Shelly Kramer (@shellykramer) 's Twitter Profile
Shelly Kramer

@shellykramer

ARInsights' ARchitect Analyst Power 100 tech analyst | principal analyst @KramerandCo. Research #AI #Security #ESG #Collaboration #CX #DX #Cloud

ID: 18460854

linkhttp://kramerand.co calendar_today29-12-2008 21:44:27

231,231K Tweet

93,93K Takipçi

64,64K Takip Edilen

Mark Vena (@markvenatechguy) 's Twitter Profile Photo

My interview with VenHub Global's #ShahanOhanessian about the company's disruptive fully autonomous and #robotic storefront with # innovative #inventory management system...very cool NAMA #TheNamaShow

Evan Kirstel #B2B #TechFluencer (@evankirstel) 's Twitter Profile Photo

"We are building the bridge between models," says @Freepik's CEO. Discover how this 15-year journey transformed from a simple search engine for free images to an AI-powered design platform making creativity accessible to everyone. #AI #GenAI x.com/i/broadcasts/1…

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Ransomware attacks your crown jewels—Active Directory. Commvault just changed the game. Automated forest recovery in minutes, not weeks. Watch to learn more about the innovation: #Cybersecurity #RansomwareProtection #Commvault

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

“Not everything can be fixed—but what matters most must be.” Michelle McLean from Zscaler breaks down a 3-step model for exposure management: 1️⃣ Discovery 2️⃣ Prioritization 3️⃣ Remediation Essential watching for today’s security teams. #VulnerabilityManagement #InfoSec

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Tim Zonca unveils Commvault’s Security IQ — a dashboard giving instant insight into your security gaps and resilience posture. See it in action in the clip below: #CyberResilience #DataProtection #Commvault

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

After an attack, can you trust your recovery point? Most can’t. Tim Zonca of Commvault explains why clean recovery processes are critical—and missing. #Cybersecurity #DisasterRecovery #InfoSec #Commvault

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Phishing is evolving — and GenAI is accelerating the threat. @Zscaler’s 2025 report breaks down how cybercriminals are using AI to scale attacks and bypass defenses. Read the analysis: kramerand.co/zscaler-2025-p…

Phishing is evolving — and GenAI is accelerating the threat. @Zscaler’s 2025 report breaks down how cybercriminals are using AI to scale attacks and bypass defenses.
Read the analysis: kramerand.co/zscaler-2025-p…
Shelly Kramer (@shellykramer) 's Twitter Profile Photo

$14K/min sounds wild—until you live through a breach. One DC lost $1M every 15 mins. Tim Zonca of Commvault breaks down why clean recovery points = critical. #CyberRecovery #DowntimeCosts #Commvault

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

You can’t trust your data mid-attack. Commvault’s threat scan tech uses AI + anomaly detection to flag hidden threats before you recover. #RSAC2025 #CyberThreatDetection #AISecurityTools #Commvault

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Downtime is more than lost ops—it’s regulatory fines, customer churn, brand damage. Commvault’s Tim Zonca unpacks the real risk. If you're a CISO this is a must-watch: #CyberResilience #ReputationalRisk #BusinessContinuity #Commvault

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Cyber resilience isn’t theoretical — Commvault’s Recovery Range proves it. Step inside the immersive experience that’s redefining how orgs prepare for real-world attacks. 🧠 Must-read: kramerand.co/commvaults-rec… #CyberSecurity #Commvault #resilience

Cyber resilience isn’t theoretical — <a href="/Commvault/">Commvault</a>’s Recovery Range proves it. Step inside the immersive experience that’s redefining how orgs prepare for real-world attacks.
🧠 Must-read: kramerand.co/commvaults-rec…
#CyberSecurity #Commvault #resilience
Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Proactive service isn’t just a strategy — it’s a game-changer. Learn how @Telus is flipping the script on customer care with genuine, unscripted outreach and Zoho CRM. #CustomerEngagement #ProactiveService #Telus #ZohoCRM

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Why wait for contract renewals? @Telus is using Zoho CRM to create lasting connections and drive traffic back to stores year-round. Learn how in this short clip: #BusinessTransformation #CustomerEngagement #RetailInnovation #Telus

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Building loyalty isn’t about more touchpoints — it’s about the right ones. @Telus' 48-hour welcome call is proof that human connection drives satisfaction. #CustomerExperience #CRM #BusinessStrategy #Telus

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Schools are under siege. A 224% surge in phishing attacks is no accident—attackers are exploiting digital gaps in education. @Zscaler's Deepen Desai shares more on this new reality: #EducationSector #CyberThreats #Zscaler #SchoolSafety #InfoSec

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Zero Trust isn’t a buzzword—it’s a baseline. @Zscaler's Deepen Desai and I break down why adoption is urgent and budgets are holding strong. ▶️ Watch: youtu.be/PnW9LysTwWs #NetworkSecurity #SecurityBudget #CISO #Zscaler #CyberResilience

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

Phishing emails tailored to appraisal cycles. Malware that adapts. Code that morphs. GenAI is rewriting the cyber threat playbook. @Zscaler’s Deepen Desai breaks down the new threat landscape in this short. #CyberAttacks #AIThreats #Zscaler #Phishing

Shelly Kramer (@shellykramer) 's Twitter Profile Photo

.IBM is no longer the sleeping giant of cybersecurity. At #RSAC2025, it unveiled ATOM—an agentic AI system for autonomous threat response—and predictive threat intelligence tailored by industry. #Cybersecurity #AI #IBM Get the full story: kramerand.co/ibm-emerges-as…