- Welcome Guest
- Sign In
Cybersecurity has been becoming a larger and larger concern for organizations. Nowadays, most organizations -- regardless of size, industry, location, or profit vs. nonprofit status -- find themselves directly or indirectly impacted by cybersecurity. ...
There are times when looking at something narrowly can be more effective than taking a wider and more comprehensive view. If you don't believe me, consider the experience of looking at organisms in a microscope or watching a bird through binoculars. Distractions are minimized, allowing optimal evaluation and analysis of what's under investigation. ...
Every child who's ever played a board game understands that the act of rolling dice yields an unpredictable result. In fact, that's why children's board games use dice in the first place: to ensure a random outcome that is (from a macro point of view, at least) about the same likelihood each time the die is thrown. ...
If you're a technologist, you've probably noticed (or have been asked about) a few new things associated with Chrome 68's release last month. One of the more notable changes is that it now uses a "not secure" indicator for any site not using HTTPS. So instead of providing a notification when a site is HTTPS, it now provides the user with a warning when it isn't. ...
There are times when looking at something narrowly can be more effective than taking a wider and more comprehensive view. If you don't believe me, consider the experience of looking at organisms in a microscope or watching a bird through binoculars. Distractions are minimized, allowing optimal evaluation and analysis of what's under investigation. ...
If you're a cybersecurity practitioner, chances are good that you've heard the term "zero trust" over the past few months. If you attend trade shows, keep current with the trade media headlines, or network with peers and other security pros, you've probably at least heard the term. ...
The security skills gap has become a topic of acute interest among practitioners responsible for building security teams for their organizations -- and keeping them running smoothly. It impacts everything from how they staff, how they cultivate and develop their workforces, and how they train, to the operational controls they put in place, and potentially numerous other things about their security programs. ...
It's a truism that just like organizations adapt, so too do criminals. For example, anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attempt robbing a Brink's truck on horseback? While that strategy might have worked well in the days of the Pony Express, attempting it in now would be out of touch and inefficient...
Those who follow security news may have noticed a disturbing trend. Late last year, we learned that Uber paid attackers US$100,000 to keep under wraps their stealth of the personal information of 50 million Uber riders. More recently, we learned that Hancock Health paid approximately $55,000 in bitcoin to bring hospital systems back online. ...
If you've been keeping up with the news, you've probably noticed a few recent reports about companies that may have been a little less than candid about security issues. For example, we recently learned that Uber experienced a breach in 2016. As we've also learned from subsequent press reports, the company may have paid the attacker to remain silent about that breach instead of acknowledging it publicly and openly. ...
In the security world, there is a truism that defense (protecting systems) is harder than offense (breaking into systems) because it's an asymmetric playing field. The bad guys need only find one path into an environment -- one place where everything hasn't been done exactly "just so" and perfectly -- while those charged with securing that environment need to protect against intrusions everywhere they have a technology footprint. ...
There are times when it seems like technology can work almost too well. Now, if working too well sounds to you like an impossibility -- along the lines of being too rich or too good looking -- reflect that there's more to a technology than end-user experience. ...
Ask any security practitioner about ransomware nowadays, and chances are good you'll get an earful. Recent outbreaks like Petya and WannaCry have left organizations around the world reeling, and statistics show that ransomware is on the rise generally. ...
By this point, most technology practitioners -- and nearly all security practitioners -- know about WannaCry. In fact, you might be sick of people analyzing it, rehashing it, sharing "lessons learned" about it, and otherwise laying out suggestions -- in some cases, contradictory -- about what you might do differently in the future. To the security practitioner, the level of unsolicited advice (frankly) borders on the annoying. ...
If you've ever spent time in a desert, it may seem inconceivable to you that creatures actually can live there. The fact that animals not only survive, but also thrive in those conditions seems counterintuitive. In fact, a number of animals do so -- in many cases, they are aided by an array of specialized adaptations that allow them to leverage the environment to their advantage. ...
It may not be apparent to all observers, but information security practices are undergoing a transformation. For at least a decade, environments have been becoming less perimeter-centric: Gone are the good old days when in-line controls protected the trusted, safe interior from the "wild west" of the outside. ...
There's a folk-story that all Japanese schoolchildren learn about a man called "Gohei Hamaguchi" (sometimes called just "grandfather") who saves his village. In brief, there's an old man who lives in a village by the sea, and one day, an earthquake hits. He's the only person in the village to realize that a tsunami will soon follow. ...
There is an ancient Chinese proverb about a farmer who loses his horse. For those who haven't heard it, the story goes like this: There's an old farmer who lives with his son close to the borderlands. One day, his horse runs away. His neighbors come to console him, but he only says, "how do you know it isn't fortunate?" ...
Have you ever heard of the Cullinan diamond? If you haven't, it was the largest diamond ever discovered: a 3106 carat diamond found in 1905 in South Africa. What's interesting about the Cullinan diamond (at least to me) isn't so much the discovery of the stone itself but what happened afterward: specifically, the cutting of the diamond. ...
Have you ever heard the term "The Forbidden Experiment"? If you're not familiar with it, it's a concept originating in the behavioral sciences relating to challenges in understanding human language development. Specifically, the "experiment" in question refers to actually testing empirically what would happen if a child were raised without language -- i.e., if someone deliberately interfered with normal language development as a vehicle to learn how language development works and how a person might be different without it. ...
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/07/contact-center-agents.jpg
https://www.crmbuyer.com/story/for-crm-ai-advances-more-than-just-contact-center-marketing-goals-177340.html
For CRM, AI Advances More Than Just Contact Center, Marketing Goals
https://www.crmbuyer.com/wp-content/uploads/sites/4/2021/07/online-shopper.jpg
https://www.crmbuyer.com/story/coveo-report-reveals-ai-search-enriches-customer-engagement-177337.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/06/innovative-development.jpg
https://www.crmbuyer.com/story/surefront-unified-toolkit-modernizes-crm-and-retail-management-177319.html
Surefront Unified Toolkit Modernizes CRM and Retail Management
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/04/marketing-creators.jpg
https://www.crmbuyer.com/story/beyond-the-cart-ux-hits-and-misses-can-make-or-break-a-virtual-storefront-177960.html
Beyond the Cart: UX Hits and Misses Can Make or Break a Virtual Storefront
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/11/internet-user.jpg
https://www.crmbuyer.com/story/paradoxical-behavior-makes-consumers-unpredictable-report-178143.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/04/AI-robot-in-business.jpg
https://www.crmbuyer.com/story/how-to-leverage-gen-ai-without-losing-the-corporate-shirt-179123.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/05/call-center-help-desk.jpg
https://www.crmbuyer.com/story/to-deploy-a-better-crm-with-ai-keep-humans-on-the-help-desk-177316.html
To Deploy a Better CRM With AI, Keep Humans on the Help Desk
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/09/AI-gift-shopping.jpg
https://www.crmbuyer.com/story/retailers-turn-to-ai-for-holiday-shopping-season-success-178102.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/08/AI-circuit.jpg
https://www.crmbuyer.com/story/callrail-expands-ai-to-supercharge-crm-lead-intelligence-integration-177339.html
CallRail Expands AI To Supercharge CRM Lead Intelligence Integration