application in Rust!FREE Rust Cheat Sheet: https://letsgetrusty.com/cheatsheetCode: https://github.com/letsgetrusty/rsty-stack-example]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3455&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>442</video:duration>
<video:view_count>68</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>learn</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>language</video:tag>
<video:tag>learn</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>language</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>tutorial</video:tag>
<video:tag>learn</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>language</video:tag>
<video:tag>tutorial</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>project</video:tag>
<video:tag>rust</video:tag>
<video:tag>programming</video:tag>
<video:tag>to</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3456/rust-wasm/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3456_1718817086_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Rust &amp; Wasm]]></video:title>
<video:description><![CDATA[Today I&#039;m going to talk about building apps you can deploy anywhere with no installation by using Rust and WebAssembly.Sponsor: Quadratic - The Data Science Spreadsheet for EngineersCheck out the project on Github: https://github.com/quadratichq/quadr...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3456&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>578</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2024-06-19</video:publication_date>
<video:tag>rust</video:tag>
<video:tag>&amp;</video:tag>
<video:tag>wasm</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3445/360view-please-standby/</loc>
<video:video>
<video:thumbnail_loc>https://www.truthinit.com/public/common/images/_default_clip_thumb.gif</video:thumbnail_loc>
<video:title><![CDATA[360View Please Standby]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3445&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>27</video:duration>
<video:live>no</video:live>
<video:view_count>35</video:view_count>
<video:publication_date>2024-06-18</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3386/ixsystems-truenas-cost-effective-open-data-storage/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3386_1711649172_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[iXsystems TrueNAS: Cost-Effective Open Data Storage]]></video:title>
<video:description><![CDATA[In a conversation with Mike Matchett from Small World Big Data, Mario Blandini of iXsystems delves into the unique positioning of TrueNAS in the marketplace, particularly amidst industry shakeups like VMware&#039;s acquisition by Broadcom.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3386&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>932</video:duration>
<video:live>no</video:live>
<video:view_count>51</video:view_count>
<video:publication_date>2024-06-12</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>ixsystems</video:tag>
<video:tag>truenas</video:tag>
<video:tag>vmware</video:tag>
<video:tag>broadcom</video:tag>
<video:tag>open</video:tag>
<video:tag>storage</video:tag>
<video:tag>data</video:tag>
<video:tag>storage</video:tag>
<video:tag>storage</video:tag>
<video:tag>kvm</video:tag>
<video:tag>hypervisor</video:tag>
<video:tag>open-source</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3372/enkrypt-ai-security-and-compliance-for-llms-and-generative-ai/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3372_1711134939_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Enkrypt.ai: Security and Compliance for LLMs and Generative AI]]></video:title>
<video:description><![CDATA[Mike Matchett of Small World Big Data dives into AI security and compliance with Sahil Agarwal, Co-Founder &amp; CEO of Enkrypt.ai. In this discussion, Mike and Sahir discuss the critical challenges enterprises face when deploying generative AI, particular...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3372&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>699</video:duration>
<video:live>no</video:live>
<video:view_count>379</video:view_count>
<video:publication_date>2024-06-11</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>enkrypt</video:tag>
<video:tag>ai</video:tag>
<video:tag>security</video:tag>
<video:tag>compliance</video:tag>
<video:tag>ai</video:tag>
<video:tag>llm</video:tag>
<video:tag>generative</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>large</video:tag>
<video:tag>language</video:tag>
<video:tag>models</video:tag>
<video:tag>cybersecurity</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3385/silence-laboratories-data-privacy-and-safe-ai-collaboration/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3385_1711573698_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Silence Laboratories: Data Privacy and Safe AI Collaboration]]></video:title>
<video:description><![CDATA[Silence Laboratories focuses on multi-party computation (MPC) and privacy-preserving computation to tackle the pressing issues surrounding data privacy and AI security.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3385&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>832</video:duration>
<video:live>no</video:live>
<video:view_count>287</video:view_count>
<video:publication_date>2024-06-04</video:publication_date>
<video:tag>silence</video:tag>
<video:tag>laboratories</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>ai</video:tag>
<video:tag>security</video:tag>
<video:tag>mpc</video:tag>
<video:tag>computation</video:tag>
<video:tag>data</video:tag>
<video:tag>note</video:tag>
<video:tag>privacy</video:tag>
<video:tag>fraud</video:tag>
<video:tag>detection</video:tag>
<video:tag>inbrief</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3432/stride-conductor-genai-for-advanced-software-solutions/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3432_1716393826_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Stride Conductor: GenAI for Advanced Software Solutions]]></video:title>
<video:description><![CDATA[Mike Matchett spoke with Francisco Martin, CEO of Stride, about the transformative potential of Generative AI (GenAI) in software development.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3432&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>981</video:duration>
<video:live>no</video:live>
<video:view_count>353</video:view_count>
<video:publication_date>2024-05-31</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>stride</video:tag>
<video:tag>stride</video:tag>
<video:tag>conductor</video:tag>
<video:tag>genai</video:tag>
<video:tag>generative</video:tag>
<video:tag>ai</video:tag>
<video:tag>software</video:tag>
<video:tag>development</video:tag>
<video:tag>code</video:tag>
<video:tag>quality</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>software</video:tag>
<video:tag>software</video:tag>
<video:tag>maintenance</video:tag>
<video:tag>codebase</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3431/unlocking-the-secrets-understanding-app-and-service-providers/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3431_1716387879_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Unlocking the Secrets: Understanding App and Service Providers]]></video:title>
<video:description><![CDATA[This discussion revolves around the challenge of managing and monitoring various apps and services, considering their diverse use cases and the complexities involved. It&#039;s crucial to understand not only what data and actions are associated with these ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3431&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>100</video:duration>
<video:live>no</video:live>
<video:view_count>53</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>security</video:tag>
<video:tag>llm</video:tag>
<video:tag>ai</video:tag>
<video:tag>genai</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3430/transforming-security-it-operations-with-genai/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3430_1716387662_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Transforming Security &amp; IT Operations with GenAI]]></video:title>
<video:description><![CDATA[GenAI presents challenges and opportunities in IT, especially enhancing cybersecurity by addressing inherent risks with generative algorithms. The cybersecurity landscape is shifting from traditional data management to dealing with the potential harm t...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3430&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>159</video:duration>
<video:live>no</video:live>
<video:view_count>52</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>devops</video:tag>
<video:tag>security</video:tag>
<video:tag>genai</video:tag>
<video:tag>netksope</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3429/ciso-s-role-in-app-and-service-governance/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3429_1716387360_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[CISO&#039;s Role in App and Service Governance]]></video:title>
<video:description><![CDATA[When it comes to solving the problems GenAI can create, organizations benefit from involving diverse stakeholders to ensure transparency and control over the use of apps and services, often by employing models like an inventory or rating system for ass...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3429&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>139</video:duration>
<video:live>no</video:live>
<video:view_count>46</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>security</video:tag>
<video:tag>llm</video:tag>
<video:tag>ai</video:tag>
<video:tag>genai</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3428/the-power-of-ai-for-security-challenges-and-opportunities/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3428_1716387103_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Power of AI for Security: Challenges and Opportunities]]></video:title>
<video:description><![CDATA[The responsibility of managing AI services and related controls often extends beyond just the CISO, involving various business stakeholders such as legal and engineering teams for comprehensive oversight. For example, Netskope employs an AI governance ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3428&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>139</video:duration>
<video:live>no</video:live>
<video:view_count>54</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>security</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>dlp</video:tag>
<video:tag>ai</video:tag>
<video:tag>llm</video:tag>
<video:tag>genai</video:tag>
<video:tag>aws</video:tag>
<video:tag>matchett</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3427/unlocking-the-potential-of-genai-for-securing-it-systems/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3427_1716386846_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Unlocking the Potential of GenAI for Securing IT Systems]]></video:title>
<video:description><![CDATA[Generative AI presents a massive market opportunity with a projected CAGR of 17.9% and expected revenue of $2.6 billion over the next ten years, indicating we are in the early stages of its implementation. As generative AI use cases grow, there will be...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3427&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>139</video:duration>
<video:live>no</video:live>
<video:view_count>35</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3426/understanding-security-scoping-metrics-a-common-vocabulary-for-threats/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3426_1716386039_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Understanding Security Scoping Metrics: A Common Vocabulary for Threats]]></video:title>
<video:description><![CDATA[When discussing model scoping, it&#039;s crucial to have a unified terminology for security threats, which is the foundation of a security scoping matrix. This matrix categorizes different approaches into broad scoping metrics, facilitating a common vocabu...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3426&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>56</video:duration>
<video:live>no</video:live>
<video:view_count>42</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3425/transforming-it-with-ai-boosting-productivity-and-simplifying-security-tasks/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3425_1716385897_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Transforming IT with AI: Boosting Productivity and Simplifying Security Tasks]]></video:title>
<video:description><![CDATA[Organizations can leverage AI, particularly generative AI, for monitoring and managing various tasks, including incident response, automation, and compliance. By utilizing these AI tools, businesses can enhance productivity, quickly identify and resolv...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3425&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>114</video:duration>
<video:live>no</video:live>
<video:view_count>36</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3424/the-ultimate-guide-to-threat-modeling-in-organizational-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3424_1716385598_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Ultimate Guide to Threat Modeling in Organizational Security]]></video:title>
<video:description><![CDATA[The clip emphasizes the move to what Netskope terms, Scope 3, emphasizing the importance of threat modeling and resilience, especially in advanced use cases that drive innovation and disruption. Threat modeling should comply with organizational policie...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3424&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>97</video:duration>
<video:live>no</video:live>
<video:view_count>47</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>security</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>dlp</video:tag>
<video:tag>ai</video:tag>
<video:tag>llm</video:tag>
<video:tag>genai</video:tag>
<video:tag>aws</video:tag>
<video:tag>matchett</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3423/the-power-of-data-integration-unlocking-opportunities-and-enhancing-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3423_1716385420_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Power of Data Integration: Unlocking Opportunities and Enhancing Security]]></video:title>
<video:description><![CDATA[Removing silos to create a unified platform across a company can lead to greater accountability and the need for enhanced security measures. This consolidation makes it critical for systems to talk to each other effectively, which can be achieved eithe...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3423&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>146</video:duration>
<video:live>no</video:live>
<video:view_count>46</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>security</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>dlp</video:tag>
<video:tag>ai</video:tag>
<video:tag>llm</video:tag>
<video:tag>genai</video:tag>
<video:tag>aws</video:tag>
<video:tag>matchett</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3422/the-impact-of-eu-ai-regulations-on-companies-with-gen-ai/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3422_1716384700_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Impact of EU AI Regulations on Companies with Gen AI]]></video:title>
<video:description><![CDATA[The European Union recently passed AI regulations that are now almost fully approved, affecting how organizations utilize and secure AI systems. These regulations require companies to scrutinize the purpose and security of their AI initiatives, outlini...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3422&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>145</video:duration>
<video:live>no</video:live>
<video:view_count>35</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3421/the-future-of-ai-assistants-exploring-growth-and-challenges/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3421_1716384386_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Future of AI Assistants: Exploring Growth and Challenges]]></video:title>
<video:description><![CDATA[The AI assistant market is rapidly growing, with many platforms now incorporating AI companions or copilots. These assistants are increasingly present in online meetings, raising questions about their terms, conditions, and security, particularly regar...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3421&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>154</video:duration>
<video:live>no</video:live>
<video:view_count>43</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>copilot</video:tag>
<video:tag>llm</video:tag>
<video:tag>genai</video:tag>
<video:tag>robots</video:tag>
<video:tag>chatbots</video:tag>
<video:tag>netskope</video:tag>
<video:tag>aws</video:tag>
<video:tag>security</video:tag>
<video:tag>ai</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3420/supercharge-your-ai-projects-with-amazon-s-foundational-models/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3420_1716384257_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Supercharge Your AI Projects with AWS&#039;s Foundational Models]]></video:title>
<video:description><![CDATA[AWS aims to address diverse customer needs in adopting generative AI by offering a variety of foundational models through its Bedrock ecosystem and managed services like SageMaker, which provides pre-made models for easier AI training. They also collab...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3420&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>105</video:duration>
<video:live>no</video:live>
<video:view_count>35</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>aws</video:tag>
<video:tag>netskope</video:tag>
<video:tag>sagemaker</video:tag>
<video:tag>bedrock</video:tag>
<video:tag>ml</video:tag>
<video:tag>genai</video:tag>
<video:tag>ai</video:tag>
<video:tag>llm</video:tag>
<video:tag>anthropic</video:tag>
<video:tag>mistral</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3419/security-and-ai-risks-exploring-generative-ai-and-content-creation/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3419_1716383383_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Security and AI Risks: Exploring Generative AI and Content Creation]]></video:title>
<video:description><![CDATA[The discussion focuses on the broad topic of security in AI, particularly emphasizing generative AI (gen AI) and its associated risks. This clip highlights the fact that organizations are concerned with ensuring the accuracy and appropriateness of AI-g...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3419&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>108</video:duration>
<video:live>no</video:live>
<video:view_count>35</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3418/minimizing-risks-ensuring-data-integrity-in-ai-technology/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3418_1716383230_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Minimizing Risks &amp; Ensuring Data Integrity in AI Technology]]></video:title>
<video:description><![CDATA[Concerns persist over fully automated AI systems in security, especially regarding hallucinations and data integrity issues. Organizations are focusing on maintaining data quality and privacy through traditional fact-checking and implementing controls ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3418&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>127</video:duration>
<video:live>no</video:live>
<video:view_count>46</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3417/how-to-monitor-and-measure-ai-activity-in-business-applications/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3417_1716383047_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How to Monitor and Measure AI Activity in Business Applications]]></video:title>
<video:description><![CDATA[Organizations must begin monitoring AI activities to understand and manage how data is used and what decisions are being made. Regulations emphasize that certain behaviors, such as using AI to predict criminal offenses or performing social behavior mon...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3417&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>99</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3416/ai-in-decision-making-how-technology-guides-us/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3416_1716382899_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[AI in Decision Making: How Technology Guides Us]]></video:title>
<video:description><![CDATA[Neal Thacker discusses how their platform uses AI to assist users in decision-making by guiding them and ensuring security. He emphasizes the importance of alerting users to potential risks before using an app or service, referencing a previous discuss...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3416&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>43</video:duration>
<video:live>no</video:live>
<video:view_count>42</video:view_count>
<video:publication_date>2024-05-22</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3351/ragaai-transform-your-ai-workflow-with-flawless-deployments/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3351_1708115643_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[RagaAI: Transform Your AI Workflow with Flawless Deployments]]></video:title>
<video:description><![CDATA[In a rapidly evolving AI landscape, ensuring AI applications&#039; reliability, compliance, and operational efficiency has become paramount. RagaAI emerges as a pioneering force, introducing a groundbreaking testing platform designed to address these chall...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3351&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>877</video:duration>
<video:live>no</video:live>
<video:view_count>89</video:view_count>
<video:publication_date>2024-04-29</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>ragaai</video:tag>
<video:tag>testing</video:tag>
<video:tag>testing</video:tag>
<video:tag>platform</video:tag>
<video:tag>multi-tenant</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>automation</video:tag>
<video:tag>security</video:tag>
<video:tag>ai</video:tag>
<video:tag>testing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3352/hammerspace-bridging-data-silos-for-seamless-global-access/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3352_1708117611_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Hammerspace: Bridging Data Silos for Seamless Global Access]]></video:title>
<video:description><![CDATA[Explore how Hammerspace&#039;s hyperscale NAS and metadata management capabilities are leading the way in overcoming data gravity and unlocking new potentials for businesses worldwide.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3352&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>915</video:duration>
<video:live>no</video:live>
<video:view_count>76</video:view_count>
<video:publication_date>2024-04-19</video:publication_date>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>hammerspace</video:tag>
<video:tag>ai</video:tag>
<video:tag>high-performance</video:tag>
<video:tag>hpc</video:tag>
<video:tag>data</video:tag>
<video:tag>orchestration</video:tag>
<video:tag>datacenter</video:tag>
<video:tag>data</video:tag>
<video:tag>center</video:tag>
<video:tag>cloud</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>nas</video:tag>
<video:tag>ai</video:tag>
<video:tag>workload</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3392/the-new-normal-for-cisos-security-ratings-and-cyber-warfare/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3392_1712710183_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The New Normal for CISOs, Security Ratings and Cyber Warfare]]></video:title>
<video:description><![CDATA[Join Alexander Yampolskiy, CEO of SecurityScorecard, and cybersecurity guru Joe Sullivan (former CISO, Uber, Facebook, Cloudflare) in a profound webinar addressing the &#039;New Normal for CISOs: Security Ratings and Cyber Warfare&#039;. This discussion dives ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3392&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2906</video:duration>
<video:live>no</video:live>
<video:view_count>398</video:view_count>
<video:publication_date>2024-04-10</video:publication_date>
<video:tag>security</video:tag>
<video:tag>scorecard</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3366/enterprise-application-platform-modernization-with-commercial-linux/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3366_1711629302_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[Enterprise Application Platform Modernization with Commercial Linux]]></video:title>
<video:description><![CDATA[Join Red Hat and Truth in IT for an insightful webcast on Enterprise Application Platform Modernization with Commercial Linux. Nate Leger, Senior Technical Marketing Manager at Red Hat, alongside Greg Macatee, Senior Research Analyst at IDC, delve into...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3366&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2070</video:duration>
<video:live>no</video:live>
<video:view_count>400</video:view_count>
<video:publication_date>2024-03-28</video:publication_date>
<video:tag>redhat</video:tag>
<video:tag>linux</video:tag>
<video:tag>rhel</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
<video:tag>devops</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3384/surge-in-cyber-threats-navigating-the-storm-of-ddos-attacks-on-retail-beyond/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3384_1711400364_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Surge in Cyber Threats: Navigating the Storm of DDoS Attacks on Retail &amp; Beyond]]></video:title>
<video:description><![CDATA[Discover the alarming 800% rise in DDoS attacks against consumer electronics and retail adjacent sectors despite resolving supply chain issues. Dive into the multifaceted cyber threats targeting retail during the holiday season and their impact on vari...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3384&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>106</video:duration>
<video:live>no</video:live>
<video:view_count>52</video:view_count>
<video:publication_date>2024-03-25</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>ddos</video:tag>
<video:tag>security</video:tag>
<video:tag>networking</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3383/cloudflare-insights-navigating-ddos-trends-in-retail-q4-secure-your-holiday-sales/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3383_1711400116_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cloudflare Insights: Navigating DDoS Trends in Retail Q4 - Secure Your Holiday Sales!]]></video:title>
<video:description><![CDATA[ Cloudflare&#039;s latest findings dive into the Q4 spike in HTTP DDoS attacks targeting the retail industry during the high-stakes holiday season. Learn how to bolster your cyber defenses and keep your online business thriving amidst an 18% upsurge in att...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3383&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>145</video:duration>
<video:live>no</video:live>
<video:view_count>63</video:view_count>
<video:publication_date>2024-03-25</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>ddos</video:tag>
<video:tag>security</video:tag>
<video:tag>networking</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3382/cybersecurity-alert-ddos-trends-and-global-flashpoints-unveiled-insights-from-cloudflare-data/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3382_1711399813_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cybersecurity Alert: DDoS Trends and Global Flashpoints - Unveiled Insights from Cloudflare Data]]></video:title>
<video:description><![CDATA[Discover the alarming rise in DDoS attacks, particularly a staggering 3,300% year-over-year increase targeting Taiwan during political tensions. Learn how 82% originated from China and other trends affecting industries like adult entertainment and logi...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3382&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>107</video:duration>
<video:live>no</video:live>
<video:view_count>51</video:view_count>
<video:publication_date>2024-03-25</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>ddos</video:tag>
<video:tag>security</video:tag>
<video:tag>networking</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3381/the-real-world-impact-on-cyber-warfare-analyzing-ddos-trends/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3381_1711399432_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Real-World Impact on Cyber Warfare: Analyzing DDoS Trends]]></video:title>
<video:description><![CDATA[Explore the nexus between global conflicts and surges in DDoS attacks, with insights into significant spikes targeting Israeli and Palestinian websites. Understand how annual events like COP28 also trigger an influx of cyberattacks against environmenta...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3381&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>179</video:duration>
<video:live>no</video:live>
<video:view_count>57</video:view_count>
<video:publication_date>2024-03-25</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>ddos</video:tag>
<video:tag>botnets</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3380/defending-the-network-mitigating-dns-and-layer-attacks/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3380_1711398946_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Defending the Network: Mitigating DNS and Layer Attacks]]></video:title>
<video:description><![CDATA[Explore the intricacies of network security, as we dissect the prevalence of DNS and layer 3 DDoS attacks, which comprise over half of all incidents. Learn about TCP SYN floods, UDP attacks, and the infamous Mirai botnet, and arm yourself with Cloudfla...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3380&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>75</video:duration>
<video:live>no</video:live>
<video:view_count>51</video:view_count>
<video:publication_date>2024-03-25</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>ddos</video:tag>
<video:tag>security</video:tag>
<video:tag>networking</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3379/cyber-vandalism-exposed-ddos-attack-trends-in-crypto-gaming-environmental-sectors/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3379_1711398151_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cyber Vandalism Exposed: DDoS Attack Trends in Crypto, Gaming &amp; Environmental Sectors]]></video:title>
<video:description><![CDATA[ Summary: Discover the latest trends in DDoS attacks targeting cryptocurrency, gaming, and surprisingly, environmental services. Learn how attackers exploit industry vulnerabilities for financial or competitive gain, while evolving tactics to avoid det...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3379&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>130</video:duration>
<video:live>no</video:live>
<video:view_count>59</video:view_count>
<video:publication_date>2024-03-25</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>ddos</video:tag>
<video:tag>security</video:tag>
<video:tag>networking</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3378/global-ddos-trends-exposed-unveiling-the-attack-landscape/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3378_1711397948_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Global DDoS Trends Exposed: Unveiling the Attack Landscape ]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3378&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>156</video:duration>
<video:live>no</video:live>
<video:view_count>43</video:view_count>
<video:publication_date>2024-03-25</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3377/future-proof-against-ddos-cloudflare-s-adaptive-mitigation-strategies/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3377_1711397646_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Future-Proof Against DDoS: Cloudflare&#039;s Adaptive Mitigation Strategies]]></video:title>
<video:description><![CDATA[As DDoS attacks escalate with growing network capabilities, Cloudflare introduces innovative, cost-effective defenses. In Q3 2023&#039;s campaign, automated tiered mitigation reduces attack impact by smartly transitioning between layers. This proactive app...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3377&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>106</video:duration>
<video:live>no</video:live>
<video:view_count>59</video:view_count>
<video:publication_date>2024-03-25</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>ddos</video:tag>
<video:tag>security</video:tag>
<video:tag>networking</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3376/ddos-attacks-by-the-numbers-w-cloudflare/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3376_1711397437_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[DDoS Attacks By The Numbers [w. Cloudflare]]]></video:title>
<video:description><![CDATA[Discover how attack vectors have evolved with Cloudflare&#039;s insight: DDoS threats skyrocket with a staggering 773% surge in power, leveraging a critical HTTP/2 flaw. From 2019&#039;s 3M requests/sec to 2023&#039;s colossal 201M requests/sec, witness how a mere...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3376&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>162</video:duration>
<video:live>no</video:live>
<video:view_count>56</video:view_count>
<video:publication_date>2024-03-25</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>ddos</video:tag>
<video:tag>security</video:tag>
<video:tag>networking</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3375/what-is-a-ddos-attack/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3375_1711397223_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What is a DDoS attack?]]></video:title>
<video:description><![CDATA[ A DDoS (Distributed Denial of Service) attack aims to take a corporate website offline or severely disrupt its normal operations. By overwhelming the company&#039;s servers with excessive traffic, the attack can cause significant revenue loss, customer di...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3375&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>81</video:duration>
<video:live>no</video:live>
<video:view_count>77</video:view_count>
<video:publication_date>2024-03-25</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>ddos</video:tag>
<video:tag>security</video:tag>
<video:tag>networking</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3367/geopolitics-and-holiday-season-driven-distributed-denial-of-service-ddos-attacks-in-2023/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3367_1711044000_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cloudflare: How to Manage DDoS Attacks]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3367&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3051</video:duration>
<video:live>no</video:live>
<video:view_count>412</video:view_count>
<video:publication_date>2024-03-21</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3357/how-to-fight-long-game-social-engineering-attacks/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3357_1710357305_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How to Fight Long-Game Social Engineering Attacks]]></video:title>
<video:description><![CDATA[Learn how long-game social engineering attacks differ from run of the mill social engineering attacks in terms of their complexity, deviousness and impact. The creativity hackers use to pull off these unique attacks can include hardware, social media, ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3357&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3667</video:duration>
<video:live>no</video:live>
<video:view_count>568</video:view_count>
<video:publication_date>2024-03-13</video:publication_date>
<video:tag>grimes</video:tag>
<video:tag>knowbe4</video:tag>
<video:tag>phishing</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3365/vendor-lock-in-cloud-vs-legacy-backup-applications/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3365_1710001023_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Vendor Lock-in: Cloud vs. Legacy Backup Applications]]></video:title>
<video:description><![CDATA[Discussing the concept of vendor lock-in, it&#039;s clear that while every solution has some form of lock-in, cloud services like Druva offer greater flexibility compared to traditional on-premises solutions. With Druva, businesses can avoid the rigidity o...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3365&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>242</video:duration>
<video:live>no</video:live>
<video:view_count>49</video:view_count>
<video:publication_date>2024-03-09</video:publication_date>
<video:tag>druva</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3364/backing-up-complex-environments-to-the-cloud/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3364_1710000525_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Backing Up Complex Environments to the Cloud]]></video:title>
<video:description><![CDATA[Matt Tyrer from Druva and Chris Evans from Architecting IT discuss the misconception that cloud backup can&#039;t handle complex, large-scale environments. They dismiss it as an outdated belief, arguing that cloud backup solutions like Druva have evolved t...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3364&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>241</video:duration>
<video:live>no</video:live>
<video:view_count>53</video:view_count>
<video:publication_date>2024-03-09</video:publication_date>
<video:tag>druva</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3363/does-on-prem-data-need-on-prem-backup/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3363_1710000300_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Does On-Prem Data Need On-Prem Backup?]]></video:title>
<video:description><![CDATA[The belief that on-premises applications and data require on-premises backup is outdated. Historically, due to slow network speeds and limited external connectivity, local backups were essential for quick restores. However, with today&#039;s advanced netwo...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3363&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>224</video:duration>
<video:live>no</video:live>
<video:view_count>50</video:view_count>
<video:publication_date>2024-03-09</video:publication_date>
<video:tag>druva</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3362/the-hidden-costs-of-on-prem-backup-solutions/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3362_1709999967_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Hidden Costs of On-Prem Backup Solutions]]></video:title>
<video:description><![CDATA[Effective cloud backup solutions, such as those offered by Druva, provide customers with predictable pricing and cost savings. This is due to the holistic nature of cloud services, which include built-in redundancies, multi-regional support, and no hid...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3362&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>142</video:duration>
<video:live>no</video:live>
<video:view_count>50</video:view_count>
<video:publication_date>2024-03-09</video:publication_date>
<video:tag>druva</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3360/cloud-backup-costs-higher-or-lower-vs-on-prem/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3360_1709998759_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cloud Backup Costs Higher or Lower vs. On-Prem?]]></video:title>
<video:description><![CDATA[Managing cloud backups in-house can be unpredictable and costly if not properly managed, leading to potential issues with idle resources and escalating bills. However, cloud backup services, like Druva, alleviate this complexity by offering a simplifie...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3360&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>180</video:duration>
<video:live>no</video:live>
<video:view_count>55</video:view_count>
<video:publication_date>2024-03-09</video:publication_date>
<video:tag>druva</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3359/build-your-backups-like-a-backup-service-provider-would/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3359_1709998557_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Build Your Backups Like A Backup Service Provider Would]]></video:title>
<video:description><![CDATA[Just as backup service (BaaS) providers adhere to strict security protocols, companies managing their own backups must also diligently control access, track administrative actions, and implement stringent auditing. Regular maintenance, such as patching...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3359&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>120</video:duration>
<video:live>no</video:live>
<video:view_count>54</video:view_count>
<video:publication_date>2024-03-09</video:publication_date>
<video:tag>druva</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3358/myth-vs-reality-security-of-cloud-based-backups/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3358_1709998327_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Myth vs. Reality: Security of Cloud Based Backups]]></video:title>
<video:description><![CDATA[The discussion centers on the security and reliability of cloud-based backup solutions or Backup as a Service (BaaS) as opposed to self-built systems. Both speakers, Chris and Matt, emphasize that cloud providers, like Druva and similar companies, prio...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3358&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>138</video:duration>
<video:live>no</video:live>
<video:view_count>103</video:view_count>
<video:publication_date>2024-03-09</video:publication_date>
<video:tag>druva</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3355/druva-debunking-the-top-5-cloud-backup-myths/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3355_1709930046_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Druva: Debunking The Top 5 Cloud Backup Myths]]></video:title>
<video:description><![CDATA[Some myths die harder than others and in this video Chris Evans of ArchitectingIT and Matt Tyrer from Druva dispel some of the most prominent ones concerning cloud based backup &amp; recovery. With the maturity of Druva&#039;s technology and the cloud in gener...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3355&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2501</video:duration>
<video:live>no</video:live>
<video:view_count>543</video:view_count>
<video:publication_date>2024-03-07</video:publication_date>
<video:tag>druva</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3354/hycu-ai-driven-data-protection/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3354_1709741829_thumb.gif</video:thumbnail_loc>
<video:title><![CDATA[HYCU: AI-Driven Data Protection]]></video:title>
<video:description><![CDATA[With the introduction of generative AI into their development platform, HYCU significantly accelerates the integration process, making it feasible to extend protection to the vast landscape of SaaS applications that enterprises rely on today.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3354&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>922</video:duration>
<video:live>no</video:live>
<video:view_count>127</video:view_count>
<video:publication_date>2024-03-06</video:publication_date>
<video:tag>hycu</video:tag>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>multi-cloud</video:tag>
<video:tag>saas</video:tag>
<video:tag>public</video:tag>
<video:tag>cloud</video:tag>
<video:tag>onprem</video:tag>
<video:tag>on-premises</video:tag>
<video:tag>cloud</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>cybersecurity</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3349/arcitecta-mastering-the-data-tsunami/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3349_1707948842_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Arcitecta: Mastering the Data Tsunami]]></video:title>
<video:description><![CDATA[Jason Lohrey, CEO and Founder of Arcitecta, discusses the shift towards dynamic data management strategies emphasizing security, cost efficiency, and ease of use, highlighting the growing necessity for secure operating systems across various corporate ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3349&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>903</video:duration>
<video:live>no</video:live>
<video:view_count>91</video:view_count>
<video:publication_date>2024-03-04</video:publication_date>
<video:tag>arcitecta</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>matchett</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>big</video:tag>
<video:tag>data</video:tag>
<video:tag>security</video:tag>
<video:tag>distributed</video:tag>
<video:tag>computing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3353/rubrik-m365-data-protection/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3353_1709300865_thumb.gif</video:thumbnail_loc>
<video:title><![CDATA[Rubrik M365 Data Protection]]></video:title>
<video:description><![CDATA[Rubrik&#039;s tight integration with Microsoft delivers full protection for the entire M365 suite including Teams, OneDrive, Exchange, Sharepoint with immutability and granularity so you can recover your environment faster and with more accuracy than with ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3353&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2154</video:duration>
<video:live>no</video:live>
<video:view_count>449</video:view_count>
<video:publication_date>2024-02-24</video:publication_date>
<video:tag>rubrik</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>spotlight</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3334/stratodesk-flexible-and-secure-endpoints-in-a-remote-first-world/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3334_1706119500_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Stratodesk: Flexible and Secure Endpoints in a Remote-First World]]></video:title>
<video:description><![CDATA[Focusing on the significance of secure, versatile operating systems, Stratodesk’s NoTouch OS stands out in a market where security, cost, and ease of management are paramount.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3334&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1064</video:duration>
<video:live>no</video:live>
<video:view_count>76</video:view_count>
<video:publication_date>2024-02-22</video:publication_date>
<video:tag>stratodesk</video:tag>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>notouch</video:tag>
<video:tag>os</video:tag>
<video:tag>endpoint</video:tag>
<video:tag>security</video:tag>
<video:tag>security</video:tag>
<video:tag>remote</video:tag>
<video:tag>workplace</video:tag>
<video:tag>remote</video:tag>
<video:tag>hardware</video:tag>
<video:tag>flexibility</video:tag>
<video:tag>cybersecurity</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3348/how-to-protect-yourself-against-cloud-based-hacking/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3348_1708092502_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How To Protect Yourself Against Cloud Based Hacking]]></video:title>
<video:description><![CDATA[Roger Grimes, Data Driven Security Evangelist with KnowBe4 outlays the security risks of SaaS and cloud services and how you can protect your organization.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3348&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3560</video:duration>
<video:live>no</video:live>
<video:view_count>1303</video:view_count>
<video:publication_date>2024-02-12</video:publication_date>
<video:tag>grimes</video:tag>
<video:tag>knowbe4</video:tag>
<video:tag>phishing</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3347/let-go-vmware/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3347_1708001311_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Letting it Go: How To Move On From VMware]]></video:title>
<video:description><![CDATA[VMware&#039;s recent acquisition by Broadcom has created a lot of uncertainty and disruption. Now might be the perfect time to migrate from VMware. In this clip, VergeIO&#039;s George Crump discusses how you can leverage any GPU, CPU, storage, switch and netwo...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3347&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3036</video:duration>
<video:live>no</video:live>
<video:view_count>718</video:view_count>
<video:publication_date>2024-02-12</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>verge</video:tag>
<video:tag>io</video:tag>
<video:tag>vmware</video:tag>
<video:tag>storage</video:tag>
<video:tag>security</video:tag>
<video:tag>hardware</video:tag>
<video:tag>broadcom</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3346/enabling-the-ai-powered-telco/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3346_1706878414_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[Dell, NVIDIA: Hybrid 4G/5G FAN and Enabling AI Powered Telco]]></video:title>
<video:description><![CDATA[Industry experts from Portland General Electric, Expeto, Dell, and NVIDIA delve into the integral role advanced network technologies play in fostering utility decarbonization and enhancing grid resilience.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3346&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3607</video:duration>
<video:live>no</video:live>
<video:view_count>73</video:view_count>
<video:publication_date>2024-02-02</video:publication_date>
<video:tag>dell</video:tag>
<video:tag>nvidia</video:tag>
<video:tag>newinit</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3330/softirons-hypercloud-redefining-private-cloud-infrastructure/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3330_1705524332_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[SoftIron’s HyperCloud: Redefining Private Cloud Infrastructure]]></video:title>
<video:description><![CDATA[Unlike traditional approaches that combine complex IT components, SoftIron&#039;s HyperCloud stands out with its top-down methodology, ensuring seamless integration and simplified management.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3330&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1060</video:duration>
<video:live>no</video:live>
<video:view_count>121</video:view_count>
<video:publication_date>2024-01-31</video:publication_date>
<video:tag>softiron</video:tag>
<video:tag>hypercloud</video:tag>
<video:tag>matchett</video:tag>
<video:tag>inbrief</video:tag>
<video:tag>cloud</video:tag>
<video:tag>cloud</video:tag>
<video:tag>storage</video:tag>
<video:tag>security</video:tag>
<video:tag>private</video:tag>
<video:tag>cloud</video:tag>
<video:tag>it</video:tag>
<video:tag>infrastructure</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3344/survey-says-what-customers-are-telling-us-about-zscaler-data-protection/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3344_1706375907_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Survey Says! What Customers Are Telling Us About Zscaler Data Protection]]></video:title>
<video:description><![CDATA[Discover the profound benefits and cost savings of Zscaler&#039;s data protection in our latest video. Learn how IDC&#039;s survey reveals significant risk reduction and operational improvements for organizations utilizing Zscaler&#039;s SSE cloud platform. Perfec...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3344&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>53</video:duration>
<video:live>no</video:live>
<video:view_count>49</video:view_count>
<video:publication_date>2024-01-27</video:publication_date>
<video:tag>zscaler</video:tag>
<video:tag>edge</video:tag>
<video:tag>security</video:tag>
<video:tag>casb</video:tag>
<video:tag>ueba</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3343/3-things-to-consider-when-creating-a-data-protection-program/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3343_1706375730_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[3 Things to Consider When Creating a Data Protection Program]]></video:title>
<video:description><![CDATA[Explore the key strategies for comprehensive data protection with Zscaler as we break down the essential components of a robust data security program, including visibility of data, securing data in transit, and protecting data at rest across various pl...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3343&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>130</video:duration>
<video:live>no</video:live>
<video:view_count>46</video:view_count>
<video:publication_date>2024-01-27</video:publication_date>
<video:tag>zscaler</video:tag>
<video:tag>security</video:tag>
<video:tag>edge</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3342/how-zscaler-s-platform-monitors-suspicious-user-behavior/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3342_1706375360_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How Zscaler&#039;s Platform Monitors Suspicious User Behavior]]></video:title>
<video:description><![CDATA[Discover the cutting-edge strategies to identify and mitigate cyber threats in your organization with Zscaler&#039;s Steve Grossenbacher as he explores User and Entity Behavior Analytics (UEBA) and Secure Service Edge (SSE).]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3342&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>98</video:duration>
<video:live>no</video:live>
<video:view_count>92</video:view_count>
<video:publication_date>2024-01-27</video:publication_date>
<video:tag>zscaler</video:tag>
<video:tag>edge</video:tag>
<video:tag>security</video:tag>
<video:tag>casb</video:tag>
<video:tag>ueba</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3341/what-is-user-coaching-and-how-does-zscaler-help-facilitate-it/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3341_1706375215_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What is User Coaching and How Does Zscaler Help Facilitate It?]]></video:title>
<video:description><![CDATA[Ideal for IT professionals aiming to bolster their data protection programs, this discussion provides actionable strategies to streamline processes and reinforce a culture of data mindfulness. Watch this video to discover how Zscaler facilitates a proa...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3341&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>149</video:duration>
<video:live>no</video:live>
<video:view_count>56</video:view_count>
<video:publication_date>2024-01-27</video:publication_date>
<video:tag>zscaler</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>dlp</video:tag>
<video:tag>ai</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3340/key-use-cases-how-zscaler-s-platform-monitors-data-sharing-between-apps-and-users/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3340_1706375104_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Key Use Cases-How Zscaler&#039;s Platform Monitors Data Sharing Between Apps and Users]]></video:title>
<video:description><![CDATA[Watch this insightful exploration into protecting sensitive data across various user groups—from employees to contractors—without hindering productivity. Ideal for IT security professionals seeking innovative solutions that cater to an increasingly mob...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3340&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>409</video:duration>
<video:live>no</video:live>
<video:view_count>52</video:view_count>
<video:publication_date>2024-01-27</video:publication_date>
<video:tag>zscaler</video:tag>
<video:tag>security</video:tag>
<video:tag>edge</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>dlp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3339/how-can-zscaler-s-platform-help-manage-risks-associated-with-generative-ai-usage/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3339_1706374955_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How Can Zscaler&#039;s Platform Help Manage Risks Associated with Generative AI Usage?]]></video:title>
<video:description><![CDATA[Zscaler offers robust security solutions, employing DLP inspection, cloud app control, and URL filtering to safeguard sensitive data while allowing productive use of generative AI platforms like ChatGPT.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3339&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>78</video:duration>
<video:live>no</video:live>
<video:view_count>46</video:view_count>
<video:publication_date>2024-01-27</video:publication_date>
<video:tag>zscaler</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
<video:tag>ai</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>dlp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3338/how-zscaler-s-platform-manages-risks-associated-with-saas-app-integrations/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3338_1706374806_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How Zscaler&#039;s Platform Manages Risks Associated with SaaS App Integrations]]></video:title>
<video:description><![CDATA[Prevent risky third-party integrations like Grammarly and Calendly from compromising your data on platforms such as Office 365 and Google Workspace. Zscaler safeguards your information by identifying and assessing these connections, revealing potential...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3338&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>116</video:duration>
<video:live>no</video:live>
<video:view_count>51</video:view_count>
<video:publication_date>2024-01-27</video:publication_date>
<video:tag>zscaler</video:tag>
<video:tag>security</video:tag>
<video:tag>dropbox</video:tag>
<video:tag>m365</video:tag>
<video:tag>shadowit</video:tag>
<video:tag>casb</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3337/how-can-zscaler-s-platform-help-manage-user-access-to-cloud-apps/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3337_1706374644_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How Can Zscaler&#039;s Platform Help Manage User Access to Cloud Apps?]]></video:title>
<video:description><![CDATA[This video emphasizes addressing shadow IT by identifying unsanctioned apps like Box or Dropbox and enforcing the use of sanctioned solutions such as Office 365 and OneDrive.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3337&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>145</video:duration>
<video:live>no</video:live>
<video:view_count>58</video:view_count>
<video:publication_date>2024-01-27</video:publication_date>
<video:tag>zscaler</video:tag>
<video:tag>security</video:tag>
<video:tag>dropbox</video:tag>
<video:tag>m365</video:tag>
<video:tag>shadowit</video:tag>
<video:tag>casb</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3336/the-power-of-a-comprehensive-platform-to-provide-proper-cloud-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3336_1706374496_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Power of a Comprehensive Platform to Provide Proper Cloud Security]]></video:title>
<video:description><![CDATA[Watch this clip to understand the importance of a comprehensive security platform like Zscaler for cloud security, for the integration of user context, behavior analytics, and big data processing. The platform should intelligently assess user actions, ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3336&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>84</video:duration>
<video:live>no</video:live>
<video:view_count>55</video:view_count>
<video:publication_date>2024-01-27</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3335/the-importance-of-achieving-zero-trust-while-preserving-user-flexibility/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3335_1706374171_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Importance of Achieving Zero Trust While Preserving User Flexibility]]></video:title>
<video:description><![CDATA[Zero trust is a security model that emphasizes data protection at its core, ensuring safety regardless of device or user context. Organizations must secure data in every location, during transit, at rest, and when accessed by users through various appl...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3335&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>101</video:duration>
<video:live>no</video:live>
<video:view_count>76</video:view_count>
<video:publication_date>2024-01-27</video:publication_date>
<video:tag>zscaler</video:tag>
<video:tag>zerotrust</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3333/advancing-healthcare-with-ai-ethical-considerations-and-future-trends/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3333_1706114416_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Advancing Healthcare with AI: Ethical Considerations and Future Trends]]></video:title>
<video:description><![CDATA[In this webcast, you’ll learn how AI transforms healthcare delivery, patient outcomes, operational efficiency and its potential to revolutionize clinical decision-making, patient risk stratification, and population health management.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3333&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2918</video:duration>
<video:live>no</video:live>
<video:view_count>43</video:view_count>
<video:publication_date>2024-01-24</video:publication_date>
<video:tag>dell</video:tag>
<video:tag>healthcare</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>ai</video:tag>
<video:tag>deployment</video:tag>
<video:tag>worldwide</video:tag>
<video:tag>technology</video:tag>
<video:tag>repost</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3293/alludo-parallels-redefining-desktop-and-cloud-integration-for-the-modern-enterprise/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3293_1706311130_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Alludo Parallels: Redefining Desktop and Cloud Integration for the Modern Enterprise]]></video:title>
<video:description><![CDATA[Alludo Parallels is a compelling alternative to established players like VMware and Citrix in the ever-evolving world of virtual machine management and remote desktop solutions. The discussion with Kamal Srinivasan from Parallels highlights the platfor...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3293&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1050</video:duration>
<video:live>no</video:live>
<video:view_count>133</video:view_count>
<video:publication_date>2024-01-23</video:publication_date>
<video:tag>alludo</video:tag>
<video:tag>parallels</video:tag>
<video:tag>matchett</video:tag>
<video:tag>vmware</video:tag>
<video:tag>citrix</video:tag>
<video:tag>virtual</video:tag>
<video:tag>machine</video:tag>
<video:tag>virtual</video:tag>
<video:tag>machine</video:tag>
<video:tag>management</video:tag>
<video:tag>remote</video:tag>
<video:tag>desktop</video:tag>
<video:tag>windows</video:tag>
<video:tag>mac</video:tag>
<video:tag>m-series</video:tag>
<video:tag>apple</video:tag>
<video:tag>macbook</video:tag>
<video:tag>azure</video:tag>
<video:tag>azure</video:tag>
<video:tag>virtual</video:tag>
<video:tag>desktop</video:tag>
<video:tag>vdi</video:tag>
<video:tag>virtual</video:tag>
<video:tag>desktop</video:tag>
<video:tag>saas</video:tag>
<video:tag>cloud</video:tag>
<video:tag>it</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>scalability</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3328/zscaler-risky-user-behaviors-and-how-to-safeguard-against-them/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3328_1705584388_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Zscaler: Risky User Behaviors And How To Safeguard Against Them]]></video:title>
<video:description><![CDATA[Zscaler discusses their platform approach (vs. point solutions) to overcome the most common and riskiest end user behaviors...whether those users are inside our outside the organization and whether those behaviors are acted on knowingly or unknowingly.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3328&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3257</video:duration>
<video:live>no</video:live>
<video:view_count>434</video:view_count>
<video:publication_date>2024-01-13</video:publication_date>
<video:tag>zscaler</video:tag>
<video:tag>spotlight</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3327/how-intelligent-it-documentation-can-unlock-the-full-roi-potential-of-microsoft-environments/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3327_1704854531_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How Intelligent IT Documentation Can Unlock the Full ROI Potential of Microsoft Environments]]></video:title>
<video:description><![CDATA[This webcast discusses the role an IT Documentation Management system can have in Microsoft environments. The goal is to provide a living central repository of all IT documentation as it relates to policies, procedures, hardware, software, users and ac...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3327&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3565</video:duration>
<video:live>no</video:live>
<video:view_count>456</video:view_count>
<video:publication_date>2024-01-09</video:publication_date>
<video:tag>spotlight</video:tag>
<video:tag>itglue</video:tag>
<video:tag>storage</video:tag>
<video:tag>ai</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3311/controlup-enhancing-digital-workspaces-and-employee-experience/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3311_1702580199_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[ControlUp: Enhancing Digital Workspaces and Employee Experience]]></video:title>
<video:description><![CDATA[Amidst the backdrop of remote work and hybrid environments, ControlUp has emerged as a pivotal player in enhancing desktop performance and ensuring a seamless user experience across various platforms.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3311&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>885</video:duration>
<video:live>no</video:live>
<video:view_count>154</video:view_count>
<video:publication_date>2024-01-04</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>controlup</video:tag>
<video:tag>end</video:tag>
<video:tag>user</video:tag>
<video:tag>computing</video:tag>
<video:tag>digital</video:tag>
<video:tag>experience</video:tag>
<video:tag>employee</video:tag>
<video:tag>experience</video:tag>
<video:tag>user</video:tag>
<video:tag>experience</video:tag>
<video:tag>ux</video:tag>
<video:tag>workplace</video:tag>
<video:tag>monitoring</video:tag>
<video:tag>cloud</video:tag>
<video:tag>digital</video:tag>
<video:tag>workspace</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3285/perfectscale-streamlining-kubernetes-operations-for-peak-performance/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3285_1699990557_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[PerfectScale: Streamlining Kubernetes Operations for Peak Performance]]></video:title>
<video:description><![CDATA[Discover how PerfectScale&#039;s automated management platform redefines Kubernetes operations, balancing cost reduction with system resilience for optimal resource utilization.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3285&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1594</video:duration>
<video:live>no</video:live>
<video:view_count>91</video:view_count>
<video:publication_date>2023-12-27</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>perfectscale</video:tag>
<video:tag>kubernetes</video:tag>
<video:tag>performance</video:tag>
<video:tag>optimization</video:tag>
<video:tag>resource</video:tag>
<video:tag>utilization</video:tag>
<video:tag>overprovisioning</video:tag>
<video:tag>underprovisioning</video:tag>
<video:tag>resource</video:tag>
<video:tag>allocation</video:tag>
<video:tag>cloud</video:tag>
<video:tag>management</video:tag>
<video:tag>cloud</video:tag>
<video:tag>cost</video:tag>
<video:tag>performance</video:tag>
<video:tag>resiliency</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3290/cybeready-elevating-workplaces-with-employee-centric-cybersecurity/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3290_1700277575_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cybeready: Elevating Workplaces With Employee-Centric Cybersecurity]]></video:title>
<video:description><![CDATA[ In this insightful conversation with Michal Gil, we explore the transformative approach Cybeready takes to secure organizations by focusing on their most valuable asset – their employees. Cybeready&#039;s unique blend of machine learning-driven platforms ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3290&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>867</video:duration>
<video:live>no</video:live>
<video:view_count>93</video:view_count>
<video:publication_date>2023-12-14</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>cybeready</video:tag>
<video:tag>phishing</video:tag>
<video:tag>cyberthreat</video:tag>
<video:tag>cyber</video:tag>
<video:tag>threats</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>training</video:tag>
<video:tag>cyber</video:tag>
<video:tag>readiness</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3294/nyriad-data-storage-with-gpu-accelerated-architecture/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3294_1700676592_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Nyriad: Data Storage with GPU-Accelerated Architecture]]></video:title>
<video:description><![CDATA[Andrew Russell of Nyriad delves into the innovative realm of GPU-accelerated data storage with Mike Matchett, Principal Analyst at Small World Big Data. Nyriad has transformed traditional storage concepts by integrating GPUs for efficient data processi...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3294&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1124</video:duration>
<video:live>no</video:live>
<video:view_count>90</video:view_count>
<video:publication_date>2023-12-13</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>gpu</video:tag>
<video:tag>data</video:tag>
<video:tag>storage</video:tag>
<video:tag>stroage</video:tag>
<video:tag>data</video:tag>
<video:tag>processing</video:tag>
<video:tag>emc</video:tag>
<video:tag>pure</video:tag>
<video:tag>storage</video:tag>
<video:tag>hpc</video:tag>
<video:tag>high-performance</video:tag>
<video:tag>computing</video:tag>
<video:tag>backup</video:tag>
<video:tag>restore</video:tag>
<video:tag>active</video:tag>
<video:tag>archive</video:tag>
<video:tag>big</video:tag>
<video:tag>data</video:tag>
<video:tag>performance</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3279/vcinity-unlocking-data-potential-without-movement/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3279_1699581286_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Vcinity: Unlocking Data Potential Without Movement]]></video:title>
<video:description><![CDATA[This discussion with analyst Mike Matchett and Vcinity CEO Harry Carr unveils how Vcinity&#039;s advanced technology, with roots in government-grade data transfer, is now accessible to the commercial sector, offering unprecedented speed and security for re...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3279&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>907</video:duration>
<video:live>no</video:live>
<video:view_count>107</video:view_count>
<video:publication_date>2023-12-01</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>vcinity</video:tag>
<video:tag>big</video:tag>
<video:tag>data</video:tag>
<video:tag>data</video:tag>
<video:tag>movement</video:tag>
<video:tag>distributed</video:tag>
<video:tag>networks</video:tag>
<video:tag>data</video:tag>
<video:tag>transfer</video:tag>
<video:tag>remote</video:tag>
<video:tag>access</video:tag>
<video:tag>remote</video:tag>
<video:tag>data</video:tag>
<video:tag>cloud</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>cloud</video:tag>
<video:tag>data</video:tag>
<video:tag>orchestration</video:tag>
<video:tag>ai</video:tag>
<video:tag>ml</video:tag>
<video:tag>machine</video:tag>
<video:tag>learning</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3281/datamotive-streamlining-multi-cloud-workload-portability/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3281_1699658830_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Datamotive: Streamlining Multi-Cloud Workload Portability]]></video:title>
<video:description><![CDATA[As organizations increasingly adopt hybrid and multi-cloud strategies, the challenge of moving workloads seamlessly across different cloud environments has become paramount. Datamotive addresses this challenge head-on by offering a solution that ensure...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3281&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>766</video:duration>
<video:live>no</video:live>
<video:view_count>92</video:view_count>
<video:publication_date>2023-12-01</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>datamotive</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>cloud</video:tag>
<video:tag>multicloud</video:tag>
<video:tag>multi-cloud</video:tag>
<video:tag>workloads</video:tag>
<video:tag>cloud</video:tag>
<video:tag>environment</video:tag>
<video:tag>recovery</video:tag>
<video:tag>time</video:tag>
<video:tag>rto</video:tag>
<video:tag>disaster</video:tag>
<video:tag>recovery</video:tag>
<video:tag>dr</video:tag>
<video:tag>cloud</video:tag>
<video:tag>mobility</video:tag>
<video:tag>replication</video:tag>
<video:tag>latency</video:tag>
<video:tag>vmware</video:tag>
<video:tag>aws</video:tag>
<video:tag>azure</video:tag>
<video:tag>google</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3295/runecast-s-approach-to-secure-compliant-workloads-in-hybrid-it/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3295_1700688906_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Runecast&#039;s Approach to Secure, Compliant Workloads in Hybrid IT]]></video:title>
<video:description><![CDATA[Markus Strauss of Runecast delves into the evolving IT workload security and compliance landscape. The discussion highlights Runecast&#039;s innovative approach to managing and securing workloads, regardless of location, in increasingly hybrid IT environme...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3295&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1216</video:duration>
<video:live>no</video:live>
<video:view_count>83</video:view_count>
<video:publication_date>2023-11-22</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>runecast</video:tag>
<video:tag>markus</video:tag>
<video:tag>strauss</video:tag>
<video:tag>it</video:tag>
<video:tag>workload</video:tag>
<video:tag>security</video:tag>
<video:tag>it</video:tag>
<video:tag>security</video:tag>
<video:tag>compliance</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>it</video:tag>
<video:tag>compliance</video:tag>
<video:tag>and</video:tag>
<video:tag>governance</video:tag>
<video:tag>governance</video:tag>
<video:tag>it</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>gmware</video:tag>
<video:tag>automation</video:tag>
<video:tag>cloud</video:tag>
<video:tag>container</video:tag>
<video:tag>containerized</video:tag>
<video:tag>saas</video:tag>
<video:tag>deployment</video:tag>
<video:tag>cybersecurity</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3288/qumulo-setting-the-standard-for-exabyte-scale-hybrid-storage-solutions/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3288_1700239943_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Qumulo: Setting the Standard for Exabyte-Scale Hybrid Storage Solutions]]></video:title>
<video:description><![CDATA[Qumulo, known for its software-defined storage on commodity hardware and cloud-native capabilities, is at the forefront of addressing the needs for geo-dispersion and management of geographically dispersed data. This session highlights Qumulo&#039;s latest...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3288&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1018</video:duration>
<video:live>no</video:live>
<video:view_count>77</video:view_count>
<video:publication_date>2023-11-17</video:publication_date>
<video:tag>qumulo</video:tag>
<video:tag>exabyte</video:tag>
<video:tag>petabyte</video:tag>
<video:tag>big</video:tag>
<video:tag>data</video:tag>
<video:tag>storage</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>storage</video:tag>
<video:tag>matchett</video:tag>
<video:tag>scalability</video:tag>
<video:tag>data</video:tag>
<video:tag>storage</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>enterprise</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3287/securing-the-digital-frontier-authentic-web-s-approach-to-dns-and-domain-security/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3287_1700162737_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Securing the Digital Frontier: Authentic Web&#039;s Approach to DNS and Domain Security]]></video:title>
<video:description><![CDATA[In an era where cybersecurity is paramount, Authentic Web emerges as a pivotal player, particularly in enterprise domain and DNS management.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3287&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1221</video:duration>
<video:live>no</video:live>
<video:view_count>64</video:view_count>
<video:publication_date>2023-11-16</video:publication_date>
<video:tag>cybersecurity</video:tag>
<video:tag>authentic</video:tag>
<video:tag>web</video:tag>
<video:tag>dns</video:tag>
<video:tag>dns</video:tag>
<video:tag>management</video:tag>
<video:tag>domain</video:tag>
<video:tag>dns</video:tag>
<video:tag>security</video:tag>
<video:tag>cyberthreat</video:tag>
<video:tag>domain</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3280/lightbits-labs-pioneering-high-performance-cloud-storage/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3280_1699975445_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Lightbits Labs: Pioneering High-Performance Cloud Storage]]></video:title>
<video:description><![CDATA[Lightbits Labs stands at the forefront of the NVMe over Fabric (NVMe-oF) revolution, offering unprecedented low-latency and high-performance NVMe storage over standard TCP networks.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3280&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>816</video:duration>
<video:live>no</video:live>
<video:view_count>517</video:view_count>
<video:publication_date>2023-11-15</video:publication_date>
<video:tag>lightbits</video:tag>
<video:tag>labs</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cloud</video:tag>
<video:tag>storage</video:tag>
<video:tag>storage</video:tag>
<video:tag>sds</video:tag>
<video:tag>software-defined</video:tag>
<video:tag>storage</video:tag>
<video:tag>private</video:tag>
<video:tag>cloud</video:tag>
<video:tag>datacenter</video:tag>
<video:tag>data</video:tag>
<video:tag>center</video:tag>
<video:tag>latency</video:tag>
<video:tag>public</video:tag>
<video:tag>cloud</video:tag>
<video:tag>aws</video:tag>
<video:tag>azure</video:tag>
<video:tag>high-performance</video:tag>
<video:tag>native</video:tag>
<video:tag>cloud</video:tag>
<video:tag>native</video:tag>
<video:tag>cloud</video:tag>
<video:tag>storage</video:tag>
<video:tag>cloud</video:tag>
<video:tag>data</video:tag>
<video:tag>data</video:tag>
<video:tag>operations</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3278/workload-optimization-in-a-hybrid-multi-cloud-environment/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3278_1699576998_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Workload Optimization in a Hybrid Multi-Cloud Environment]]></video:title>
<video:description><![CDATA[Modernize Your Data Center Strategy with Equinix and Cisco The traditional on-prem data center is no longer the center of gravity for enterprise IT. In today’s fast-moving, cloud-first world, organizations need a flexible, interconnected, and globally ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3278&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3322</video:duration>
<video:live>no</video:live>
<video:view_count>1243</video:view_count>
<video:publication_date>2023-11-09</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3270/hammerspace-pioneering-the-next-data-cycle-with-automated-data-orchestration/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3270_1698428073_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Hammerspace: Pioneering the Next Data Cycle with Automated Data Orchestration]]></video:title>
<video:description><![CDATA[Hammerspace CEO David Flynn illuminates the burgeoning challenges of distributed data sets and underscores the revolutionary benefits of adopting Hammerspace&#039;s orchestrated data architecture.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3270&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3558</video:duration>
<video:live>no</video:live>
<video:view_count>92</video:view_count>
<video:publication_date>2023-10-27</video:publication_date>
<video:tag>hammerspace</video:tag>
<video:tag>esg</video:tag>
<video:tag>david</video:tag>
<video:tag>flynn</video:tag>
<video:tag>scott</video:tag>
<video:tag>sinclair</video:tag>
<video:tag>data</video:tag>
<video:tag>orchestration</video:tag>
<video:tag>distributed</video:tag>
<video:tag>data</video:tag>
<video:tag>data</video:tag>
<video:tag>architecture</video:tag>
<video:tag>decentralization</video:tag>
<video:tag>global</video:tag>
<video:tag>file</video:tag>
<video:tag>system</video:tag>
<video:tag>ai</video:tag>
<video:tag>ml</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>machine</video:tag>
<video:tag>learning</video:tag>
<video:tag>data</video:tag>
<video:tag>silo</video:tag>
<video:tag>data</video:tag>
<video:tag>silos</video:tag>
<video:tag>repost</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3269/leostream-enabling-remote-desktop-access-for-a-modern-workforce/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3269_1698354241_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Leostream: Enabling Remote Desktop Access for a Modern Workforce]]></video:title>
<video:description><![CDATA[The conversation highlights the freedom of choice that Leostream provides by offering a multi-vendor approach to remote desktop infrastructure, seamlessly connecting users to various cloud services and on-premises solutions.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3269&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>844</video:duration>
<video:live>no</video:live>
<video:view_count>80</video:view_count>
<video:publication_date>2023-10-26</video:publication_date>
<video:tag>leostream</video:tag>
<video:tag>remote</video:tag>
<video:tag>desktop</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3265/hycu-safeguarding-data-across-hybrid-multi-cloud-saas-environments/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3265_1697496887_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[HYCU: Safeguarding Data Across Hybrid, Multi-Cloud &amp; SaaS Environments]]></video:title>
<video:description><![CDATA[In a candid conversation with Truth in IT, Simon Taylor, CEO and founder of HYCU, delves deep into the criticality of safeguarding data across various platforms, from on-premises to public cloud and SaaS. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3265&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1153</video:duration>
<video:live>no</video:live>
<video:view_count>144</video:view_count>
<video:publication_date>2023-10-16</video:publication_date>
<video:tag>saas</video:tag>
<video:tag>data</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>hycu</video:tag>
<video:tag>public</video:tag>
<video:tag>cloud</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>cloud</video:tag>
<video:tag>multicloud</video:tag>
<video:tag>multi</video:tag>
<video:tag>cloud</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>data</video:tag>
<video:tag>recovery</video:tag>
<video:tag>cyberattack</video:tag>
<video:tag>security</video:tag>
<video:tag>backup</video:tag>
<video:tag>matchett</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3263/roi-for-master-data-management-predicting-delivering-and-measuring-business-value/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3263_1697455699_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Semarchy: Master Data Management (MDM) Ensures Data Quality &amp; Governance]]></video:title>
<video:description><![CDATA[This webcast highlights that while there&#039;s excitement around AI and advanced analytics, there&#039;s an impending resurgence in MDM interest due to challenges like data quality and governance.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3263&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3309</video:duration>
<video:view_count>60</video:view_count>
<video:publication_date>2023-10-16</video:publication_date>
<video:tag>semarchy</video:tag>
<video:tag>mdm</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3256/hyperconverged-infrastructure-hci-software-key-benefits/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3256_1696244167_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[HCI Software: Ease of Deployment at the Edge]]></video:title>
<video:description><![CDATA[If users can install and operate a hypervisor, they&#039;ll find deployment of StorMagic&#039;s HCI SvSAN straightforward due to its wizard-based installation. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3256&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>83</video:duration>
<video:live>no</video:live>
<video:view_count>57</video:view_count>
<video:publication_date>2023-10-10</video:publication_date>
<video:tag>stormagic</video:tag>
<video:tag>edge</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
<video:tag>dcig</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3259/innovation-interwoven-profisee-adaptive-mdm-microsoft-fabric/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3259_1696767071_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Innovation Interwoven: Profisee Adaptive MDM &amp; Microsoft Fabric]]></video:title>
<video:description><![CDATA[This webcast discusses the integration of Profisee&#039;s adaptive master data management with Microsoft Fabric. Microsoft recently introduced Fabric, which has been regarded as a significant advancement in managing enterprise data. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3259&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3649</video:duration>
<video:view_count>85</video:view_count>
<video:publication_date>2023-10-08</video:publication_date>
<video:tag>profisee</video:tag>
<video:tag>replay</video:tag>
<video:tag>microsoft</video:tag>
<video:tag>mdm</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3254/how-is-hci-software-defined/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3254_1696160835_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What is HCI Software?]]></video:title>
<video:description><![CDATA[Todd Dorsey of DCIG defines hyperconverged infrastructure (HCI) as a solution to data center infrastructure management problems arising from handling compute, storage, and networking separately. Initially, this concept used specific appliances.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3254&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>259</video:duration>
<video:live>no</video:live>
<video:view_count>65</video:view_count>
<video:publication_date>2023-10-06</video:publication_date>
<video:tag>edge</video:tag>
<video:tag>stormagic</video:tag>
<video:tag>dcig</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
<video:tag>cloud</video:tag>
<video:tag>hci</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3257/leading-at-the-edge-of-retail-stormagic-hci-software-for-sheetz/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3257_1696290133_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Success at the Edge with StorMagic Hyperconverged Software for Sheetz]]></video:title>
<video:description><![CDATA[Sheetz, a well-known retailer in the Northeast, partnered with StorMagic for their virtualization project. Unlike other solutions that required three servers, StorMagic&#039;s efficient design needed just two, ensuring ease of installation and management. ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3257&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>112</video:duration>
<video:live>no</video:live>
<video:view_count>86</video:view_count>
<video:publication_date>2023-10-04</video:publication_date>
<video:tag>leading</video:tag>
<video:tag>at</video:tag>
<video:tag>the</video:tag>
<video:tag>edge</video:tag>
<video:tag>of</video:tag>
<video:tag>retail</video:tag>
<video:tag>stormagic</video:tag>
<video:tag>hci</video:tag>
<video:tag>software</video:tag>
<video:tag>for</video:tag>
<video:tag>sheetz</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3258/standardizing-backups-across-hybrid-cloud-webinar/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3258_1696362635_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Beyond Backup: Ensuring Data Protection in Multi-Cloud Ecosystems with Veeam]]></video:title>
<video:description><![CDATA[This webcast focuses on standardizing backups within hybrid cloud environments and how to leverage Veeam&#039;s trusted data platform to safeguard both on-site and cloud-based workloads effectively.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3258&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3419</video:duration>
<video:view_count>75</video:view_count>
<video:publication_date>2023-10-03</video:publication_date>
<video:tag>veeam</video:tag>
<video:tag>backup</video:tag>
<video:tag>storage</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3253/edge-computing-key-security-concerns/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3253_1696159592_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Edge Computing: Key Security Concerns]]></video:title>
<video:description><![CDATA[Bruce Kornfeld of StorMagic discusses the immense pressures IT personnel face in securing systems, especially given the vulnerabilities at the edge where physical security is lacking. Edge locations, ranging from factories to areas with many customers,...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3253&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>155</video:duration>
<video:live>no</video:live>
<video:view_count>73</video:view_count>
<video:publication_date>2023-10-01</video:publication_date>
<video:tag>edge</video:tag>
<video:tag>stormagic</video:tag>
<video:tag>dcig</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
<video:tag>cloud</video:tag>
<video:tag>hci</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3252/what-are-the-top-challenges-to-managing-data-at-the-edge/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3252_1696085180_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Challenges Edge Computing Brings (w. StorMagic &amp; DCIG)]]></video:title>
<video:description><![CDATA[Edge computing is becoming more attractive to organizations because it can be more cost-effective and reliable than cloud computing. However, there are still some challenges to overcome, such as high availability, cost and compatibility. With DCIG &amp; St...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3252&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>145</video:duration>
<video:live>no</video:live>
<video:view_count>63</video:view_count>
<video:publication_date>2023-09-30</video:publication_date>
<video:tag>edge</video:tag>
<video:tag>stormagic</video:tag>
<video:tag>dcig</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
<video:tag>cloud</video:tag>
<video:tag>hci</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3251/what-s-driving-the-growth-of-edge-computing/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3251_1696084240_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Edge Computing: Growth Drivers]]></video:title>
<video:description><![CDATA[This clip with StorMagic&#039;s Bruce Kornfeld and DCIG&#039;s Todd Dorsey explains why compute at the edge has undergone so much massive growth with the buildout of IoT, IIoT, and the general distribution of applications at the edge.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3251&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>138</video:duration>
<video:live>no</video:live>
<video:view_count>60</video:view_count>
<video:publication_date>2023-09-30</video:publication_date>
<video:tag>stormagic</video:tag>
<video:tag>edge</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
<video:tag>dcig</video:tag>
<video:tag>hci</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3250/what-is-the-edge/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3250_1696083258_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What is the edge?]]></video:title>
<video:description><![CDATA[Ken Clipperton from DCIG explains how edge computing represents systems located outside the core data center, specifically in areas lacking IT personnel. This includes retail locations, healthcare clinics, and challenging Internet of Things settings, s...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3250&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>54</video:duration>
<video:live>no</video:live>
<video:view_count>76</video:view_count>
<video:publication_date>2023-09-30</video:publication_date>
<video:tag>stormagic</video:tag>
<video:tag>edge</video:tag>
<video:tag>dcig</video:tag>
<video:tag>security</video:tag>
<video:tag>backup</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3242/step-1-4-5-steps-to-a-vmware-exit-in-45-days-identify-your-hardware/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3242_1695483793_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[Verge.IO: Step 1 [of 4.5 Steps] to a VMware Exit in 45 Days [Identify Your Hardware]]]></video:title>
<video:description><![CDATA[Yan Ness, CEO of Verge.IO discusses the first step in a VMware migration process, emphasizing the importance of identifying and repurposing existing hardware rather than immediately investing in new]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3242&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>236</video:duration>
<video:live>no</video:live>
<video:view_count>118</video:view_count>
<video:publication_date>2023-09-23</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>storage</video:tag>
<video:tag>security</video:tag>
<video:tag>hardware</video:tag>
<video:tag>highlights</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3243/step-2-of-4-5-steps-to-a-vmware-exit-in-45-days-storage-networking-considerations/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3243_1695483770_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[Verge.IO: Step 2 [of 4.5 Steps] to a VMware Exit in 45 Days [Storage &amp; Networking Considerations]]]></video:title>
<video:description><![CDATA[In this clip Yan Ness, CEO of Verge.IO emphasizes that while many people focus on replacing the hypervisor, it&#039;s essential to consider other aspects such as storage and network software. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3243&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>239</video:duration>
<video:live>no</video:live>
<video:view_count>100</video:view_count>
<video:publication_date>2023-09-23</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>storage</video:tag>
<video:tag>security</video:tag>
<video:tag>hardware</video:tag>
<video:tag>highlights</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3247/how-to-simplify-the-edge-w-hci/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3247_1695850246_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How To Simplify The Edge w. HCI]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3247&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2542</video:duration>
<video:live>no</video:live>
<video:view_count>541</video:view_count>
<video:publication_date>2023-09-23</video:publication_date>
<video:tag>stormagic</video:tag>
<video:tag>edge</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
<video:tag>dcig</video:tag>
<video:tag>hci</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3246/step-4-5-of-4-5-steps-to-exit-vmware-in-45-days-de-risking-through-seamless-migration/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3246_1695483688_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[Verge.IOP: Step 4.5 [of 4.5 Steps] to Exit VMware in 45 Days [De-Risking Through Seamless Migration]]]></video:title>
<video:description><![CDATA[In Step 4.5 of 4.5 Steps to a VMware Exit Plan in 45 Days, Yan Ness, CEO of Verge.IO, discusses how to de-risk the entire VMware exit process through seamless migration and evaluation.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3246&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>230</video:duration>
<video:live>no</video:live>
<video:view_count>58</video:view_count>
<video:publication_date>2023-09-22</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>storage</video:tag>
<video:tag>security</video:tag>
<video:tag>hardware</video:tag>
<video:tag>highlights</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3245/step-4-of-4-5-steps-to-a-vmware-exit-in-45-days-planning-testing/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3245_1695483713_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[Verge.IO: Step 4 [of 4.5 Steps] to a VMware Exit in 45 Days [Planning &amp; Testing]]]></video:title>
<video:description><![CDATA[In Step 4 of 4.5 Steps to a VMware Exit Plan in 45 Days, Yan Ness, CEO of Verge.IO focuses on planning and testing the migration process for a successful exit from VMware.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3245&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>197</video:duration>
<video:live>no</video:live>
<video:view_count>62</video:view_count>
<video:publication_date>2023-09-22</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>storage</video:tag>
<video:tag>security</video:tag>
<video:tag>hardware</video:tag>
<video:tag>highlights</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3244/step-3-of-4-5-steps-to-a-vmware-exit-in-45-days/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3244_1695483740_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[Verge.IO: Step 3 [of 4.5 Steps] to a VMware Exit in 45 Days [Security Considerations]]]></video:title>
<video:description><![CDATA[In Step 3 of 4.5 Steps to a VMware Exit in 45 Days, Yan Ness, CEO of Verge.IO discusses critical security considerations for a successful exit plan. He emphasizes four key aspects that enhance security, especially against ransomware attacks: data prote...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3244&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>628</video:duration>
<video:live>no</video:live>
<video:view_count>61</video:view_count>
<video:publication_date>2023-09-22</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>storage</video:tag>
<video:tag>security</video:tag>
<video:tag>hardware</video:tag>
<video:tag>highlights</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3323/how-the-parallel-file-system-simplifies-storage-networks/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3323_1704649594_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How the Parallel File System Simplifies Storage Networks]]></video:title>
<video:description><![CDATA[In contrast to complex SAN architectures with numerous switches, cables, and east-west traffic, true parallel file systems like EXAScaler simplify scalability by eliminating the need for extensive hardware and rewiring when expanding storage capacity, ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3323&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>61</video:duration>
<video:live>no</video:live>
<video:view_count>47</video:view_count>
<video:publication_date>2023-09-22</video:publication_date>
<video:tag>ddn</video:tag>
<video:tag>ai</video:tag>
<video:tag>analytics</video:tag>
<video:tag>nvidia</video:tag>
<video:tag>exascaler</video:tag>
<video:tag>superpod</video:tag>
<video:tag>lustre</video:tag>
<video:tag>nas</video:tag>
<video:tag>file</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3231/ibm-next-gen-storage-from-data-corruption-detection-to-ai-operationalization/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3231_1692963701_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[IBM Next Gen Storage: From Data Corruption Detection to AI Operationalization]]></video:title>
<video:description><![CDATA[Scott Baker of IBM explains how IBM storage allows for real-time data corruption detection in virtual machine environments, using machine learning to monitor how data is written and the interaction between the host and storage array. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3231&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>872</video:duration>
<video:live>no</video:live>
<video:view_count>94</video:view_count>
<video:publication_date>2023-09-12</video:publication_date>
<video:tag>ibm</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
<video:tag>matchett</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3236/hitachi-vantara-how-change-management-impacts-erp-implementation/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3236_1694191489_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Hitachi Vantara: How Change Management Impacts ERP Implementation]]></video:title>
<video:description><![CDATA[Drawing upon real-world experience, the webinar covers strategies, tools, and techniques that have proven effective in managing behavioral change during ERP implementations]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3236&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2389</video:duration>
<video:live>no</video:live>
<video:view_count>55</video:view_count>
<video:publication_date>2023-09-08</video:publication_date>
<video:tag>change</video:tag>
<video:tag>management</video:tag>
<video:tag>hitachi</video:tag>
<video:tag>vantara</video:tag>
<video:tag>erp</video:tag>
<video:tag>oracle</video:tag>
<video:tag>cloud</video:tag>
<video:tag>cloud</video:tag>
<video:tag>process</video:tag>
<video:tag>automation</video:tag>
<video:tag>repost</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3324/ddn-simplifying-high-performance-computing/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3324_1704649844_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[DDN: Simplifying High Performance Computing]]></video:title>
<video:description><![CDATA[DDN focuses on simplicity at scale with its high-performance parallel file system, challenging the misconception that such systems are inherently complex. While simpler solutions exist for smaller-scale storage needs, DDN&#039;s approach prioritizes orches...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3324&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>55</video:duration>
<video:live>no</video:live>
<video:view_count>47</video:view_count>
<video:publication_date>2023-09-07</video:publication_date>
<video:tag>ddn</video:tag>
<video:tag>ai</video:tag>
<video:tag>analytics</video:tag>
<video:tag>nvidia</video:tag>
<video:tag>exascaler</video:tag>
<video:tag>superpod</video:tag>
<video:tag>lustre</video:tag>
<video:tag>nas</video:tag>
<video:tag>file</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3235/cobalt-iron-navigating-the-future-of-data-security-with-compass/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3235_1693417127_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cobalt Iron: Navigating the Future of Data Security with Compass]]></video:title>
<video:description><![CDATA[In this exclusive interview, Mike Matchett from Small World Big Data sits down with Greg Tevis from Cobalt Iron to discuss the challenges of data protection in today&#039;s world and how Cobalt Iron&#039;s innovative solution, Compass, is addressing these chal...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3235&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>984</video:duration>
<video:live>no</video:live>
<video:view_count>80</video:view_count>
<video:publication_date>2023-08-30</video:publication_date>
<video:tag>cobalt</video:tag>
<video:tag>iron</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>hacker</video:tag>
<video:tag>hackers</video:tag>
<video:tag>compass</video:tag>
<video:tag>cyber</video:tag>
<video:tag>detection</video:tag>
<video:tag>enterprise</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3234/from-dark-web-intelligence-to-real-world-justice/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3234_1693582436_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Searchlight Cyber: From Dark Web Intelligence to Real-World Justice]]></video:title>
<video:description><![CDATA[This webinar will provide a comprehensive overview of how cybercriminals utilize Tor and will delve into the most recent dark web investigations, evidence-collection methods, and strategies to defeat Tor operators, unmask IP addresses, and identify adv...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3234&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3168</video:duration>
<video:live>no</video:live>
<video:view_count>73</video:view_count>
<video:publication_date>2023-08-29</video:publication_date>
<video:tag>dr</video:tag>
<video:tag>gareth</video:tag>
<video:tag>owenson</video:tag>
<video:tag>dark</video:tag>
<video:tag>web</video:tag>
<video:tag>cybercriminal</video:tag>
<video:tag>cybercriminals</video:tag>
<video:tag>tor</video:tag>
<video:tag>evidence</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3232/advanced-steering-the-course-of-openvms-modernization/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3232_1692996683_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Advanced: Steering the Course of OpenVMS Modernization]]></video:title>
<video:description><![CDATA[Advanced, leveraging its vast expertise, stands at the forefront of this transition, offering businesses a structured pathway to migrate their legacy OpenVMS COBOL, Fortran, Pascal, C, or BASIC applications to platforms like Unix, Linux, or Windows.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3232&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1561</video:duration>
<video:live>no</video:live>
<video:view_count>70</video:view_count>
<video:publication_date>2023-08-25</video:publication_date>
<video:tag>openvms</video:tag>
<video:tag>advanced</video:tag>
<video:tag>os</video:tag>
<video:tag>operating</video:tag>
<video:tag>system</video:tag>
<video:tag>legacy</video:tag>
<video:tag>legacy</video:tag>
<video:tag>system</video:tag>
<video:tag>cobol</video:tag>
<video:tag>fortran</video:tag>
<video:tag>pascal</video:tag>
<video:tag>basic</video:tag>
<video:tag>unix</video:tag>
<video:tag>linux</video:tag>
<video:tag>isam</video:tag>
<video:tag>modernization</video:tag>
<video:tag>rms</video:tag>
<video:tag>data</video:tag>
<video:tag>repost</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3230/how-to-navigate-the-challenge-of-managed-vs-un-managed-devices/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3230_1692904009_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How To Navigate The Challenge of Managed vs. Un-Managed Devices?]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3230&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>381</video:duration>
<video:live>no</video:live>
<video:view_count>44</video:view_count>
<video:publication_date>2023-08-24</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>lookout</video:tag>
<video:tag>dlp</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3229/how-to-conduct-a-risk-assessment-prior-to-creating-data-usage-policies-w-lookout/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3229_1692904953_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How To: Conduct a Risk Assessment Prior To Creating Data Usage Policies (w. Lookout)]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3229&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>202</video:duration>
<video:live>no</video:live>
<video:view_count>53</video:view_count>
<video:publication_date>2023-08-24</video:publication_date>
<video:tag>lookout</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3227/lookout-key-advice-for-cisos/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3227_1692905077_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Lookout: Key Advice for CISOs]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3227&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>84</video:duration>
<video:live>no</video:live>
<video:view_count>42</video:view_count>
<video:publication_date>2023-08-24</video:publication_date>
<video:tag>lookout</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3224/3-key-ways-it-security-is-evolving/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3224_1692905234_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[3 Key Ways IT Security Is Evolving]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3224&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>225</video:duration>
<video:live>no</video:live>
<video:view_count>41</video:view_count>
<video:publication_date>2023-08-24</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3223/what-exactly-is-meant-by-data-security-anyway/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3223_1692905297_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What Exactly Is Meant By &quot;Data Security&quot; Anyway?]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3223&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>145</video:duration>
<video:live>no</video:live>
<video:view_count>73</video:view_count>
<video:publication_date>2023-08-24</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3222/100-availability-the-infinidat-guarantee-and-the-importance-of-cyber-secure-storage/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3222_1692782365_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[100% Availability: The Infinidat Guarantee and the Importance of Cyber-secure Storage]]></video:title>
<video:description><![CDATA[Mike Matchett of Small World Big Data and Eric Herzog of Infinidat discuss the importance of consolidation in data storage, emphasizing how their product, the InfiniBox, saves companies significant capital by merging several storage arrays into fewer, ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3222&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1136</video:duration>
<video:live>no</video:live>
<video:view_count>55</video:view_count>
<video:publication_date>2023-08-23</video:publication_date>
<video:tag>storage</video:tag>
<video:tag>backup</video:tag>
<video:tag>cloud</video:tag>
<video:tag>infinidat</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3163/challenging-traditional-storage-calamu-s-multi-hybrid-protected-data-harbors/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3163_1692755163_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Challenging Traditional Storage: Calamu&#039;s Multi Hybrid Protected Data Harbors]]></video:title>
<video:description><![CDATA[Mike Matchett from Small World Big Data interviews Paul Lewis and Dean Archibald from Calamu, an emerging storage company that introduces the concept of multi hybrid protected data harbors.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3163&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1064</video:duration>
<video:live>no</video:live>
<video:view_count>278</video:view_count>
<video:publication_date>2023-08-22</video:publication_date>
<video:tag>calamu</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3221/enhance-your-ea-storytelling-with-best-practice-ea-tools-decision-making/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3221_1692729527_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Enhance Your EA Storytelling with Best Practice EA Tools &amp; Decision-Making]]></video:title>
<video:description><![CDATA[The following clips are from a talk entitled: Accelerate Your EA Storytelling and Empower Decisions with Best-Practice EA Tools and Services. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3221&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>600</video:duration>
<video:live>no</video:live>
<video:view_count>59</video:view_count>
<video:publication_date>2023-08-22</video:publication_date>
<video:tag>bruhati</video:tag>
<video:tag>enterprise</video:tag>
<video:tag>application</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3220/data-kinetic-applying-ai-for-the-enterprise/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3220_1692728258_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Data Kinetic: Applying AI for the Enterprise]]></video:title>
<video:description><![CDATA[Mike Matchett from Small World Big Data conversed with Nick King, CEO of Data Kinetic, about the potential of AI and large language models in enterprise settings. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3220&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1265</video:duration>
<video:live>no</video:live>
<video:view_count>105</video:view_count>
<video:publication_date>2023-08-22</video:publication_date>
<video:tag>ai</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3151/unveiling-zerto-10/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3151_1692645809_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Unveiling Zerto 10: The Next Level in Continuous Data Protection]]></video:title>
<video:description><![CDATA[Mike Matchett of Small World Big Data interviews Caroline Seymour, VP Product Marketin of Zerto about the latest advancements in Zerto&#039;s products, specifically Zerto 10. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3151&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1067</video:duration>
<video:live>no</video:live>
<video:view_count>82</video:view_count>
<video:publication_date>2023-08-21</video:publication_date>
<video:tag>zerto</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
<video:tag>matchett</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3322/ddn-s-parallel-file-system-vs-scale-out-nas/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3322_1704649356_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[DDN&#039;s Parallel File System vs. Scale-Out NAS]]></video:title>
<video:description><![CDATA[James Coomer of DDN discusses the differences between scale-out NAS and DDN&#039;s architecture. Scale-out NAS involves client-server communication and additional data movement due to client unawareness of data location, leading to scalability challenges. ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3322&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>68</video:duration>
<video:live>no</video:live>
<video:view_count>108</video:view_count>
<video:publication_date>2023-08-21</video:publication_date>
<video:tag>ddn</video:tag>
<video:tag>ai</video:tag>
<video:tag>analytics</video:tag>
<video:tag>nvidia</video:tag>
<video:tag>exascaler</video:tag>
<video:tag>superpod</video:tag>
<video:tag>lustre</video:tag>
<video:tag>nas</video:tag>
<video:tag>file</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3216/gdpr-compliance-in-the-cloud-a-dialogue-between-cloud-security-alliance-and-scope-europe/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3216_1692376538_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[GDPR Compliance in the Cloud: A Dialogue between Cloud Security Alliance and Scope Europe]]></video:title>
<video:description><![CDATA[This video highlights the Cloud Security Alliance&#039;s efforts in GDPR compliance and questions the reasons behind a collaboration with Scope Europe and the European Cloud Code of Conduct.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3216&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2134</video:duration>
<video:live>no</video:live>
<video:view_count>55</video:view_count>
<video:publication_date>2023-08-18</video:publication_date>
<video:tag>gdpr</video:tag>
<video:tag>compliance</video:tag>
<video:tag>data</video:tag>
<video:tag>compliance</video:tag>
<video:tag>eu</video:tag>
<video:tag>code</video:tag>
<video:tag>of</video:tag>
<video:tag>conduct</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>csa</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
<video:tag>alliance</video:tag>
<video:tag>scope</video:tag>
<video:tag>europe</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3215/dremio-bridging-the-gap-between-data-discovery/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3215_1692375818_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Dremio: Bridging the Gap Between Data &amp; Discovery]]></video:title>
<video:description><![CDATA[This video dives deep into how Memorial Sloan Kettering (MSK), a premier cancer research hospital, leveraged Dremio&#039;s data lakehouse architecture, streamlining its research processes. The new ecosystem optimizes data management, enhances collaboration...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3215&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1475</video:duration>
<video:live>no</video:live>
<video:view_count>56</video:view_count>
<video:publication_date>2023-08-18</video:publication_date>
<video:tag>msk</video:tag>
<video:tag>memorial</video:tag>
<video:tag>sloan</video:tag>
<video:tag>kettering</video:tag>
<video:tag>research</video:tag>
<video:tag>dremio</video:tag>
<video:tag>data</video:tag>
<video:tag>lakehouse</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>data</video:tag>
<video:tag>discovery</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3214/tackling-unstructured-data-quantum-s-activescale-cold-storage-solution/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3214_1692296489_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[ Tackling Unstructured Data: Quantum&#039;s ActiveScale Cold Storage Solution]]></video:title>
<video:description><![CDATA[In the era of high-performance computing, the massive influx of unstructured data presents a unique challenge for organizations grappling with hyperscale data storage needs.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3214&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>923</video:duration>
<video:live>no</video:live>
<video:view_count>68</video:view_count>
<video:publication_date>2023-08-17</video:publication_date>
<video:tag>hpc</video:tag>
<video:tag>high-performance</video:tag>
<video:tag>computing</video:tag>
<video:tag>unstructured</video:tag>
<video:tag>data</video:tag>
<video:tag>hyperscale</video:tag>
<video:tag>hyperscaler</video:tag>
<video:tag>cold</video:tag>
<video:tag>storage</video:tag>
<video:tag>scalability</video:tag>
<video:tag>quantum</video:tag>
<video:tag>activescale</video:tag>
<video:tag>scale-out</video:tag>
<video:tag>object</video:tag>
<video:tag>storage</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>all-flash</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3212/strengthening-governmental-cyber-defense-with-sentinelone/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3212_1692139083_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Strengthening Governmental Cyber Defense with SentinelOne]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3212&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>4013</video:duration>
<video:live>no</video:live>
<video:view_count>228</video:view_count>
<video:publication_date>2023-08-15</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3211/sentinelone-chatgpt-for-security-leaders/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3211_1692127309_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[SentinelOne: ChatGPT for Security Leaders]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3211&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3592</video:duration>
<video:live>no</video:live>
<video:view_count>351</video:view_count>
<video:publication_date>2023-08-15</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3208/neural-networks-to-generative-ai-a-deep-dive-into-the-future-of-healthcare/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3208_1691612762_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Dell &amp; Certara: Neural Networks to Generative AI: A Deep Dive into the Future of Healthcare]]></video:title>
<video:description><![CDATA[In this conversation, Dell &amp; Certara cover topics ranging from the history and evolution of neural networks and large language models like ChatGPT to the latest advancements and applications in healthcare technology.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3208&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>4973</video:duration>
<video:live>no</video:live>
<video:view_count>60</video:view_count>
<video:publication_date>2023-08-09</video:publication_date>
<video:tag>healthcare</video:tag>
<video:tag>ai</video:tag>
<video:tag>artificial</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>dell</video:tag>
<video:tag>certara</video:tag>
<video:tag>deep</video:tag>
<video:tag>learning</video:tag>
<video:tag>gpu</video:tag>
<video:tag>nvidia</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>neural</video:tag>
<video:tag>networks</video:tag>
<video:tag>big</video:tag>
<video:tag>data</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3164/leostream-revolutionizing-high-performance-computing-in-the-hybrid-enterprise-era/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3164_1691669004_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Leostream: Revolutionizing High-Performance Computing in the Hybrid Enterprise Era]]></video:title>
<video:description><![CDATA[As businesses transition to hybrid architectures, Leostream focuses on providing remote access to graphics-intensive tasks essential for HPC workloads.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3164&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1159</video:duration>
<video:live>no</video:live>
<video:view_count>68</video:view_count>
<video:publication_date>2023-08-09</video:publication_date>
<video:tag>leostream</video:tag>
<video:tag>hpc</video:tag>
<video:tag>gpu</video:tag>
<video:tag>storage</video:tag>
<video:tag>vdi</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3206/quobyte-scaling-ai-workloads-with-smart-software-defined-storage/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3206_1690999544_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Quobyte: Scaling AI Workloads with Smart, Software-Defined Storage]]></video:title>
<video:description><![CDATA[The conversation delves into the transformation of traditional HPC storage requirements in the enterprise, emphasizing the significance of resiliency, security, and manageability and the increasing challenges of managing data for AI and machine learnin...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3206&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1123</video:duration>
<video:live>no</video:live>
<video:view_count>110</video:view_count>
<video:publication_date>2023-08-02</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>quobyte</video:tag>
<video:tag>ai</video:tag>
<video:tag>machine</video:tag>
<video:tag>learning</video:tag>
<video:tag>hpc</video:tag>
<video:tag>storage</video:tag>
<video:tag>hybrid</video:tag>
<video:tag>cloud</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3205/kobai-a-low-code-revolution-for-data-lakehouses/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3205_1690994022_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Kobai: A Low-Code Revolution for Data Lakehouses]]></video:title>
<video:description><![CDATA[In this video, we explore the cutting-edge capabilities of Kobai, a platform that leverages semantic ontologies and low-code interfaces to unlock the full potential of data lakehouses.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3205&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>978</video:duration>
<video:live>no</video:live>
<video:view_count>100</video:view_count>
<video:publication_date>2023-08-02</video:publication_date>
<video:tag>kobai</video:tag>
<video:tag>data</video:tag>
<video:tag>warehouse</video:tag>
<video:tag>data</video:tag>
<video:tag>lakehouse</video:tag>
<video:tag>scalability</video:tag>
<video:tag>matchett</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>knowledge</video:tag>
<video:tag>graph</video:tag>
<video:tag>graph</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3204/ddn-s-exascaler-redefining-performance-and-sustainability-in-hpc/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3204_1690911206_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[DDN&#039;s EXAScaler: Redefining Performance and Sustainability in HPC]]></video:title>
<video:description><![CDATA[In a recent interview with James Coomer from DataDirect Networks (DDN), Mike Matchett explores the groundbreaking features of EXAScaler, a high-performance file system designed to cater to AI workloads and more.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3204&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1135</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2023-08-01</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>ddn</video:tag>
<video:tag>exascaler</video:tag>
<video:tag>ai</video:tag>
<video:tag>nas</video:tag>
<video:tag>scale-out</video:tag>
<video:tag>high-performance</video:tag>
<video:tag>hpc</video:tag>
<video:tag>coomer</video:tag>
<video:tag>workloads</video:tag>
<video:tag>parallel</video:tag>
<video:tag>file</video:tag>
<video:tag>system</video:tag>
<video:tag>datasets</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3203/swimlane-empowering-it-teams-with-low-code-security-automation/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3203_1690907309_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Swimlane: Empowering IT Teams with Low-Code Security Automation]]></video:title>
<video:description><![CDATA[Swimlane&#039;s low-code security automation platform is designed to streamline security operations. By integrating with various tools, Swimlane provides centralized case management and threat intelligence, reducing repetitive tasks and enhancing efficienc...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3203&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1045</video:duration>
<video:live>no</video:live>
<video:view_count>113</video:view_count>
<video:publication_date>2023-08-01</video:publication_date>
<video:tag>matchett</video:tag>
<video:tag>swimlane</video:tag>
<video:tag>security</video:tag>
<video:tag>secops</video:tag>
<video:tag>security</video:tag>
<video:tag>automation</video:tag>
<video:tag>automation</video:tag>
<video:tag>threat</video:tag>
<video:tag>intelligence</video:tag>
<video:tag>low-code</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3202/how-does-netskope-help-to-protect-against-risks-associated-with-chatgpt-usage/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3202_1690803355_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How does Netskope help to protect against risks associated with ChatGPT usage?]]></video:title>
<video:description><![CDATA[This clip emphasizes the importance of individual responsibility when interacting with third party technologies. Netskope protects against excessive data leakage and enforcing the access control.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3202&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>283</video:duration>
<video:live>no</video:live>
<video:view_count>74</video:view_count>
<video:publication_date>2023-07-30</video:publication_date>
<video:tag>netskope</video:tag>
<video:tag>security</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>dlp</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3195/netskope-how-to-approach-ai-s-vulnerabilities-to-cyber-threats/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3195_1690800722_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Netskope: How to approach AI&#039;s vulnerabilities to cyber threats]]></video:title>
<video:description><![CDATA[James Robinson, Deputy CISO with Netskope, urges organizations to be prepared for potential threats associated with ChatGPT and similar generative AI tools by educating their developers, and to collaborate with industry resources like OWASP. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3195&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>276</video:duration>
<video:live>no</video:live>
<video:view_count>61</video:view_count>
<video:publication_date>2023-07-30</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3192/haloitsm-a-comprehensive-platform-for-streamlined-it-services/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3192_1690565663_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[HaloITSM: A Comprehensive Platform for Streamlined IT Services]]></video:title>
<video:description><![CDATA[This video takes you on a comprehensive tour of HaloITSM&#039;s self-service portal, integrations, and functionalities]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3192&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1697</video:duration>
<video:live>no</video:live>
<video:view_count>67</video:view_count>
<video:publication_date>2023-07-28</video:publication_date>
<video:tag>haloitsm</video:tag>
<video:tag>it</video:tag>
<video:tag>services</video:tag>
<video:tag>itsm</video:tag>
<video:tag>itil</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3191/strengthening-security-for-remote-work-with-supportwave/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3191_1690564442_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Strengthening Security for Remote Work with Supportwave]]></video:title>
<video:description><![CDATA[The video covers the importance of secure access and encryption in collaboration tools to safeguard sensitive business information. It highlights how businesses must be vigilant in choosing products, prioritizing security, and ensuring that the virtual...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3191&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>184</video:duration>
<video:live>no</video:live>
<video:view_count>76</video:view_count>
<video:publication_date>2023-07-28</video:publication_date>
<video:tag>supportwave</video:tag>
<video:tag>remote</video:tag>
<video:tag>work</video:tag>
<video:tag>collaboration</video:tag>
<video:tag>virtual</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>security</video:tag>
<video:tag>cyberthreat</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3190/clavister-a-practical-approach-to-securing-cloud-native-network-functions/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3190_1690562885_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Clavister: A Practical Approach to Securing Cloud-Native Network Functions]]></video:title>
<video:description><![CDATA[Watch this discussion with Clavister and Intel on the various container deployment models for enhancing cybersecurity in the ever-evolving landscape of IT infrastructure. Delve into the advantages and challenges of containerization and its impact on la...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3190&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2412</video:duration>
<video:live>no</video:live>
<video:view_count>58</video:view_count>
<video:publication_date>2023-07-28</video:publication_date>
<video:tag>clavister</video:tag>
<video:tag>intel</video:tag>
<video:tag>kubernetes</video:tag>
<video:tag>cybersecurity</video:tag>
<video:tag>cloud</video:tag>
<video:tag>deployment</video:tag>
<video:tag>it</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>cloud-native</video:tag>
<video:tag>containers</video:tag>
<video:tag>containerized</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3188/aws-the-evolution-of-hybrid-cloud-for-public-sector-a-historical-perspective/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3188_1690452810_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[AWS: The Evolution of Hybrid Cloud for Public Sector: A Historical Perspective]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3188&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1923</video:duration>
<video:live>no</video:live>
<video:view_count>247</video:view_count>
<video:publication_date>2023-07-24</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3184/sentinelone-as-ransomware-evolves-so-must-it/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3184_1689935120_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[SentinelOne: As Ransomware Evolves, So Must IT]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3184&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3395</video:duration>
<video:live>no</video:live>
<video:view_count>67</video:view_count>
<video:publication_date>2023-07-21</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3181/k2view-achieve-roi-with-devops-test-data-management/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3181_1689792441_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[K2View: Achieve ROI with DevOps Test Data Management]]></video:title>
<video:description><![CDATA[In this webinar, we delve into DevOps Test Data Management&#039;s (TDM) transformative power and ability to drive cost savings, enhance productivity, and accelerate software delivery within your organization.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3181&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3284</video:duration>
<video:live>no</video:live>
<video:view_count>44</video:view_count>
<video:publication_date>2023-07-19</video:publication_date>
<video:tag>devops</video:tag>
<video:tag>test</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>tdm</video:tag>
<video:tag>roi</video:tag>
<video:tag>k2view</video:tag>
<video:tag>software</video:tag>
<video:tag>delivery</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3180/servicely-empower-it-service-management-with-self-service/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3180_1689791624_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Servicely: Empower IT Service Management with Self-Service]]></video:title>
<video:description><![CDATA[Discover how organizations can revolutionize their ITSM practices by leveraging the power of self-service to enhance customer satisfaction, empower service agents, and optimize service desk operations.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3180&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1673</video:duration>
<video:live>no</video:live>
<video:view_count>51</video:view_count>
<video:publication_date>2023-07-19</video:publication_date>
<video:tag>itsm</video:tag>
<video:tag>it</video:tag>
<video:tag>service</video:tag>
<video:tag>management</video:tag>
<video:tag>servicely</video:tag>
<video:tag>self-service</video:tag>
<video:tag>automation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3174/hornet-security-how-to-close-the-email-security-gap/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3174_1688991094_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Hornet Security: How To Close The Email Security Gap]]></video:title>
<video:description><![CDATA[In this clip, Hornet Security thoroughly covers how to prevent phishing and malware intrustion through email attacks, including a demo of how their solution helps harden an organization&#039;s security posture from a technology and human standpoint.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3174&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1600</video:duration>
<video:live>no</video:live>
<video:view_count>71</video:view_count>
<video:publication_date>2023-07-10</video:publication_date>
<video:tag>hornet</video:tag>
<video:tag>security</video:tag>
<video:tag>phishing</video:tag>
<video:tag>malware</video:tag>
<video:tag>email</video:tag>
<video:tag>repost</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3173/jupiterone-placeholder/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3173_1688937129_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[JupiterOne: Automate Cybersecurity with the Cyber Defense Matrix and the DIE Triad]]></video:title>
<video:description><![CDATA[Sounil Yu, CISO and Head of Research at JupiterOne, describes the Cyber Defense Matrix and the importance of consistent cybersecurity activities across different asset classes and how JupiterOne can help automate cybersecurity activities.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3173&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1223</video:duration>
<video:live>no</video:live>
<video:view_count>88</video:view_count>
<video:publication_date>2023-07-09</video:publication_date>
<video:tag>jupiterone</video:tag>
<video:tag>repost</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3169/what-is-an-sbom/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3169_1688487421_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What is an SBOM?]]></video:title>
<video:description><![CDATA[In this clip, learn what an software bill of materials (SBOM) is and how it helps users gain visibility into their software assets, mitigate security risks and improve overall software development and management processes.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3169&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>126</video:duration>
<video:live>no</video:live>
<video:view_count>55</video:view_count>
<video:publication_date>2023-07-04</video:publication_date>
<video:tag>sbom</video:tag>
<video:tag>cast</video:tag>
<video:tag>synopsys</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3168/shardsecure-how-to-secure-unstructured-data/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3168_1688483743_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[ShardSecure: How To Secure Unstructured Data]]></video:title>
<video:description><![CDATA[ShardSecure discusses the storage and security of unstructured data via their Microshard technology which involves breaking the data into smaller pieces and distributing them across multiple storage locations. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3168&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2101</video:duration>
<video:live>no</video:live>
<video:view_count>74</video:view_count>
<video:publication_date>2023-07-04</video:publication_date>
<video:tag>shardsecure</video:tag>
<video:tag>repost</video:tag>
<video:tag>security</video:tag>
<video:tag>storage</video:tag>
<video:tag>unstructured</video:tag>
<video:tag>data</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3167/docontrol-secure-the-saas-supply-chain/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3167_1688478112_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[DoControl: Secure The SaaS Supply Chain]]></video:title>
<video:description><![CDATA[In this clip. DoControl covers the anatomy of SaaS supply chain attacks, covering five phases: infiltration, implantation, propagation, activation, and exploitation. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3167&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1146</video:duration>
<video:live>no</video:live>
<video:view_count>61</video:view_count>
<video:publication_date>2023-07-04</video:publication_date>
<video:tag>docontrol</video:tag>
<video:tag>repost</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3166/amplitude-transforms-snowflake-from-insights-to-impact/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3166_1688468135_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Amplitude Transforms Snowflake From Insights To Impact]]></video:title>
<video:description><![CDATA[In this clip, learn how Amplitude helped their client Brainly make better use of their Snowflake implementation by helping their users gain insights and perform analysis on their data without solely relying on analysts or data scientists.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3166&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1989</video:duration>
<video:live>no</video:live>
<video:view_count>73</video:view_count>
<video:publication_date>2023-07-04</video:publication_date>
<video:tag>amplitude</video:tag>
<video:tag>data</video:tag>
<video:tag>warehouse</video:tag>
<video:tag>repost</video:tag>
<video:tag>analytics</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3161/the-power-of-automated-kubernetes-scaling-with-stormforge/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3161_1687534621_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Power of Automated Kubernetes Scaling with StormForge]]></video:title>
<video:description><![CDATA[Stormforge discusses the challenges of manual scaling and the benefits of embracing automation. By leveraging tools like the vertical pod autoscaler (vGPU), the horizontal pod autoscaler (HPA), and cluster autoscaling, developers can optimize resource ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3161&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3122</video:duration>
<video:live>no</video:live>
<video:view_count>77</video:view_count>
<video:publication_date>2023-06-23</video:publication_date>
<video:tag>stormforge</video:tag>
<video:tag>kubernetes</video:tag>
<video:tag>autoscaler</video:tag>
<video:tag>vgpu</video:tag>
<video:tag>microservices</video:tag>
<video:tag>scaling</video:tag>
<video:tag>automation</video:tag>
<video:tag>hpa</video:tag>
<video:tag>cluster</video:tag>
<video:tag>clusters</video:tag>
<video:tag>resource</video:tag>
<video:tag>allocation</video:tag>
<video:tag>infrastructure</video:tag>
<video:tag>management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3159/netwrix-empowering-cybersecurity-through-privileged-access-management/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3159_1687275202_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Netwrix: Empowering Cybersecurity through Privileged Access Management]]></video:title>
<video:description><![CDATA[In this video, you’ll explore the world of privileged access management (PAM) and its crucial role in enhancing organizational security against ransomware and cyber threats. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3159&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>814</video:duration>
<video:live>no</video:live>
<video:view_count>53</video:view_count>
<video:publication_date>2023-06-21</video:publication_date>
<video:tag>pam</video:tag>
<video:tag>netwrix</video:tag>
<video:tag>matchett</video:tag>
<video:tag>data</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3160/mirantis-openstack-unlocking-cloud-roi/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3160_1687379352_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Mirantis &amp; OpenStack: Unlocking Cloud ROI]]></video:title>
<video:description><![CDATA[Mirantis empowers organizations to achieve optimal cloud ROI by modernizing and migrating legacy applications. Explore migration strategies, leveraging open-source private cloud solutions like OpenStack and Kubernetes.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3160&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2987</video:duration>
<video:live>no</video:live>
<video:view_count>75</video:view_count>
<video:publication_date>2023-06-21</video:publication_date>
<video:tag>mirantis</video:tag>
<video:tag>cloud</video:tag>
<video:tag>private</video:tag>
<video:tag>cloud</video:tag>
<video:tag>application</video:tag>
<video:tag>applications</video:tag>
<video:tag>apps</video:tag>
<video:tag>roi</video:tag>
<video:tag>open</video:tag>
<video:tag>source</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3120/resilio-unleash-the-bittorrent-of-file-data-management/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3120_1687256851_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Resilio: The Peer-to-Peer File Data Management Solution]]></video:title>
<video:description><![CDATA[Resilio descirbes their peer-to-peer file managemenet technology as sort of a core replication application platform where for many different use cases, you may need to replicate data, synchronize it and get it from one place to another.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3120&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>880</video:duration>
<video:live>no</video:live>
<video:view_count>46</video:view_count>
<video:publication_date>2023-06-19</video:publication_date>
<video:tag>resilio</video:tag>
<video:tag>file</video:tag>
<video:tag>data</video:tag>
<video:tag>management</video:tag>
<video:tag>backup</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3156/kyligence-zen-the-no-code-data-project-superpower/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3156_1687086542_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Kyligence Zen: The No-Code Data Project Superpower]]></video:title>
<video:description><![CDATA[Kyligence Zen, a no code matrix platform that helps overcome the common challenge of delivering business intelligence (BI) analysis and power into the hands of business users who need it.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3156&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1626</video:duration>
<video:live>no</video:live>
<video:view_count>65</video:view_count>
<video:publication_date>2023-06-18</video:publication_date>
<video:tag>zen</video:tag>
<video:tag>kyligence</video:tag>
<video:tag>bi</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3155/leveraging-chatgpt-and-dataserve-for-smarter-operations/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3155_1686932219_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Leveraging ChatGPT and dataServe for Smarter Operations]]></video:title>
<video:description><![CDATA[Explore the capabilities of dataServe and its OpenAI connector, empowering businesses with a 24/7 service function that reduces reliance on large front-line service teams.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3155&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3205</video:duration>
<video:live>no</video:live>
<video:view_count>61</video:view_count>
<video:publication_date>2023-06-16</video:publication_date>
<video:tag>dataserve</video:tag>
<video:tag>chatgpt</video:tag>
<video:tag>ai</video:tag>
<video:tag>openai</video:tag>
<video:tag>transformation</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3150/from-overprovisioning-to-optimization-achieving-dynamic-resource-allocation-through-composable-disaggregated-infrastructure/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3150_1686588635_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[From Overprovisioning to Optimization: Achieving Dynamic Resource Allocation Through Composable Disaggregated Infrastructure]]></video:title>
<video:description><![CDATA[SNIA and the Open Fabric Alliance discuss the concept of composable disaggregated infrastructures (CDI), which physically disaggregate computational resources over high-speed and low-latency fabrics.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3150&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2681</video:duration>
<video:live>no</video:live>
<video:view_count>73</video:view_count>
<video:publication_date>2023-06-12</video:publication_date>
<video:tag>snia</video:tag>
<video:tag>composable</video:tag>
<video:tag>storage</video:tag>
<video:tag>networking</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3149/cast-sbom-secure-software-supply-chain/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3149_1686530965_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[CAST: Why You Need An SBOM To Secure Your Software Supply Chain]]></video:title>
<video:description><![CDATA[CAST Software emphasizes the critical importance of software bill of materials (S-BOMs) for software development, security, and compliance.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3149&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3570</video:duration>
<video:live>no</video:live>
<video:view_count>88</video:view_count>
<video:publication_date>2023-06-11</video:publication_date>
<video:tag>sbom</video:tag>
<video:tag>cast</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3325/ddn-storage-optimized-for-qlc-write-performance/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3325_1704650135_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[DDN: Storage Optimized for QLC Write Performance]]></video:title>
<video:description><![CDATA[James Coomer discusses managing performance and endurance in a QLC-based architecture. DDN optimizes its software for QLC and filters out small, less efficient IOPs, placing them on TLC for low latency. This approach, combined with modern QLC device im...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3325&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>122</video:duration>
<video:live>no</video:live>
<video:view_count>52</video:view_count>
<video:publication_date>2023-06-09</video:publication_date>
<video:tag>ddn</video:tag>
<video:tag>ai</video:tag>
<video:tag>analytics</video:tag>
<video:tag>nvidia</video:tag>
<video:tag>exascaler</video:tag>
<video:tag>superpod</video:tag>
<video:tag>lustre</video:tag>
<video:tag>nas</video:tag>
<video:tag>file</video:tag>
<video:tag>storage</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3145/netally-cyberscope-nmap-cybersecurity-in-the-palm-of-your-hand/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3145_1686308922_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[NetAlly CyberScope: Nmap Cybersecurity in the Palm of Your Hand]]></video:title>
<video:description><![CDATA[Learn about NetAlly&#039;s handheld cybersecurity analyzer, Cyberscope, that gives you the power of Nmap right in the palm of your hand.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3145&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>3490</video:duration>
<video:live>no</video:live>
<video:view_count>96</video:view_count>
<video:publication_date>2023-06-09</video:publication_date>
<video:tag>netally</video:tag>
<video:tag>security</video:tag>
<video:tag>cyberscope</video:tag>
<video:tag>nmap</video:tag>
<video:tag>networking</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3140/what-does-nutanix-licensing-look-like/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3140_1685479469_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What does Nutanix licensing look like?]]></video:title>
<video:description><![CDATA[Customers can purchase Nutanix licenses directly, which are fully portable. They can also choose between pay-as-you-go and cloud commit options for more flexibility and cost predictability. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3140&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>149</video:duration>
<video:live>no</video:live>
<video:view_count>69</video:view_count>
<video:publication_date>2023-05-30</video:publication_date>
<video:tag>nutanix</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3139/3-cloud-adoption-use-cases-nutanix-can-help-with/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3139_1685479412_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[3 cloud adoption use cases Nutanix can help with]]></video:title>
<video:description><![CDATA[In this clip, Nutanix discusses how they are playing a key role in helping customers reduce costs and rehome workloads in the public cloud. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3139&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>208</video:duration>
<video:live>no</video:live>
<video:view_count>68</video:view_count>
<video:publication_date>2023-05-30</video:publication_date>
<video:tag>nutanix</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3138/how-does-nutanix-help-customers-migrate-to-the-cloud/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3138_1685479301_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How does Nutanix help customers migrate to the cloud?]]></video:title>
<video:description><![CDATA[Vengopal Pai from Nutanix explains how their software stack enables customers to seamlessly transition from on-premise infrastructure to the cloud. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3138&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>212</video:duration>
<video:live>no</video:live>
<video:view_count>62</video:view_count>
<video:publication_date>2023-05-30</video:publication_date>
<video:tag>nutanix</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3137/how-exactly-are-customers-adopting-hybrid-cloud-models/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3137_1685479171_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How exactly are customers adopting hybrid cloud models?]]></video:title>
<video:description><![CDATA[Mike Matchett of Small World Big Data asks Vengopal Pai from Nutanix about how people are adopting the cloud and the different approaches they are taking. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3137&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>303</video:duration>
<video:live>no</video:live>
<video:view_count>62</video:view_count>
<video:publication_date>2023-05-30</video:publication_date>
<video:tag>nutanix</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3136/how-can-nutanix-help-customers-better-control-costs-associated-with-multi-cloud-usage/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3136_1685479086_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How can Nutanix help customers better control costs associated with multi-cloud usage?]]></video:title>
<video:description><![CDATA[Vengopal Pai of Nutanix explains that in previous years, the focus was often on public cloud agility, regardless of the cost. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3136&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>133</video:duration>
<video:live>no</video:live>
<video:view_count>58</video:view_count>
<video:publication_date>2023-05-30</video:publication_date>
<video:tag>nutanix</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3135/how-does-the-loss-of-time-and-capital-compound-when-cloud-migration-is-inefficient/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3135_1685478993_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How does the loss of time and capital compound when cloud migration is inefficient?]]></video:title>
<video:description><![CDATA[Nutanix&#039;s Vengopal Pai and Marc Trouard-Riolle, explain that the decision to move to the public cloud is often a top-down decision. However, organizations face challenges in actually making this transition happen. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3135&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>164</video:duration>
<video:live>no</video:live>
<video:view_count>52</video:view_count>
<video:publication_date>2023-05-30</video:publication_date>
<video:tag>nutanix</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3134/nutanix-on-the-key-challenges-to-adopting-a-hybrid-cloud-model/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3134_1685478404_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Nutanix: On The Key Challenges To Adopting A Hybrid Cloud Model]]></video:title>
<video:description><![CDATA[Vengupal Pai and Marc Trouard-Riolle, from Nutanix discuss the concerns that hold people back from fully embracing the cloud. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3134&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>123</video:duration>
<video:live>no</video:live>
<video:view_count>66</video:view_count>
<video:publication_date>2023-05-30</video:publication_date>
<video:tag>nutanix</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3133/what-does-hybrid-cloud-look-like-in-reality/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3133_1685478023_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What does hybrid cloud look like in reality?]]></video:title>
<video:description><![CDATA[Marc Trouard-Riolle, Director of Product Marketing from Nutanix discusses the ideal platform for hybrid multi-cloud environments. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3133&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>77</video:duration>
<video:live>no</video:live>
<video:view_count>64</video:view_count>
<video:publication_date>2023-05-30</video:publication_date>
<video:tag>nutanix</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3132/why-adopt-cloud-in-the-first-place/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3132_1685477655_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Nutanix: Why adopt cloud in the first place?]]></video:title>
<video:description><![CDATA[Nutanix discusses the reasons why organizations are eager to embrace the cloud whether Azure, GCP, AWS, etc.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3132&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>120</video:duration>
<video:live>no</video:live>
<video:view_count>82</video:view_count>
<video:publication_date>2023-05-30</video:publication_date>
<video:tag>nutanix</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3131/what-is-the-current-state-of-hybrid-cloud-model-adoption/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3131_1685460356_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What is the current state of hybrid cloud model adoption?]]></video:title>
<video:description><![CDATA[Nutanix highlights the evolving nature of the hybrid cloud landscape, with organizations making strategic decisions based on their specific needs and aiming to optimize their infrastructure for maximum efficiency and value.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3131&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>111</video:duration>
<video:live>no</video:live>
<video:view_count>114</video:view_count>
<video:publication_date>2023-05-30</video:publication_date>
<video:tag>nutanix</video:tag>
<video:tag>cloud</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3129/take-the-ultimate-extended-test-drive/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3129_1684869811_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Take The Ultimate Extended Test Drive]]></video:title>
<video:description><![CDATA[In this clip learn how easy it is to set up and test drive the VergeIO application. You can be cloning virtual data centers in just a few mouse clicks.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3129&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>151</video:duration>
<video:live>no</video:live>
<video:view_count>52</video:view_count>
<video:publication_date>2023-05-23</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>architecture</video:tag>
<video:tag>security</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>cloud</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>verge</video:tag>
<video:tag>io</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3128/the-power-of-verge-io-for-networking-storage-and-hypervisor/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3128_1684869478_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Power of Verge.IO for Networking, Storage, and Hypervisor]]></video:title>
<video:description><![CDATA[In this clip we cover how Verge.IO offers enhanced capabilities at three levels: networking, storage, and hypervisor. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3128&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>155</video:duration>
<video:live>no</video:live>
<video:view_count>73</video:view_count>
<video:publication_date>2023-05-23</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>architecture</video:tag>
<video:tag>security</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>cloud</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>verge</video:tag>
<video:tag>io</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3127/vergeio-for-data-center-disaster-recovery/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3127_1684869002_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[VergeIO For Data Center Disaster Recovery]]></video:title>
<video:description><![CDATA[One of Verge.IO&#039;s key feature is its migration function, which allows for scheduled and repeatable migrations. Leveraging VMware&#039;s change block tracking capabilities, Verge.IO only transfers the changed blocks within a virtual machine (VM) to its clu...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3127&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>58</video:duration>
<video:live>no</video:live>
<video:view_count>68</video:view_count>
<video:publication_date>2023-05-23</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>cloud</video:tag>
<video:tag>converged</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>verge</video:tag>
<video:tag>io</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3126/ok-to-mix-intel-amd-gpus-nodes/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3126_1684868641_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Ok To Mix: Intel, AMD, GPUs Nodes]]></video:title>
<video:description><![CDATA[Verge.IO is designed to run on existing hardware, abstracting itself from specific chips or processors thus also providing the flexibility to easily mix different types of nodes within the same environment.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3126&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>97</video:duration>
<video:live>no</video:live>
<video:view_count>60</video:view_count>
<video:publication_date>2023-05-23</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>architecture</video:tag>
<video:tag>security</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>cloud</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>verge</video:tag>
<video:tag>io</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3125/maintaining-the-user-experience/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3125_1684868042_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Maintaining The Hypervisor User Experience]]></video:title>
<video:description><![CDATA[There&#039;s some confusion about Microsoft&#039;s direction with Hyper-V and there&#039;s also challenges associated with KVM and OpenStack. At Verge.io, they have developed their own approach using a combination of QEMU and KVM, creating a more streamlined hyper...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3125&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>128</video:duration>
<video:live>no</video:live>
<video:view_count>55</video:view_count>
<video:publication_date>2023-05-23</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>architecture</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>verge</video:tag>
<video:tag>io</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3124/vmware-licensing-costs-are-growing/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3124_1684867771_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[VMware Licensing Costs Are Growing]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3124&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>43</video:duration>
<video:live>no</video:live>
<video:view_count>59</video:view_count>
<video:publication_date>2023-05-23</video:publication_date>
<video:tag>vergeio</video:tag>
<video:tag>verge</video:tag>
<video:tag>io</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3123/the-achilles-heel-of-datacenter-architecture/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3123_1684862850_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Achilles Heel of Datacenter Architecture]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3123&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>165</video:duration>
<video:live>no</video:live>
<video:view_count>72</video:view_count>
<video:publication_date>2023-05-23</video:publication_date>
<video:tag>vergeio</video:tag>
<video:tag>verge</video:tag>
<video:tag>io</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3122/how-vmware-mainframed-open-systems-architecture/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3122_1684862500_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The &quot;Mainframing&quot; of Open Systems Architecture]]></video:title>
<video:description><![CDATA[George Crump, CMO of VergeIO discusses how VMware created a proprietary layer on top of open systems architecture thus rendering it as a proprietary container.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3122&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>36</video:duration>
<video:live>no</video:live>
<video:view_count>90</video:view_count>
<video:publication_date>2023-05-23</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>architecture</video:tag>
<video:tag>demo</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>verge</video:tag>
<video:tag>io</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3121/vergeio-david-converges-on-goliath/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3121_1684861411_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[VergeIO: David Converges On Goliath]]></video:title>
<video:description><![CDATA[George Crump, CMO of Verge.IO talks about the challenge of going head-to-head against VMware not only for them but also in appreciation of the decisions clients need to make about their investment in infrastructure, where they want to go, and the flexi...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3121&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>30</video:duration>
<video:live>no</video:live>
<video:view_count>144</video:view_count>
<video:publication_date>2023-05-23</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>cloud</video:tag>
<video:tag>converged</video:tag>
<video:tag>vergeio</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3119/fortra-unmasking-email-fraud-insights-into-threats-and-defenses/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3119_1684785025_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Fortra: Unmasking Email Fraud: Insights into Threats and Defenses]]></video:title>
<video:description><![CDATA[In this clip, John Wilson, a senior fellow of threat research for Fortra, discusses the company&#039;s cybersecurity solutions and the increasing threat of email-based fraud. Fortra, previously known as Help Systems, offers a comprehensive cybersecurity po...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3119&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>2549</video:duration>
<video:live>no</video:live>
<video:view_count>63</video:view_count>
<video:publication_date>2023-05-22</video:publication_date>
<video:tag>fortra</video:tag>
<video:tag>security</video:tag>
<video:tag>email</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3109/synopsys-everything-you-need-to-know-about-dast/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3109_1684236500_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Synopsys: Everything You Need To Know About DAST]]></video:title>
<video:description><![CDATA[This webcast focuses on WhiteHat Dynamic, a Dynamic Application Security Testing (DAST) solution delivered in a SaaS model to deliver continuous scanning, expert verification, scalability and production safety.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3109&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1549</video:duration>
<video:live>no</video:live>
<video:view_count>58</video:view_count>
<video:publication_date>2023-05-16</video:publication_date>
<video:tag>synopsys</video:tag>
<video:tag>security</video:tag>
<video:tag>dast</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3115/whitehat-dynamic-dast-not-just-for-production-environments/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3115_1684337173_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[WhiteHat Dynamic DAST: Not Just For Production Environments]]></video:title>
<video:description><![CDATA[To prevent vulnerabilities in production, organizations can utilize staging environments for pre-production testing. WhiteHat Dynamic can detect issues before applications go live]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3115&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>68</video:duration>
<video:live>no</video:live>
<video:view_count>40</video:view_count>
<video:publication_date>2023-05-16</video:publication_date>
<video:tag>synopsys</video:tag>
<video:tag>security</video:tag>
<video:tag>dast</video:tag>
<video:tag>whitehat</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3114/how-dast-helps-with-compliance/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3114_1684235993_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How DAST Helps With Compliance &amp; Governance]]></video:title>
<video:description><![CDATA[WhiteHat Dynamic assisted a global retailer in protecting their applications and meeting compliance requirements. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3114&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>174</video:duration>
<video:live>no</video:live>
<video:view_count>38</video:view_count>
<video:publication_date>2023-05-16</video:publication_date>
<video:tag>synopsys</video:tag>
<video:tag>security</video:tag>
<video:tag>dast</video:tag>
<video:tag>whitehat</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3113/whitehat-dynamic-separates-the-signal-from-the-noise/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3113_1684337287_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[WhiteHat Dynamic Separates The Signal From The Noise]]></video:title>
<video:description><![CDATA[WhiteHat Dynamic provides accurate and actionable vulnerability reports, ensuring confidence in taking necessary actions.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3113&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>100</video:duration>
<video:live>no</video:live>
<video:view_count>36</video:view_count>
<video:publication_date>2023-05-16</video:publication_date>
<video:tag>synopsys</video:tag>
<video:tag>security</video:tag>
<video:tag>dast</video:tag>
<video:tag>whitehat</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3112/why-dast-should-be-part-of-your-security-testing-portfolio/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3112_1684235311_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Should DAST Be Part Of Your Testing Portfolio?]]></video:title>
<video:description><![CDATA[Whitehat Dynamic enables continuous DAST testing capabilities so that you can find the vulnerabilities before the attackers do.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3112&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>56</video:duration>
<video:live>no</video:live>
<video:view_count>37</video:view_count>
<video:publication_date>2023-05-16</video:publication_date>
<video:tag>synopsys</video:tag>
<video:tag>security</video:tag>
<video:tag>dast</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3111/what-makes-dynamic-application-security-testing-dast-different/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3111_1684236688_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What Makes Dynamic Application Security Testing (DAST) Different?]]></video:title>
<video:description><![CDATA[DAST automates the same types of attacks and methods that real world adversaries use against your websites. And it takes what we call black box black box testing approach. So it doesn&#039;t it doesn&#039;t depend on what is used to build your app, what langua...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3111&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>32</video:duration>
<video:live>no</video:live>
<video:view_count>39</video:view_count>
<video:publication_date>2023-05-16</video:publication_date>
<video:tag>synopsys</video:tag>
<video:tag>security</video:tag>
<video:tag>dast</video:tag>
<video:tag>whitehat</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3110/whitehat-dynamic-an-overview/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3110_1684234412_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[WhiteHat Dynamic: An Overview]]></video:title>
<video:description><![CDATA[WhiteHat Dynamic is a powerful application testing solution that helps organizations verify the security of their web applications in production. It detects vulnerabilities by interacting with running web applications and simulating threat actor behavi...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3110&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>159</video:duration>
<video:live>no</video:live>
<video:view_count>72</video:view_count>
<video:publication_date>2023-05-16</video:publication_date>
<video:tag>synopsys</video:tag>
<video:tag>security</video:tag>
<video:tag>dast</video:tag>
<video:tag>whitehat</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3107/firewalls-phishing/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3107_1683656427_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Firewalls &amp; Phishing]]></video:title>
<video:description><![CDATA[Firewalls have not been effective for two decades, leading to the emergence of the zero-trust subculture. Despite this, many guides, including PCI DSS, prioritize firewall controls. However, security awareness training is considered the most effective ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3107&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>37</video:duration>
<video:live>no</video:live>
<video:view_count>59</video:view_count>
<video:publication_date>2023-05-09</video:publication_date>
<video:tag>knowbe4</video:tag>
<video:tag>security</video:tag>
<video:tag>phishing</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3106/malware-prevention-why-the-best-offense-is-a-solid-defense/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3106_1683655442_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Malware Prevention: Why The Best Offense is a Solid Defense]]></video:title>
<video:description><![CDATA[The best malware defenders use their own data, local data to drive solutions and have great communication at all levels. The end result is they invest the right resources in the right places and end up with the right results when it comes to malware pr...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3106&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>30</video:duration>
<video:live>no</video:live>
<video:view_count>60</video:view_count>
<video:publication_date>2023-05-09</video:publication_date>
<video:tag>grimes</video:tag>
<video:tag>knowbe4</video:tag>
<video:tag>phishing</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3105/how-many-patches-do-you-need/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3105_1683655222_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How many patches do you need?]]></video:title>
<video:description><![CDATA[KnowBe4&#039;s Roger Grimes discusses the avalanche of vulnerabilities and patches that IT shops need to try and keep pace with.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3105&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>54</video:duration>
<video:live>no</video:live>
<video:view_count>56</video:view_count>
<video:publication_date>2023-05-09</video:publication_date>
<video:tag>knowbe4</video:tag>
<video:tag>grimes</video:tag>
<video:tag>phishing</video:tag>
<video:tag>ransomware</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3104/what-the-fbi-got-wrong-about-hive-ransomware/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3104_1683650748_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What the FBI got wrong about Hive ransomware]]></video:title>
<video:description><![CDATA[In this short clip from KnowBe4 re: Hive ransomware and the FBI&#039;s recommendations, learn why in some cases we are teaching each other the wrong things when it comes to cybersecurity.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3104&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>57</video:duration>
<video:live>no</video:live>
<video:view_count>60</video:view_count>
<video:publication_date>2023-05-09</video:publication_date>
<video:tag>grimes</video:tag>
<video:tag>knowbe4</video:tag>
<video:tag>phishing</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3103/what-can-humans-sharks-and-mosquitoes-teach-us-about-risk/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3103_1683650432_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What can humans, sharks and mosquitoes teach us about risk?]]></video:title>
<video:description><![CDATA[In this short clip, Roger Grimes of KnowBe4 describes which malware risks are like sharks and which are more like mosquitoes.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3103&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>72</video:duration>
<video:live>no</video:live>
<video:view_count>64</video:view_count>
<video:publication_date>2023-05-09</video:publication_date>
<video:tag>grimes</video:tag>
<video:tag>knowbe4</video:tag>
<video:tag>phishing</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3102/ransomware-pop-the-big-bubbles/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3102_1683648441_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Ransomware: Pop The Big Bubbles]]></video:title>
<video:description><![CDATA[Roger Grimes of KnowBe4 takes us through the champagne bubble analogy of what threats to focus on and what not to.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3102&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>43</video:duration>
<video:live>no</video:live>
<video:view_count>40</video:view_count>
<video:publication_date>2023-05-09</video:publication_date>
<video:tag>grimes</video:tag>
<video:tag>knowbe4</video:tag>
<video:tag>phishing</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3101/ransomware-problem-or-symptom/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3101_1683648196_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Ransomware: Problem or Symptom?]]></video:title>
<video:description><![CDATA[KnowBe4&#039;s Roger Grimes discusses what&#039;s really the issue behind malware attacks and ransomware. Ransomware isn&#039;t really the problem. It&#039;s a symptom of a different underlying problem.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3101&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>30</video:duration>
<video:live>no</video:live>
<video:view_count>128</video:view_count>
<video:publication_date>2023-05-09</video:publication_date>
<video:tag>knowbe4</video:tag>
<video:tag>grimes</video:tag>
<video:tag>phishing</video:tag>
<video:tag>ransomware</video:tag>
<video:tag>security</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3100/malware-what-is-the-most-prevalent-initial-root-cause/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3100_1683647991_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Malware: What is the most prevalent initial root cause?]]></video:title>
<video:description><![CDATA[Roger Grimes of KnowBe4 describes what you need to focus on to stop the vast majority of malware attacks.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3100&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>34</video:duration>
<video:live>no</video:live>
<video:view_count>70</video:view_count>
<video:publication_date>2023-05-09</video:publication_date>
<video:tag>knowbe4</video:tag>
<video:tag>grimes</video:tag>
<video:tag>phishing</video:tag>
<video:tag>ransomware</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3094/the-story-and-vision-of-how-cohesity-is-leading-the-next-era-of-data-security-and-management/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3094_1683046643_thumb.png</video:thumbnail_loc>
<video:title><![CDATA[The story and vision of how Cohesity is leading the next era of data security and management]]></video:title>
<video:description><![CDATA[Sanjay Poonen, CEO of Cohesity describes why customers and partners choose Cohesity. The story starts with cyber resilient data security and leads to data management for hybrid and multi-cloud environments – at scale, all with radical simplicity. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3094&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>962</video:duration>
<video:view_count>47</video:view_count>
<video:publication_date>2023-05-02</video:publication_date>
<video:tag>the</video:tag>
<video:tag>story</video:tag>
<video:tag>and</video:tag>
<video:tag>vision</video:tag>
<video:tag>of</video:tag>
<video:tag>how</video:tag>
<video:tag>cohesity</video:tag>
<video:tag>is</video:tag>
<video:tag>leading</video:tag>
<video:tag>the</video:tag>
<video:tag>next</video:tag>
<video:tag>era</video:tag>
<video:tag>of</video:tag>
<video:tag>data</video:tag>
<video:tag>security</video:tag>
<video:tag>and</video:tag>
<video:tag>management</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3093/do-cyber-criminals-target-saas-applications/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3093_1682974749_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cohesity: Do Cyber Criminals Target SaaS Applications?]]></video:title>
<video:description><![CDATA[Raj Dutt, SVP Cohesity explains that cybercriminals are attacking SaaS applications just as much as traditional on-prem data but traditional 1st party data protection tools just aren&#039;t capable of protecting the serious investments made in those SaaS a...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3093&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>75</video:duration>
<video:live>no</video:live>
<video:view_count>49</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>cohesity</video:tag>
<video:tag>esg</video:tag>
<video:tag>saas</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3092/3rd-party-data-protection-for-m365-cost-too-much-or-does-it/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3092_1682973161_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cohesity: 3rd Party Data Protection for M365 Costs Too Much. (or Does It?)]]></video:title>
<video:description><![CDATA[In this clip Graham Russell from OwnBackup relays a story about the cost of backing up Salesforce...not measured in dollars per se but in risk, opportunity cost and assured coverage.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3092&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>89</video:duration>
<video:live>no</video:live>
<video:view_count>63</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>cohesity</video:tag>
<video:tag>esg</video:tag>
<video:tag>saas</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3091/salesforce-data-recovery-is-not-a-sure-thing-either/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3091_1682972295_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Salesforce Data Recovery Is Not A Sure Thing Either!]]></video:title>
<video:description><![CDATA[Salesforce backup is not nearly as robust as the application itself. It&#039;s complicated and requires backing up metadata and understanding how the application works. Christophe Bertrand of ESG explains.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3091&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>76</video:duration>
<video:live>no</video:live>
<video:view_count>66</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3090/m365-recoverability-is-not-a-sure-thing/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3090_1682971829_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cohesity: M365 Recoverability is Not a Sure Thing!]]></video:title>
<video:description><![CDATA[Christophe Bertrand, Sr. Research Analyst with ESG has the data that shows though many organizations run M365 far too many have tried to recover data and failed. And the truth is, today, the picture is not that great. Only 1 in 4 organizations can actu...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3090&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>58</video:duration>
<video:live>no</video:live>
<video:view_count>50</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>cohesity</video:tag>
<video:tag>esg</video:tag>
<video:tag>saas</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3089/which-saas-apps-are-considered-mission-critical/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3089_1682971500_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Which SaaS Apps Are Considered Mission Critical? (with Cohesity)]]></video:title>
<video:description><![CDATA[Cohesity and OwnBackup discuss protecting mission critical SaaS apps like M365, Salesforce, Google, Workday and ServiceNow]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3089&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>119</video:duration>
<video:live>no</video:live>
<video:view_count>61</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>cohesity</video:tag>
<video:tag>esg</video:tag>
<video:tag>saas</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3088/the-data-protection-disconnect-it-vs-line-of-business/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3088_1682970695_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Joint Solution for SaaS Backup: OwnBackup &amp; Cohesity ]]></video:title>
<video:description><![CDATA[The Cohesity and OwnBackup joint solution came about because though some SaaS applications have a base level of native data protection capability, consolidating them into a single joint solution can really impact security and governance. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3088&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>92</video:duration>
<video:live>no</video:live>
<video:view_count>57</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>cohesity</video:tag>
<video:tag>esg</video:tag>
<video:tag>saas</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3087/saas-backup-why-mid-market-and-smb-s-just-don-t/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3087_1682970039_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[SaaS Backup: Why Mid-Market and SMB&#039;s Just Don&#039;t]]></video:title>
<video:description><![CDATA[]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3087&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>48</video:duration>
<video:live>no</video:live>
<video:view_count>48</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3086/redis-as-a-vector-database/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3086_1682957841_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Redis as a Vector Database]]></video:title>
<video:description><![CDATA[Learn how you can store vectors inside of Redis to search and create inferences from unstructured data just as you would structured data in any other Redis use case.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3086&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>76</video:duration>
<video:live>no</video:live>
<video:view_count>93</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>redis</video:tag>
<video:tag>explainer</video:tag>
<video:tag>cloud</video:tag>
<video:tag>database</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3085/redis-feature-store-feast-multi-modal-use-cases-roi/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3085_1682957417_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Redis Feature Store (Feast), Multi-Modal Use Cases &amp; ROI]]></video:title>
<video:description><![CDATA[Redis continues to evolve and expand its capabilities beyond its traditional use cases, and its ability to support multi-modal use cases and low latency directly impacts ROI.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3085&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>65</video:duration>
<video:live>no</video:live>
<video:view_count>50</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>redis</video:tag>
<video:tag>explainer</video:tag>
<video:tag>cloud</video:tag>
<video:tag>database</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3084/redis-real-time-analytics/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3084_1682957203_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Redis &amp; Real Time Analytics]]></video:title>
<video:description><![CDATA[Learn how Redis Enterprise Cache can add value to real-time analytics and reporting by extending the JDBC driver and providing connectors with Spark and Kafka.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3084&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>136</video:duration>
<video:live>no</video:live>
<video:view_count>59</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>redis</video:tag>
<video:tag>explainer</video:tag>
<video:tag>cloud</video:tag>
<video:tag>database</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3083/how-can-redis-cache-be-used-for-machine-learning/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3083_1682956778_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Redis Cache to Feed Machine Learning Applications]]></video:title>
<video:description><![CDATA[Learn how Redis can be used to feed real time machine learning models by leveraging both read and write semantics  to ensure high performance.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3083&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>218</video:duration>
<video:live>no</video:live>
<video:view_count>37</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>redis</video:tag>
<video:tag>explainer</video:tag>
<video:tag>cloud</video:tag>
<video:tag>database</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3082/what-does-it-take-to-get-redis-enterprise-into-my-environment/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3082_1682956142_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What does it take to get Redis Enterprise into my environment?]]></video:title>
<video:description><![CDATA[Learn how Redis&#039;s integrated enterprise ecosystem helps remove the technical barriers and reduce visibility costs.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3082&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>37</video:duration>
<video:live>no</video:live>
<video:view_count>40</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>redis</video:tag>
<video:tag>explainer</video:tag>
<video:tag>cloud</video:tag>
<video:tag>database</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3081/how-redis-s-community-can-impact-your-implementation/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3081_1682956009_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How Redis&#039;s Community Can Impact Your Implementation]]></video:title>
<video:description><![CDATA[Redis&#039;s large and vibrant user community has been awarded the most loved database on Stack Overflow five years in a row. It is launched 3 million times a day on Docker Hub and is the most used database on AWS.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3081&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>86</video:duration>
<video:live>no</video:live>
<video:view_count>47</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>redis</video:tag>
<video:tag>explainer</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3080/redis-why-so-many-digital-initiatives-are-doomed-to-fail/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3080_1682955275_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Redis: Why So Many Digital Initiatives Are Doomed to Fail]]></video:title>
<video:description><![CDATA[Redis, as an in-memory database, can assist in replatforming and provide efficient data management to help enterprises prepare for unexpected events and ensure success with digital transformation and initiatives.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3080&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>71</video:duration>
<video:live>no</video:live>
<video:view_count>42</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>redis</video:tag>
<video:tag>explainer</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3079/redis-and-digital-innovation/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3079_1682955013_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Redis and Digital Innovation]]></video:title>
<video:description><![CDATA[In this short clip, learn how Redis helps companies navigate the most volatile applications, competitive factors and business opportunities]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3079&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>56</video:duration>
<video:live>no</video:live>
<video:view_count>50</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>redis</video:tag>
<video:tag>explainer</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3078/what-is-redis-stack/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3078_1682954548_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What is Redis Stack?]]></video:title>
<video:description><![CDATA[In this short clip, learn how Redis Stack consolidates models such as JSON Time series, Bloom filters and their unique SQL like querying and search capability across secondary indexes into a single deployment.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3078&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>42</video:duration>
<video:live>no</video:live>
<video:view_count>74</video:view_count>
<video:publication_date>2023-05-01</video:publication_date>
<video:tag>redis</video:tag>
<video:tag>explainer</video:tag>
<video:tag>cloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3077/cloudflare-s-zerotrust-org/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3077_1682800399_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cloudflare&#039;s ZeroTrustRoadmap.org]]></video:title>
<video:description><![CDATA[Cloudflare offers ZeroTrust Roadmap.org, a vendor-agnostic tool to improve Zero Trust maturity, along with account team assistance.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3077&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>61</video:duration>
<video:live>no</video:live>
<video:view_count>46</video:view_count>
<video:publication_date>2023-04-29</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>security</video:tag>
<video:tag>cloud</video:tag>
<video:tag>overview</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3076/what-is-cloudflaretv/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3076_1682800260_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What is CloudflareTV?]]></video:title>
<video:description><![CDATA[Cloudflare launched CloudflareTV during the pandemic to build community and enhance branding. The platform helped to refine signals, streamline hiring, and received 400K+ applicants.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3076&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>74</video:duration>
<video:live>no</video:live>
<video:view_count>47</video:view_count>
<video:publication_date>2023-04-29</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>security</video:tag>
<video:tag>cloud</video:tag>
<video:tag>overview</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3075/how-is-cloudflare-solving-the-talent-gap/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3075_1682800195_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How is Cloudflare solving the IT talent gap?]]></video:title>
<video:description><![CDATA[Trey Guinn from Cloudflare highlights the importance of a flexible control system to secure remote and in-office workers. A zero-trust approach with user action monitoring is critical for a successful hybrid strategy.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3075&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>86</video:duration>
<video:live>no</video:live>
<video:view_count>76</video:view_count>
<video:publication_date>2023-04-29</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>security</video:tag>
<video:tag>cloud</video:tag>
<video:tag>overview</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3074/what-factors-are-involved-in-talent-acquisition/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3074_1682800157_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What factors are involved in talent acquisition?]]></video:title>
<video:description><![CDATA[Scott Tomtania from Cloudflare emphasizes the challenges of a remote workforce, where CIOs face increasing complexity due to global talent, regulations, and security threats. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3074&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>89</video:duration>
<video:live>no</video:live>
<video:view_count>36</video:view_count>
<video:publication_date>2023-04-29</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3073/how-is-cloudflare-approaching-cios/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3073_1682800121_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How is Cloudflare approaching CIOs?]]></video:title>
<video:description><![CDATA[Cloudflare&#039;s Adi Mukadam emphasizes how secure hybrid work enables CIOs to tackle productivity, omnipresent operations, and security simultaneously, providing a holistic solution.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3073&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>84</video:duration>
<video:live>no</video:live>
<video:view_count>42</video:view_count>
<video:publication_date>2023-04-29</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>security</video:tag>
<video:tag>cloud</video:tag>
<video:tag>overview</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3072/how-has-the-cio-s-role-changed/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3072_1682800082_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How has the CIO&#039;s role changed?]]></video:title>
<video:description><![CDATA[The CIO is no longer just the leader of a technology infrastructure but an, orchestra conductor who is essential to success in a rapidly growing distributed environment.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3072&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>97</video:duration>
<video:live>no</video:live>
<video:view_count>40</video:view_count>
<video:publication_date>2023-04-29</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3071/what-are-the-challenges-of-having-a-remote-workforce/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3071_1682800013_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Cloudflare on the challenges of having a remote workforce]]></video:title>
<video:description><![CDATA[Companies to adapt to the new remote work landscape by developing new authentication and productivity measurement methods and embrace the opportunities presented by remote work to access a wider pool of talent.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3071&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>94</video:duration>
<video:live>no</video:live>
<video:view_count>45</video:view_count>
<video:publication_date>2023-04-29</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>security</video:tag>
<video:tag>cloud</video:tag>
<video:tag>overview</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3070/how-has-it-culture-changed-since-2020/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3070_1682799956_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How has IT culture changed since 2020?]]></video:title>
<video:description><![CDATA[Companies have become more efficient and effective at assessing talent, but this requires finding a more secure way to evaluate candidates. The CIO&#039;s role has become more important in this regard. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3070&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>68</video:duration>
<video:live>no</video:live>
<video:view_count>38</video:view_count>
<video:publication_date>2023-04-29</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3069/how-has-the-talent-shortage-developed/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3069_1682799883_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How has the IT talent shortage developed?]]></video:title>
<video:description><![CDATA[This clip discusses the challenges companies faced in finding talent before and after the pandemic. Before the pandemic, the geographic concentration of talent in metropolitan areas made it difficult for companies to find the right employees. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3069&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>64</video:duration>
<video:live>no</video:live>
<video:view_count>40</video:view_count>
<video:publication_date>2023-04-29</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3068/what-are-you-seeing-in-the-market-today/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3068_1682799797_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[What is Cloudflare seeing in today&#039;s IT talent shortage?]]></video:title>
<video:description><![CDATA[The talent shortage in the US is real. Even if all unemployed people in the US were to find a job today, there would still be 4 million open positions.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3068&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>30</video:duration>
<video:live>no</video:live>
<video:view_count>54</video:view_count>
<video:publication_date>2023-04-29</video:publication_date>
<video:tag>cloudflare</video:tag>
<video:tag>security</video:tag>
<video:tag>cloud</video:tag>
<video:tag>overview</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3066/why-you-aren-t-backing-up-your-saas/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3066_1682969684_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Why You Aren&#039;t Backing Up Your SaaS]]></video:title>
<video:description><![CDATA[The real reasons why most IT shops aren&#039;t backing up their M365, Salesforce, ServiceNow and other SaaS applications.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3066&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>135</video:duration>
<video:live>no</video:live>
<video:view_count>51</video:view_count>
<video:publication_date>2023-04-25</video:publication_date>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3065/do-customers-understand-their-responsibility-in-protecting-saas-data/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3065_1682976783_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Do Customers Understand Their Responsibility in Protecting SaaS Data?]]></video:title>
<video:description><![CDATA[Christophe Bertrand, Sr. Research Analyst with ESG describes their research findings when asking IT professionals if they understood who&#039;s responsibility it is to protect SaaS data. The results are surprising and unsettling.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3065&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>78</video:duration>
<video:live>no</video:live>
<video:view_count>70</video:view_count>
<video:publication_date>2023-04-25</video:publication_date>
<video:tag>cohesity</video:tag>
<video:tag>esg</video:tag>
<video:tag>saas</video:tag>
<video:tag>data</video:tag>
<video:tag>protection</video:tag>
<video:tag>security</video:tag>
<video:tag>backup</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3050/automation-with-infra-as-code-on-terraform/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3050_1681851568_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[OVHcloud: Managing Automation with Infrastructure as Code on Terraform]]></video:title>
<video:description><![CDATA[In this short video, discover how to quickly manage automation with Infra as Code on Terraform.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3050&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>71</video:duration>
<video:view_count>38</video:view_count>
<video:publication_date>2023-04-18</video:publication_date>
<video:tag>ovhcloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3049/create-a-managed-kubernetes-service-on-ovhcloud-public-cloud/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3049_1681851355_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Building a Managed Kubernetes Service on OVHcloud]]></video:title>
<video:description><![CDATA[Learn how to build a managed Kubernetes service on OVHcloud in this short video demo.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3049&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>93</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2023-04-18</video:publication_date>
<video:tag>ovhcloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3046/create-an-openstack-user-on-a-ovhcloud-public-cloud-instance/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3046_1681834361_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Create an OpenStack User on a OVHcloud Public Cloud Instance]]></video:title>
<video:description><![CDATA[This short clip describes how to create an OpenStack user in OVHcloud and gives you the idea of the look and feel of the UI. ]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3046&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>73</video:duration>
<video:view_count>36</video:view_count>
<video:publication_date>2023-04-18</video:publication_date>
<video:tag>ovhcloud</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3038/migrating-from-hyper-v-to-vergeio/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3038_1680900688_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Migrating from Hyper-V to VergeIO]]></video:title>
<video:description><![CDATA[If you want to migrate a VM from Hyper-V to VergeIO, there are some steps you need to follow. Aaron Reed, a Solutions Architect at VergeIO, walks us through the steps to migrate a VM from Hyper-V to VergeIO.]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3038&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>617</video:duration>
<video:view_count>37</video:view_count>
<video:publication_date>2023-04-07</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>demo</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>uci</video:tag>
<video:tag>hci</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3035/the-problem-with-hyper-converged-architecture-w-vergeio/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3035_1680377231_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[The Problem with Hyper-Converged Architecture (w. Verge.io)]]></video:title>
<video:description><![CDATA[In this whiteboard video, George Crump, CMO of Verge.IO takes us through the evolution from SAN to hyper-converged architecture and helps us understand where the benefits are as well as the pitfalls. Part 1 of a multi-part series discussing where this ...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3035&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>303</video:duration>
<video:live>no</video:live>
<video:view_count>50</video:view_count>
<video:publication_date>2023-04-01</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>architecture</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>uci</video:tag>
<video:tag>hci</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3036/ultra-converged-infrastructure-explained/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3036_1680379533_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Verge.io: Ultra-Converged Infrastructure Explained]]></video:title>
<video:description><![CDATA[In this short video, George Crump, CMO of Verge.IO further describes where Verge sits in the compute/storage/network stack and how it manages heterogeneous VMs, storage, compute and GPU nodes. The goal is to be more efficient with a far simpler softwar...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3036&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>244</video:duration>
<video:live>no</video:live>
<video:view_count>47</video:view_count>
<video:publication_date>2023-04-01</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>architecture</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>uci</video:tag>
<video:tag>hci</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3023/how-to-migrate-from-vmware-to-verge-io-virtual-datacenter/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3023_1680471570_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How To Migrate From VMware to Verge.io Virtual Datacenter]]></video:title>
<video:description><![CDATA[See how easy it is to migrate virtual machines from a VMware implementation to Verge.io.www.verge.io]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3023&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>300</video:duration>
<video:view_count>45</video:view_count>
<video:publication_date>2023-03-29</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>demo</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>uci</video:tag>
<video:tag>hci</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3024/how-verge-io-supports-multi-tenant-private-clouds/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3024_1680745987_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[How Verge.io Supports Multi-Tenant Private Clouds]]></video:title>
<video:description><![CDATA[This is a video tutorial of a systems engineer at Verge IO demonstrating how to upgrade a two-node Verge IO cluster. The entire process can be done quickly and efficiently in just a few minutes, includes no downtime and patching/updating is safe and ea...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3024&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>575</video:duration>
<video:view_count>49</video:view_count>
<video:publication_date>2023-03-29</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>demo</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>uci</video:tag>
<video:tag>hci</video:tag>
</video:video>
</url>
<url>
<loc>https://www.truthinit.com/index.php/video/3025/vergeio-how-to-spin-up-a-virtual-datacenter-in-under-20-minutes/</loc>
<video:video>
<video:thumbnail_loc>https://s3.amazonaws.com/truthinit-assets/images/clip_3025_1680471226_thumb.jpg</video:thumbnail_loc>
<video:title><![CDATA[Verge.io: How To Spin Up a Virtual Datacenter in Under 20 Minutes ]]></video:title>
<video:description><![CDATA[Verge.IO explains how to set up a two-node cluster on Dell R620 servers using the Verge IO 4.92 ISO. Each server has two Intel Xeon processors, 128GB of memory, two 10G Base T ports, two 1GB ports, one 2TB PCI, and NVMe for VSAN metadata. They will als...]]></video:description>
<video:player_loc allow_embed="no">https://www.truthinit.com/embed.php?id=3025&amp;embedded=1&amp;autoplay=1</video:player_loc>
<video:duration>1046</video:duration>
<video:view_count>45</video:view_count>
<video:publication_date>2023-03-29</video:publication_date>
<video:tag>verge</video:tag>
<video:tag>demo</video:tag>
<video:tag>vergeio</video:tag>
<video:tag>vmware</video:tag>
<video:tag>uci</video:tag>
<video:tag>hci</video:tag>
</video:video>
</url>
</urlset>