- Welcome Guest
- Sign In
Like with any industry, the information security industry, more commonly referred to as "cybersecurity," for all its raging debates, has rallied around a small corpus of best practices ...
Never, in most of our lifetimes, have all corners of society collaborated to address a single grave threat as they have done in the fight against COVID-19. While epidemiological controls compose the first line of defense, technology is growing into a supporting role. So great is the potential for technology to help combat the pandemic that tools are being contributed even from unlikely places...
There has been a lot of debate in the public sphere around the degree and kind of legal regulation a society should apply to online speech. While the dialogue has become more intense and urgent in the last few years, the effort to impose limits on Internet speech has been contentious from the start. At the present juncture, Section 230 of the Communications Decency Act is undergoing reconsideration...
As someone with a nominal presence in the media, I try to stay aware of peoples' attitudes toward it. One common refrain is that, for understandable reasons, people feel worn down by the volume and composition of the media coming at them. ...
By this, the fourth and final entry in this series, you should have a grasp of information security basics. Let's take stock of them before continuing down the rabbit hole ...
If you've followed this series on information security so far (Part 1 and Part 2), you should have a feel for which points in the communication process leave you exposed, and what kinds of tools cover them. ...
The preface to this security guide series, Part 1, outlines the basic elements that comprise a threat model, and offers guidance on creating your own. After evaluating the asset and adversary expressions of the threat model equation, you likely will have determined the danger level of your adversary -- and by extension, the caliber of its tools. ...
At this point, remarking that people now are more concerned about online privacy than ever before is not a novel observation. What's fascinating, though, is that interest in personal digital security has remained high since the issue exploded about seven years ago. In other words, instead of experiencing a short-lived spike, digital privacy awareness has been sustained...
Our roundtable participants were Laura DiDio, principal at ITIC; Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics and current affairs...
Participants in the discussion were Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics and current affairs...
Roundtable participants contributing to the conversation were Laura DiDio, principal at ITIC; Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics and current affairs...
Taking part in the conversation were Laura DiDio, principal at ITIC; Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics and current affairs...
Contributors to the conversation were Laura DiDio, principal at ITIC; Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics and current affairs...
On deck are Laura DiDio, principal at ITIC; Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics and current affairs...
When Linux first emerged from its cocoon in a frenzied Usenet thread, it is doubtful that almost anyone imagined the project would ascend to global prominence. ...
It is newly minted conventional wisdom that not a single information security conference goes by without a presentation about the abysmal state of Internet of Things security. While this is a boon for researchers looking to make a name for themselves, this sorry state of affairs is definitely not beneficial for anyone who owns a connected device ...
It would have been reasonable for those attending Josh Bressers' session at last month'sCypherCon -- myself included -- to expect a presentation by a cryptocurrency expert. It was billed as a talk about plumbing the depths of the bitcoin blockchain. When Bressers admitted that his material grew out of a hobby, I was surprised. Still, the talk was far from disappointing.
A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly positive, and he said as much in his piece and during the subsequent podcast interview.
For those who try to keep their finger on the Linux community's pulse, 2018 was a surprisingly eventful year. Spread over the last 12 months, we've seen various projects in the Linux ecosystem make great strides, as well as suffer their share of stumbles. ...
A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly positive, and he said as much in his piece and during the subsequent podcast interview.
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/05/call-center-team.jpg
https://www.crmbuyer.com/story/playvox-workforce-management-prioritizes-emotional-loyalty-176750.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/01/smartphone-shopping.jpg
https://www.crmbuyer.com/story/messaging-key-to-meeting-changing-cx-preferences-176669.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/07/Sweetwater-store-entrance.jpg
https://www.crmbuyer.com/story/sweetwaters-well-tuned-marketing-is-music-to-shoppers-ears-176751.html
Sweetwater’s Well-Tuned Marketing Is Music to Shoppers’ Ears
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/11/mall-shoppers-crowd.jpg
https://www.crmbuyer.com/story/5-types-of-shoppers-and-what-they-want-for-the-holidays-177187.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/09/virtual-try-on.jpg
https://www.crmbuyer.com/story/vr-platforms-deliver-metaverse-style-experiences-to-online-shopping-176865.html
VR Platforms Deliver Metaverse-Style Experiences to Online Shopping
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/03/customer-data-analysis.jpg
https://www.crmbuyer.com/story/for-better-crm-results-prioritize-pipeline-over-forecast-176709.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/12/holiday-gift-card.jpg
https://www.crmbuyer.com/story/why-quality-e-gifts-are-smart-business-decisions-177207.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/08/handwrytten.jpg
https://www.crmbuyer.com/story/robotic-letter-writing-lends-a-hand-to-personalized-marketing-crm-176595.html
Robotic Letter Writing Lends a Hand to Personalized Marketing, CRM
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/12/business-meeting-ideas.jpg
https://www.crmbuyer.com/story/time-to-bring-back-the-corporate-research-lab-176768.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/11/online-shopping-young-lady.jpg
https://www.crmbuyer.com/story/retail-reality-check-rewards-programs-do-matter-to-consumers-177090.html
Retail Reality Check: Rewards Programs Do Matter to Consumers
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/02/businessman-thinking.jpg
https://www.crmbuyer.com/story/cloudworld-reevaluated-176705.html
Social CRM
See all Social CRM