蚕蛹过敏什么办法最快| 来加贝念什么| 毛宁和毛阿敏是什么关系| 梦见蘑菇是什么预兆| 障碍性贫血是什么病| 血压低会出现什么症状| 四月初四是什么节日| 家里停电了打什么电话| 肌肉紧张是什么症状| 海带排骨汤海带什么时候放| 射精出血是什么原因引起的| 医院特需门诊什么意思| 关节镜是什么| 什么是可转债| 琬字五行属什么| 焦虑症吃什么中成药能根治| 宫颈纳氏腺囊肿是什么意思| 胃疼挂什么科| 飞蚊症是什么原因引起的| 艾灸后痒是什么原因| 呈现是什么意思| 6月12日是什么星座| 什么样的人可以通灵| die是什么意思| 竖心旁有什么字| 肌酐高吃什么中药| 男人额头凹陷预示什么| 女方什么人不能送亲| 肺鳞癌是什么意思| 发物都有什么| 什么是动车| 梦见父亲死了是什么意思| 支气管炎有什么症状| 水瓶是什么星座| 乳粉是什么| 伸张正义是什么意思| 牛和什么生肖相冲| 挑拨离间是什么意思| 七月种什么菜| 肺结核传染途径是什么| 985和211有什么区别| 专政是什么意思| 欢子真名叫什么| 手指甲紫色是什么原因| 非甾体是什么意思| 孕早期需要注意什么| 什么样的枫叶| 半什么半什么| 肝硬化是什么意思| 胃溃疡能吃什么| 小儿病毒性感冒吃什么药效果好| 死去活来是什么生肖| 胃复安又叫什么| 世界大战是什么意思| 牙膏尾部的颜色代表什么意思| 遮挡车牌属于什么行为| 猪油不凝固是什么原因| 骨皮质是什么| 味精和鸡精有什么区别| 沉鱼落雁闭月羞花是什么意思| 幽门螺杆菌吃什么药好| 21三体综合征是指什么| 默的部首是什么| 女人为什么会患得患失| 故人是什么意思| dna由什么组成| 什么情况下做冠脉ct| rh因子阳性是什么意思| 糖尿病人吃什么水果最好| sahara是什么牌子| 荔枝有什么作用与功效| ml 什么意思| 11.20是什么星座| 淋巴结发炎挂什么科| 吃完狗肉不能吃什么| ada医学上是什么意思| 低钠有什么症状和危害| 和硕是什么意思| 价值是什么| 嗨体是什么| 见不得别人好是什么心理| 都有什么水果| 什么的天空| 预防老年痴呆吃什么药| 心脏房颤吃什么药好| 动土破土是什么意思| 男性湿热吃什么药最好| 纸老虎比喻什么样的人| 发烧不能吃什么水果| 桃子可以做什么美食| 魂不守舍什么意思| 献血有什么坏处| 不是什么| 马来西亚说什么语言| 高血压吃什么盐比较好| 头孢有什么作用| 柿子不能跟什么一起吃| ft什么意思| 纷扰是什么意思| 梦见和死去的亲人吵架是什么意思| 犯罪心理学属于什么专业| 55年属什么生肖| 女生月经迟迟不来是什么原因| 手指盖空了是什么原因| 打呼噜是什么原因| 饮料喝多了有什么危害| 漱口杯什么材质好| 狼吞虎咽的意思是什么| 腊肠炒什么好吃| 国家发改委主任什么级别| 蜜枣是什么枣做的| 瑶柱是什么东西| 冷鲜肉和新鲜肉有什么区别| hcg低有什么补救的办法| 女生的下面叫什么| 吃洋葱对身体有什么好处| 什么人容易得肺结核| 强的松是什么药| 白炽灯属于什么光源| 微信拉黑和删除有什么区别| 李世民属什么生肖| 为什么一站起来就头晕眼前发黑| 省纪委常委是什么级别| cbs是什么意思| 吃什么补肾最快最好| 涧什么字| 梦到自己拔牙齿是什么预兆| 郑板桥爱画什么| 笑对人生是什么意思| 督察是什么级别| 容易做梦是什么原因引起的| 平常平时叫什么日| 罗嘉良为什么娶苏岩| 脖子红是什么原因| 阴道吹气是什么原因| 失聪什么意思| 乳房结节是什么原因引起的| 胖头鱼又叫什么鱼| 小孩牙龈黑紫色是什么原因| 什么东西不能带上飞机| 慈禧为什么要毒死光绪| 榴莲的寓意是什么意思| 不负众望什么意思| 盆腔积液是什么意思啊| 肝血虚吃什么食物调理| 清明为什么插柳枝| 小孩子发烧吃什么药| 鸭肫是什么部位| 狗肉炖什么好吃| 什么的走| 脚出汗是什么原因| 法兰绒是什么面料| 生肖排第六是什么生肖| 什么是线粒体| 不言而喻的喻是什么意思| 等离子是什么| 十一月十七日是什么星座| 过房是什么意思| jeep是什么牌子| 工作单位是什么意思| 六月初四是什么星座| 凋零是什么意思| sm什么意思| 粉黛是什么意思| 六月八号什么星座| 心梗吃什么药效果好| 营养包是什么| 财大气粗是什么意思| 三个土是什么字怎么读| 鼻窦炎吃什么抗生素| 为什么干红那么难喝| 高压和低压差值在什么范围正常| 右大腿上部疼痛是什么原因| 梦游是什么意思| 血压的低压高是什么原因| 俗不可耐什么意思| 什么时候怀孕几率最高| 地什么人什么| bl小说是什么意思| 美林是什么药| 蛀牙是什么原因引起的| 胸腔积液叩诊什么音| 10个油是什么意思| 狐假虎威是什么意思| 甲减吃什么食物好| 300年前是什么朝代| 子宫附件是什么| 拉风是什么意思| 幼儿园转学需要什么手续| ltp是什么意思| 一只眼睛充血是什么原因| 水牛是什么意思| 流动人口是什么意思| 皇汉是什么意思| 知行合一什么意思| 乙肝三抗体阳性是什么意思| 为什么突然得了荨麻疹| 猫毛过敏吃什么药| 什么叫布病| 下半年有什么节日| 九月九日是什么节日| 喉咙痒吃什么药好| 瑶五行属性是什么| 姓袁女孩叫什么名字好听| 甲状腺查什么| 体脂是什么意思| 必有近忧是什么意思| 骨转移是什么意思| 大地鱼是什么鱼| 调侃是什么意思| 1977年属蛇是什么命| 间作套种是什么意思| 月球表面的坑叫什么| 肠道有息肉有什么症状| 九五至尊是什么生肖| 首台套是什么意思| 黄鼠狼是什么科| 右肋骨下方隐隐疼痛是什么原因| 手机合约版是什么意思| 预包装食品指的是什么| 柳丁是什么水果| 梦见父母是什么意思| 刮痧和拔罐有什么区别| 右手手指头麻木是什么病的前兆| 抽烟对身体有什么危害| 生长纹是什么原因| 大脚趾头疼是什么原因| 乳房长斑点是什么原因| 有什么办法让男人死精| 淋巴滤泡增生是什么意思| 湿疹是什么症状及图片| 玉鸟吃什么饲料好| 咳嗽吃什么药最好| 阻断是什么意思| 睡觉手麻是什么原因引起的女人| 遣返是什么意思| 什么中药能降血压| 胎停了有什么症状| 三伏天是什么时候| 没心没肺是什么意思| 冲任失调是什么意思| mopar是什么牌子| 心烦意乱吃什么药| alpha什么意思| 霍山黄芽属于什么茶| 禁果什么意思| 山竹有什么功效| tvb什么意思| 炉火什么什么| 电销是什么| 为什么会流鼻血什么原因引起的| 白羊座前面是什么星座| 咳嗽完想吐是什么原因| 八仙茶属于什么茶| 94年的属什么| 牛肉可以炒什么菜| 屈膝是什么意思| 胃上火有什么症状| 手指甲有月牙代表什么| 欧尼酱什么意思| bid是什么意思| 菠菜吃多了有什么害处| 恭送是什么意思| 中国姓什么的人最多| 百度

UPDATED 12:51 EDT / APRIL 09 2022

SECURITY

Ripple effects from the Okta security breach are worse than you think

The recent security breach of a third-party supplier to Okta Inc. has been widely reported. The criticisms of Okta’s response have been harsh and the impact on Okta’s value has been obvious: Investors shaved about $6 billion off the company’s market cap during the week the hack was made public.

We believe that Okta’s claim that the customer technical impact was “near zero” may be semantically correct. However, based on customer data, we feel?Okta has a blind spot. There are customer ripple effects that require clear action, which are missed in the company’s public statements.

Okta’s product portfolio remains solid. It is a clear leader in the identity space. But in our view, one part of the long journey back to credibility requires Okta to understand and recognize fully the true scope of this breach on its customers.

In week’s Breaking Analysis, we welcome our?Enterprise Technology Research?colleague Erik Bradley to share new data from the community. In addition, we’ll analyze some of the statements made by Okta Chief Executive Todd McKinnon in an interview with Emily Chang on Bloomberg to see how they align with what customers tell us.

Summary timeline of the Okta breach

On Jan. 20 of this year, Okta got an alert that something was amiss at one of its partners, Sitel Group (Sykes via M&A), which provides low-level contact center support for Okta. The next day, Sitel retained a forensics firm (reported to be Mandiant) to investigate. That investigation was completed on Feb. 28.

A report dated March 10 was created and Okta received a summary of that from Sitel on March 17 — five days later. Lapsus$ posted the infamous screenshots on Telegram and?later that day,?Okta got the full report from Sitel and responded publicly. Then the media frenzy and the back-and-forth ensued.

Okta’s version of the timeline?was posted on March 23. What appeared to be a benign incident in January has turned into a public relations disaster for Okta (and Sitel).

We asked Bradley to comment and he said that “opinions only exist due to a lack of data,” so let’s start with the customer data.

Spending indicators before and after the breach became public

 

Followers of Breaking Analysis know well that each quarter, ETR applies its proprietary Net Score methodology to determine customer spending momentum, essentially measuring the net number of customers spending more on a particular product or platform.?The hack in question occurred about two weeks into the latest ETR survey, as shown on the chart above, and ETR isolated the results to assess spending sentiment before and after the hack. Here’s how Bradley explains the data:

As you know, our motto here is opinions only exist due to a lack of data, so I’m going to start with the data. What we were able to do is because we had a survey that was in the field when the news broke is that we were able to observe the data in real time. So we sequestered the data up until that moment when the breach was announced – so we have data before March 23 and then after March 23. Most of the responses came in prior, so it wasn’t as much of an N as we would’ve liked. But… it really was telling to see the difference of how the survey responses changed from before the breach was announced to after.

So again, let’s caveat. Okta is still a premier company based on our work. They are top five in overall security, not just in their niche, and they still remained extremely strong at the end of the survey. However, when you look at a more micro level, what you notice is a true difference between before March 23 and after. Overall, Okta’s cumulative Net Score or proprietary spending intention score that we use, was 56% prior to the breach. That dropped to 44% during the time period after and that is a significant decline. Even a little bit more telling, and again, small sample size, I want to be very fair about that: Before March 23, only three of our community members indicated any indication of replacing Okta. That number went to eight afterwards. So again, small numbers, but a big difference when you’re talking about a percentage change.

Despite the small N, a drop in Net Score of 56% to 44% pre- and post-publicly announcing the breach is notable. Okta has held an elevated Net Score for years and that type of rapid dip, while coming from a small sample size, is meaningful in our view. Moreover, historically in the ETR surveys, the percentage of customers who indicated they were replacing Okta was consistently in the low single digits.

Listen to Erik Bradley explain the survey data in detail.?

CISO roundtable reveals additional insights

ETR Insights is a panel discussion that Bradley hosts regularly. He conducted a?deep dive on the Okta breach with chief information security officers after the hack was made public to better understand how customers view the situation. The comments below summarize their thoughts.

Participating were some of the top CISOs in the community. The first one is really concerning: “We heard about this in the media.” The next one summarizes the overall sentiment: “Not a huge hit but loss of trust.” And this next one underscores the lock-in factor: “We can’t just shut Okta off like SolarWinds.”

Then there was a reveal that there are customer impacts beyond what Okta has stated: “We may need to hire additional individuals.” Several CISOs indicated procurement would be more involved: “This breach will have a material impact on contract negotiations.” And finally, the majority sentiment that Okta remains a strong solution and customers are comfortable their Okta environment is secure, but Okta needs to regain their trust.

These are really painful comments to hear. At the end of the day, Okta has to own this and Todd McKinnon did acknowledge that in his?Bloomberg interview. But as we stressed earlier, there are domino business impacts of a breach like this that we think Okta may not be seeing and such blind spots will hurt the company’s ability to win back trust.

We asked Erik Bradley to elaborate on what he learned from his panel and other work.

There’s a lot we’re going to need to get into here, and I think you were spot-on earlier, when McKinnon said there was no impact. And that’s not actually true, there’s a lot of peripheral, derivative impact that was brought up in our panel. Before we even did the panel, though, I do want to say we went out quickly to about 20 customers and asked them if they were willing to give an opinion. And it was sort of split down the middle where about half of them were saying, “You know, this is OK. We’re going to stand by ’em, Okta’s the best in the industry.” A few were cautious, “Opinion’s unchanged, but we’re going to take a look deeper.” And then another 40% were just flat-out negative. And again, small sample size, but you don’t want to see that. It’s indicative of reputational damage right away. That’s what led us to say, “You know what, let’s go do this panel.” And as you know, from reading it and looking at the panel, well, a lot of topics were brought up about the derivative impact of the breach. And whether that’s having to hire people to go look into your backend to deal with and manage Okta, whether it’s cyber insurance ramifications down the road, there’s a lot of aspects that need to be discussed about this.

Listen to Bradley’s full commentary on his CISO research.

Okta’s response to our request for comment

Now before we go on, we want to share that we reached out to Okta to let them know we had new data and shared what we learned– specifically that our research indicated they had potential blind spots regarding the business impact to customers and we felt they were understating the customer impact.

Okta was responsive, humble and not defensive. A spokesperson stressed the commitment that the entire organization has to winning back customers’ trust. Here’s the statement they provided to theCUBE.

Our view of this statement is that it stresses the commitment Okta has in winning back its customers’ trust. We would expect nothing less from such a leader. We’ll point out, however, that we have spent decades researching markets, working with customers and observing how technology actually creates value. The vendor community?consistently?underappreciates the degree to which process and people are impacted by certain events such as deployment challenges, technology failures, data loss, disasters, security breaches and other notable incidents.

We believe Okta’s position that the technical impact is near zero and the scope of the breach is limited to a maximum of 366 customers understates the true impact of these events.?

The Okta breach in customer context

The visual below is our attempt to explain how Okta is describing the impact and how we see it from a customer point of view.

The diagram is a simple way in which organizations think about the impact of a breach: What’s the probability of a breach on the vertical axis and what’s the impact on the horizontal? Now Okta has said, the “technical impact” in terms of things customers need to do or change is near zero. That’s represented by the red dot in the bottom left.

The fact is Okta has 15,000-plus customers and at most 366 had data that was potentially exposed by this breach – less than 3% of its base. And it’s probably less than that. And the technical impact, which Todd McKinnon described in his interview with Emily Chang was near zero in terms of actions the customers had to take such as reporting, technical changes and remediation. Basically negligible.

However, based on customer feedback outside the 366 – that’s what we’re calling a blind spot for Okta – there are several actions customers must actively take as a result of this incident.?Despite minimal or no exposure to their data, CISOs must apply resources to analyze and audit the situation, report to their boards, review their policies, assess technical changes that may be required, evaluate insurance costs and changes, communicate to their customers, defend their decision to stay with Okta, evaluate the business case for migrating off Okta and so on. And it’s almost a certainty that many if not most customers will make changes.

We prefer a discussion where business impact?is the key metric, which includes technical changes. As is often the case technology impacts often pale in comparison to the business issues.?So if we replace the horizontal axis with “Business Impact” that red dot moves to a hypothetical position that we’ve superimposed on the diagram – “Real Business Impact.” Reasonable people can debate the position on the horizontal axis, but all 15,000-plus Okta customers are impacted by this event in our view.

Erik Bradley further elaborates on the business impact, including fears from one CISO that the Okta breach was a first step to a broader intrusion:

The panel really brought the business impact to light even more than I expected, to be quite honest. First of all, you’re right, most of them believe that this was a minimal impact. The true damage here was reputational and the derivatives that come from it. We had one panelist say that they now have to go hire people because, and I hate to say this, but Okta isn’t known for their best professional support. So they have to go get people now in to kind of do that themselves and manage that. That’s obviously not the easiest thing to do in this environment. We had other ones express concern about, “Hey, I’m an Okta customer. When I have to do my cyber insurance renewal, is my policy going to go up? Is my premium going to go up?” And it’s not something that they even want to have to handle, but they do. There were a lot of concerns. One particular person didn’t think the impact was minimal, and I just think it’s worth bringing up.

There was no demand for ransom here. So there were only two-and-a-half percent of Okta customers that were hit, but we don’t know what the second play is, right? This could just be stage one. And I think that there was one particular person on the panel who truly believes that could be the case, that this was just the first step. And in his opinion, there wasn’t anything specific about those 366 customers that made him feel like the bad actor was targeting them. So he does believe that this might be a step one of a two-step situation. Now that’s a bit of an alarmist opinion and the rest of the panel didn’t really echo it, but it is something that’s kind of worth bringing up out there.

Listen to Bradley explain the business impacts in detail.?

Unpacking Todd McKinnon’s public statements

We want to evaluate some of Todd McKinnon’s statements from the Bloomberg interview and make some additional points. We’ve always been?impressed with Okta?and McKinnon’s management decisions, execution, leadership – super-impressive individual. Big fan.?And we have to say, in the Emily Chang interview it looked like he hadn’t slept in three weeks – so we feel for him. But we think there are some statements that need to be further evaluated. We’ve highlighted some of them above.

McKinnon took responsibility and talked about how it will be transparent about steps to avoid this in the future. We talked about the near-zero technical impact comments and how that understates the business impact. The two things that struck us as communications misfires were the last two — especially the penultimate statement here: “The competitor product was at fault for this breach.”

By the way, we believe this to be completely true from a technical perspective. Sitel, which acquired Sykes for $2 billion-plus in 2021, was using a legacy identity access platform. We’re all trying to figure out who it was – we can tell you it definitely was not CyberArk and not likely any modern solution. Our issue is you can’t say, “We are responsible” and then later say it was the fault of a competitor. Even if it’s true. Don’t say it later in a conversation after saying, “We own it.”

This was a PR miss in our view and we’ll give McKinnon a mulligan for lack of sleep. But the wording should have been something to the effect of?“Our initial investigation shows that?Sitel was not using Okta for authentication, it was using a legacy platform from a previous acquisition. We’ve taken full responsibility for not ensuring that our partners’ infrastructure was not up to our standards.”?That would demonstrate owning the problem and truly taking accountability.

Now on the last point regarding firing Sitel…. Our first reaction was Okta is throwing its partner Sitel under the bus. Okta is asking for forgiveness from its customers but it just shot Sitel. We?get it – this shows customers they’re taking action. But we would have preferred something like: “We’ve suspended our use of Sitel’s services for the time being pending a more detailed review.?We’ve shut that relationship down for now to block any possible exposures. Our focus at the moment is on customers and reviewing our partner network to ensure their security is up to our standards.”

The reason we prefer this posture is that Sitel can’t be all bad. Okta chose it for a reason. Are all of Okta’s other partners using Otka for identity? This is a tough one, but we think the communications could have conveyed that Okta has stopped the bleeding and we’re all in this together.

Nonetheless, although we fully believe the buck stops with Okta, Sitel must take responsibility for its lack of urgency and transparency. It communicated to Okta what appeared to be a benign attack and perhaps even a false positive. Sitel was slow to release full details to Okta and as a multibillion-dollar company should be held accountable for its security infrastructure and response mechanisms.

Bradley comments on Okta’s crisis management approach.

Okta investors are paying the price

Okta’s stock took a big hit. Initially it didn’t look that bad, but as the week progressed and more information was released the stock got hammered and continues to underperform relative to peers. Pile on inflation, quantitative tightening and rate hikes, and you have a perfect storm. But the real damage is to the trust and reputation that Okta had earned and now has to work hard to earn back.

It’s unfortunate. Okta was founded in 2009 and in over a decade there have been no major incidents. And we’ve seen the damage hackers can do by going after the digital supply chain?and third- and fourth-party providers. Rules on disclosure are still not tight – maybe the new law the House just sent to President Biden will help. The point is Okta is not alone here.?It feels like Okta got what looked like a benign alert, Sitel wasn’t fully forthcoming and Okta is fumbling a bit on the communications. This has all created a spiral effect.

We’ll have to wait for the real near-term and mid-term impacts. Long-term, we believe Okta will be win back the trust of its customers and thrive.?But in the near- to mid-term it will have to sacrifice some margin and go through more pain to regain the loyalty of customers. And we really would like to hear from customers that Okta understands the full extent of this breach and actually does recognize there are impacts beyond the 366 customers that were possibly compromised.

Here are Erik Bradley’s comments on the longer-term impacts to Okta and the reports that the hacker responsible for the breach was a 16-year-old kid living with his mom:

Well, there was a great quote, one of the guys said, “Okta’s built like a tank, but they just gave the keys to a 16-year-old valet.” So he said, “There is some concern here.” Yes, they are best-of-breed, they are the leader, but there is some concern. And every one of the guys I spoke to, all CISOs, said, “This is going to come up at renewal time. At a minimum, this is leverage. I have to ask them to audit their third parties and their partners. I have to bring this up when it comes time.” And then the other one that’s a little bit of a concern is in the survey data. We saw Ping Identity jump big, from 9% Net Score to 24%. Don’t know if it’s causative or correlated, but it did happen.

Another thing to be concerned about out there, is Microsoft is making absolutely massive strides in security. And all four of the panelists said, “Hey, I’ve got an E5 license, why don’t I get the most out of it? I’m at least going to look.” So for Okta to say, you know, “Hey, there’s no impact here,” it’s just not true, there is an impact, they’re saying what they need to say. But there’s more to this, you know, their market cap definitely got hit. But you know, I think over time if the markets stabilize, we could see that recover. It’s a great management team, but they did just open the door for a big, big player like Microsoft. And you and I also both know that there’s a lot of emerging names out there too, that would like to, you know, take a little bit of that share.

Listen to Bradley’s comments on the future outlook for Okta and the possible competitive impacts.

One ironic point regarding Microsoft: It was reported that?Lapsus$ recently hit Microsoft?as well, along with Nvidia Corp. and Samsung Electronics Co. Ltd. Perhaps customers are used to Microsoft being a target or maybe they’re so tied to a broad set of Microsoft services that they shrug something like this off. Okta is a security pure play and as such we think will be held to a higher standard than others. Rightly so.

The bottom line in our view is Okta got blindsided by a less-than-transparent flow of information from its partner. It trusted the partner to secure its environment and that raises many open questions about Okta’s partner ecosystem. Okta has misfired on some of its communications and still in our view doesn’t recognize the full business impact on its customers.?In our opinion, these events will hurt Okta’s pipeline conversions in the near term and it opens the door to competitors. Longer-term, this can all be fixed, and because Okta is so critical, a clear leader and deeply embedded, the negatives will likely subside.

As always, when we get new data that reflects changes, we’ll be here to share it with you.

Keep in touch

Thanks to our colleague Erik Bradley for joining us and sharing his insights. Stephanie Chan researched several topics for these episodes.?Thanks to Alex Myerson on production, who handles the podcasts and media workflows. And special thanks to Kristen Martin and Cheryl Knight, who help us keep our community informed and get the word out, and to Rob Hof, editor in chief at SiliconANGLE.

Remember we publish each week on?Wikibon?and?SiliconANGLE. These episodes are all available as?podcasts wherever you listen. Check out?ETR for the best survey data?in the business.

Email?david.vellante@siliconangle.com, DM?@dvellante on Twitter?and comment on?our LinkedIn posts.

Also, check out this?ETR Tutorial we created, which explains the spending methodology in more detail.?Note:?ETR?is a separate company from Wikibon and SiliconANGLE.?If you would like to cite or republish any of the company’s data, or inquire about its services, please contact ETR at legal@etr.ai.

Here’s the full video analysis:

All statements made regarding companies or securities are strictly beliefs, points of view and opinions held by SiliconANGLE media, Enterprise Technology Research, other guests on theCUBE and guest writers. Such statements are not recommendations by these individuals to buy, sell or hold any security. The content presented does not constitute investment advice and should not be used as the basis for any investment decision. You and only you are responsible for your investment decisions.

Image:?iaremenko

环渤海动力煤价报收606元/吨 环比上行7元/吨

百度 昨天的成功并不代表着今后能够永远成功,过去的辉煌并不意味着未来可以永远辉煌。

Support our open free content by sharing and engaging with our content and community.

Join theCUBE?Alumni Trust Network

Where Technology Leaders Connect, Share Intelligence & Create Opportunities

11.4k+??
CUBE Alumni Network
C-level and Technical
Domain Experts
15M+?
theCUBE
Viewers
Connect with 11,413+ industry leaders from our network of tech and business leaders forming a unique trusted network effect.

SiliconANGLE Media is a recognized leader in digital media innovation serving innovative audiences and brands, bringing together cutting-edge technology, influential content, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — such as those established in Silicon Valley and the New York Stock Exchange (NYSE) — SiliconANGLE Media operates at the intersection of media, technology, and AI. .

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a powerful ecosystem of industry-leading digital media brands, with a reach of 15+ million elite tech professionals. The company’s new, proprietary theCUBE AI Video cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.

属虎的生什么属相的宝宝好 神经衰弱吃什么药效果最好 脚气是什么样的图片 为什么经常口腔溃疡 右下眼皮跳是什么预兆
什么益生菌能减肥 缺铁性贫血吃什么药好 抄送和密送是什么意思 什么水果对皮肤好 绦是什么意思
怀孕几天后有什么反应 跖围是什么意思 鸿字五行属什么 2007年五行属什么 脾胃不好可以吃什么水果
泻盐是什么东西 生孩子送什么 pad是什么 供不应求是什么意思 王加几念什么
electrolux是什么牌子hcv7jop9ns6r.cn 仓鼠能吃什么东西hcv8jop8ns3r.cn 脂蛋白a高吃什么能降下来hcv9jop3ns4r.cn alk是什么意思hcv9jop1ns5r.cn 尿道感染是什么原因引起的hcv9jop4ns6r.cn
白蛋白低是什么原因hcv8jop4ns0r.cn 奔走相告是什么意思wuhaiwuya.com 食用香精是什么hcv9jop1ns5r.cn 乳房疼痛吃什么消炎药hcv8jop9ns0r.cn 菠萝蜜什么季节最好吃hcv9jop4ns5r.cn
发热门诊属于什么科hcv8jop9ns4r.cn 晚上睡觉脚抽筋是什么原因引起的hcv9jop2ns9r.cn 1927年属什么生肖hcv9jop3ns9r.cn 里是什么结构hcv9jop4ns8r.cn 左心房增大是什么原因gysmod.com
胎记长什么样dajiketang.com 梦见怀孕流产是什么意思hcv7jop5ns6r.cn 什么是腔梗hcv8jop3ns7r.cn 什么叫一个周期hcv9jop6ns7r.cn 势在必得是什么意思hcv7jop9ns2r.cn
百度