Thu.Jan 23, 2020

Phishing Today, Deepfakes Tomorrow: Training Employees to Spot This Emerging Threat


Read Ian Cruxton explains how to train employees to spot sophisticated phishing attacks on Dark Reading : Deepfake fraud is a new, potentially devastating issue for businesses.

B2B Marketing Should Organize Around The Customer In 2020

Forrester IT

The theme of Forrester’s “Predictions 2020: B2B Marketing And Sales” report was “accelerating response to the great expectations for the B2B buying experience.” The report made five unique calls; one of them was mine: The number of organizations with audience-based structures will more than double. Since we published the report late last year, I’ve had […]. age of the customer B2B marketing organizational design B2B B2B Marketing Predictions 2020

B2B 86

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Apple Dropped iCloud Encryption Plans After FBI Complaint: Report


Apple dropped plans to offer end-to-end encrypted cloud back-ups to its global customer base after the FBI complained, a new report has claimed.

Apple 106

Is It Structure That’s Killing Your Pivot To Customer-Centricity?

Forrester IT

The theme of Forrester’s Predictions 2020: B2B Marketing And Sales report was “Accelerating Response To The Great Expectations For The B2B Buying Experience.” The report made 5 unique calls, one of them was mine: “Thirty percent more marketing organizations will shift toward audience-based structures in 2020.” I’ve had some robust challenges and conversations on that […]. age of the customer

B2B 80

How AI Can Radically Change Your Business

AI is quickly becoming mainstream, thanks to its value-driving capabilities. Yet, even with such widespread attention, it still is one of the most misunderstood technologies out there. Here's how to make the most out of it and bring a positive change to your company.

Why Businesses Should Start Prioritising Cybersecurity


Read Tim Mocan explain why businesses should start prioritizing cybersecurity on Enterprise Times : Do you have £45 million to spare? That’s how much a ransomware attack cost Norsk Hydro in the first quarter of 2019. A total of 22,000 computers had their files forcibly encrypted (made unreadable without a particular key) across 40 countries […].

More Trending

2019 data breach disclosures: 10 more of the biggest


Read Alexander Culafi list 10 of the biggest data breach disclosures of 2019 on Tech Target : The details of these breaches vary widely in terms of how many users were affected as well as how long it took for a company to detect a breach; sometimes not long at all, like with Zynga, and […].

Relieving the Burden of Tax Reporting

Perficient - Digital Transformation

Provisioning for income tax can be a complex process for large multi-national organizations to mid-sized companies with a consistent growth mode. The tax provisioning process involves determining the current tax amounts as well as calculating the deferred roll-forward amount.

Building A Pentest Program To Prevent A Data Breach


It was a simple misconfiguration that doomed Capital One. In March 2019, former Amazon employee Paige Thompson exfiltrated the data of more than 100 million Capital One customers, culminating in one of the year’s worst breaches. Thompson exploited what’s known as a server-side request forgery (SSRF) to access credit applications, Social Security numbers and consumer […].

11 popular IT certifications that make the most money

Tech Republic Cloud

Find out which are in demand worldwide, and which IT cross-certifications are beneficial


Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

Next Evolution of Data Capture Tech Transforms Retail

Information Week

Eye-tracking, facial recognition, sensors, and digital displays gather data that retailers can use to fine-tune their strategies

How to use the new Google Docs Compare feature

Tech Republic Cloud

Learn how to use the Google Docs Compare feature to view the differences between versions of documents

How Credible Are the White House's AI Regulation Principles?

Information Week

What is the Trump administration's real goal in suggesting new national regulations governing the use of artificial intelligence

How to Choose The Best eReader for Your Institution


An eReader is an electronic device that is designed to read eBooks, documents, periodicals and other digital documents. An ideal eReader is generally the size of a paperback with low-resolution and low-glare black and white XD screen, though the colored versions are also available.

eBook 52

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

Top 10 Languages for Artificial Intelligence and Machine Learning

Information Week

Here are the 10 most important programming languages for machine learning and artificial intelligence. -- IT Pro Today

5G promises faster speeds and greater security risks

Tech Republic Security

TechRepublic's Karen Roby talks with Radware exec Mike O'Malley about the growing security risks that accompany 5G for providers, smart cities, and the enterprise

Change-Readiness with Synthesis of Socio-Technical Systems-Perspectives

Future of CIO

We are living in a complex world in which inventions, developments, and conflicts are continuously changing and that makes it impossible to have complete knowledge and understanding of many issues facing the business today.

How to protect previous Firefox tabs from being hijacked

Tech Republic Security

Learn how to secure Firefox tabs from mischief with the Don't Touch My Tabs add-on

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

The Best “Labyrinth” Quotes of “Digital Master” Jan, 2020

Future of CIO

" Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.”

Agile 52

Why many small and midsized businesses remain vulnerable to cyberattack

Tech Republic Security

Budget limitations and a lack of knowledge or training are two major factors hurting many SMBs, according to a survey from Untangle

The Monthly System Wisdom Summary: Are You a System Thinking Master

Future of CIO

Systems Thinking is about understanding interrelationships between parts and the whole.

5G promises faster speeds and greater security risks

Tech Republic Security

TechRepublic's Karen Roby talks with Radware exec Mike O'Malley about the growing security risks that accompany 5G for providers, smart cities, and the enterprise

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

5 Challenges Your Contact Center Could Be Facing In 2020

Spearline Testing

One of the most difficult environments to work in, contact centers can be more than challenging for managers and agents. Between trying to maintain positive support to frustrated customers, budget cuts, technical issues and more, it can sometimes be testing.

Media 52