WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > SiriusDecisions
Q&A with Jay Gaines, CMO at Forrester
Conference
SiriusDecisions | May 30, 2018
SiriusDecisions since around the time when Rich Eldh and John Neeson gave birth to the company. I’ve found their frameworks especially useful in helping focus my teams’ actions and report on the value of our contributions. Perhaps you’ve found the same. For many years, the SiriusDecisions Demand Waterfall has been used as the standard framework for managing demand generation processes. The beauty of the original Demand Waterfall was its clarity and simplicity. Built as a useful...
SiriusDecisions | March 30, 2018
The ROI Awards are designed to honor companies who excel in product development, marketing and sales through the use of SiriusDecisions’ research, frameworks and best practices. This year’s winners include: Cisco for its next-generation, blended approach to the engagement and retention of both partners and customers.Huron Consulting Group for centralizing marketing sales resources, revamping company branding and positioning and developing cross-functional processes.Illumina for creat...
SiriusDecisions | July 10, 2017
SiriusDecisions has expanded its core industry benchmark database, the SiriusIndex™, the only one of its kind in the b-to-b industry, with new metrics across four major categories, including readiness, activity, output and results, and offered its clients unparalleled access to data from their peers with the introduction of its new Command Center™ platform. Now commercially available, it will enable business leaders to drive strategic and tactical changes informed by insights, best-i...
abc6onyourside | January 15, 2020
A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...
Article
Enterprise Security, Platform Security, Software Security
infographic
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE