
AUDIENCE 1ST
Join 1700+ cybersecurity marketers and sellers getting deep customer insights and mastering buyer research. Every week, you’ll get distilled and prioritized insights from one buyer interview to help you take better action.
Latest Episodes

What a Modern, Buyer-Centric Approach to Software Market Intelligence Looks Like
Early in my career as a tech marketer, I was told that securing a top-right position in an analyst report was the way to gain credibility. It didn’t take long before I started questioning the whole system. Here's why.


All Episodes

What a Modern, Buyer-Centric Approach to Software Market Intelligence Looks Like
Early in my career as a tech marketer, I was told that securing a top-right position in an analyst report was the way to gain credibility. It didn’t take long before I started questioning the whole system. Here's why.










2025 B2B Marketing Shifts: Insights from the Lens of a Marketer and a CISO
Anthony Johnson, CEO of Delve Risk, and I share our combined 40 years of tech and cybersecurity insights, exploring shifts in B2B sales and marketing—from personal branding and evolving buyer behavior to AI’s growing impact.


Bridging Security and Business: Insights from Onyxia’s 2024 CISO Research
There’s no industry standard for security programs. Until now, many have been operating with ad-hoc KPIs and SLAs, which might have sufficed in the past. But with the introduction of new regulations the game has changed.
