HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Privacy News & Analysis

Fed Cybersecurity Summit: Assessing Risks, Looking for Solutions

Here’s something to think about the next time your team crafts an email marketing message. "About two thirds of cyber attacks start with an email," said Patrick Peterson, founder and CEO of San Mateo, Calif.-based Agari, a security solutions provider.  

Email is the foundation of digital, added Agari CMO Kevin Cochrane. "And the more we go digital, the more we put ourselves at risk. I think people are just realizing. It's a problem that needs fixing — now," Cochrane said.

In a conversation with CMSWire today from the first ever White House Summit on Cybersecurity and Consumer Protection on the Stanford University campus, Peterson and Cochrane said it was time to acknowledge the potential risks of the Digital Age.

While Peterson cautioned that there was no reason to panic about the growing threats of cybercrime, he stressed that it was time to face facts, accept reality and "be mindful" about potential dangers.

"In a digital, connected world full of stronger and stronger adversaries, the risks are extreme," he said. One of the biggest risks, he added, is a collective loss of trust in the digital economy.

Better Safe than Sorry: Protecting Online Identity

Anyone who's made a purchase -- whether in-store or online -- within the last few years knows that providing an email address has become a standard part of doing business in the United States.

Google, EU on Collision Course Over So-Called Right to Forget

A Google advisory panel has concluded that people have the right to be forgotten — or, more accurately, a right not to be mentioned in search anymore. But it contends that right should only apply in the European Union, not across Google's wider global search.

The report is latest in an ongoing debate between Google and the European Union (EU) over an individual's right to remove or delist certain information. Last May, the European Court of Justice Ruling ordered Google to remove links to personal information from search results leading to personal information on an individual in Spain.

The ruling has been widely, albeit inaccurately, referred to as creating a “Right to be Forgotten."

In the aftermath of the ruling, Google convened an independent panel to advise it on performing "the balancing act between an individual’s right to privacy and the public’s interest in access to information." The findings are based in part on a series of public consultations across Europe.

The Value Exchange Equation is Shifting

2015-27-January-Trading-Post.jpg

Marketers are hungry for customer data. Every piece of information about a customer and their interactions with a brand helps marketers create complete customer profiles and guide the ultimate strategy behind the sell. From methodically timing each touchpoint with a potential lead, to personalizing digital content on a website to show each unique visitor what they’d most like to see, the link between data and marketing decisions is undeniable.

But this data isn't always readily available, and customers are hesitant to provide brands with the personal information needed to create this free exchange of profiling and personalizing. The reason is simple -- customers don’t see the value in sharing data.

One Happy Family: Marketing, Messaging Apps and the IoT

2015-20-January-bankok-transit.jpg

Marketing and creativity has typically gone hand-in-hand. But many of the marketing folks I know are also innovative — and strike me as far more Silicon Valley than Madison Avenue. 

There's no argument that marketing departments want to get their messages in front of as many people as possible. But they have to be the right people or the whole effort could be a loss. That's where innovation comes in: marketers are always looking for unique ways to share their messages. 

As a child, TV was the primary medium by which I was exposed to marketing and advertising. Then the web came along.

The web slowly and methodically changed everything about advertising and marketing. Once it took hold, we were off to the races. The web gave marketers a new way to get their messages out to ever more targeted audiences and has allowed companies to become far more engaged with their customers — or, even better, potential customers.

A Look Back: 6 Internet of Things Trends from 2014

2014-25-December-look-back-3.jpg

2014 has lit up with a flurry of new products, developments and focus on how businesses can use the Internet of Things (IoT) to improve business processes and the customer experience.

But wait. IoT isn’t exactly the new kid on the block, so why so much activity this year? Michele Pelino, a Forrester Research principal analyst, attributed the rising interest to a dip in communication fees and sensor costs.

“Sensors and microprocessors that once cost hundreds of dollars are now available for as little as the cost of a cup of coffee,” she said. “Communication costs are also experiencing similar declines, with many wireless operators cutting fees to pennies per month per meter for the cellular link to support smart meters. On the other hand, expanding network availability in mature markets has enabled solution deployment.”

A long way from connected toasters and vending machines, experts predict that IoT will become a $1.9 trillion (Gartner), $7.1 trillion (IDC) or $19 trillion (Cisco) market, depending on which source you believe.

The IoT Challenge: Protecting Privacy in a Connected World

2014-01-December-connected.jpg

Just thinking about the Internet of Things (IoT) can make your head spin. Through sensors and pervasive connectivity, we open ourselves to a wide range of ideas that can improve our daily activities and add a much richer context to just about everything we do … if we let them.

Privacy, without a doubt, is the biggest area of concern about the IoT.

It's not uncommon to hear terms like Big Brother or 1984 pop up in conversation when the topic comes up, and, in many respects, that is understandable. Many people are naturally spooked by the idea of technology that can track where we go, what we buy, what we eat and how much we move around. And that’s just scratching the surface.

Add some data analytics into the mix and start talking predictive modeling and the potential of the IoT opens the door to the plot of a high tech horror movie.

IT Pros Warm Up to Open Source Collaboration Software

IT security professionals like the idea of open-source collaborating and messaging solutions. So where the heck are they?

Respondents in a Ponemon Institute study released this week are generally positive about commercial open source applications, especially because of the assurance of continuity. However, despite those benefits, companies are slow to adopt, Ponemon found. 

Zimbra, a provider of open source collaboration software, sponsored the survey of 723 IT and IT security practitioners in the United States and 675 IT and IT security practitioners in 18 Europe, the Middle East and Africa (EMEA).

Thanks Google, I Can Manage My Own Bills - and Privacy

Google releases some pretty cool apps on a regular basis. But, it just doesn’t seem to get the whole privacy thing. This week, it announced that it is extending its Google Now personal assistant technology to enable it read your bills — and tell you when they’re overdue.

The first thing that will strike most people is that they don’t really need anyone to tell me when they owe money. It's a sure bet that they are painfully aware of that themselves.

The second thing is privacy. Google has already admitted that it snoops on your emails to produce personalized advertising. Why would it want to look at your bills?

Lose Your Customers' Personal Information, Lose Everything

The customer information your organization collects and analyzes can give you incredibly detailed and useful insights. But for all the advantages this storehouse of data can bring, it can also bring significant risks.

Anytime you collect information about your customers, you run the risk of exposing personally identifiable information. That can not only raise your customers' ire, but may cause your organization to run afoul of security breach laws.

How can you protect your organization? Is it enough to have a well-written privacy policy — and try to follow the rules?

Is Microsoft the Caped Crusader of Email Privacy?

2014-2-September-batman.jpg

Jumpin' Jehoshaphat, Batman! Looks like Microsoft is defending email privacy. This, after it confirmed over the weekend that it would not be handing over email data to US federal regulators.

The decision follows a ruling on Friday by a US judge, which instructed the company to turn over email stored in Ireland to US prosecutors. But Microsoft does not plan to turn over the emails, and plans to appeal, a company spokesperson said.

Microsoft Secures Azure Data with Enhanced Encryption

2014-12-August-windows-azure.jpg

Microsoft — like Google — is beating the drum on security. It is enhancing the encryption of data transfers between users and the Azure cloud guest operating systems. 

The encryption improvements, which apply to Microsoft Azure cipher solution for hosted guest virtual machines, gives users better and more secure connections during the transmission of data.

According to a Microsoft blog post the new enhancements apply to the Transport Layer Security (TLS) and Secure Socket Layer (SSL), which makes it harder to decrypt connections and information going across such connections.

This follows  recent moves by Google to secure and encrypt emails. In the coming weeks, it announced that it will publishing a list of best practices in the coming weeks to make Transport Layer Security (TLS) adoption easier and to avoid common mistakes.

Yep, Facebook Generates a Lot of Hate

2014-13-August-ambivalent-cat.jpg

Let's face it, social media networks are annoying ... but we can't live without them.

Especially Facebook. The controversy around the social media giant's re-launch of Facebook Messenger has once again stirred up a nest of privacy concerns.

Like all social networks, Facebook has benefits and warts. The benefit is that it is sublimely designed, it works very well, its got a gigantic user base (including most of your friends) and its got a world-class team constantly refining and tweaking it.

The downside is that Facebook is an immensely commercial operation and it doesn't seem to care too much about your privacy. This is not Craigslist. Let's face it: Facebook is chronicling every subtle activity in your life in a gigantic database so it can cash in on your life. 

Google and Yahoo Ally to Keep Email Snoopers Out

Thumbnail image for Google Secures Gmail  June 6 2014.jpgGoogle and Yahoo are unlikely bedfellows. But yesterday at the annual Black Hat security conference the two announced they were teaming up to keep government and commercial snoopers out of users’ emails.

By 2015, the two promise that not only will it be near impossible to hack or view either Yahoo mail or Gmail, it will also be possible to encrypt emails between Yahoo and Gmail, accounting for a huge amount of email traffic across the Web.

This follows yesterday’s announcement from Google that it will be giving secure websites higher search rankings

What's Behind Google's Encryption Moves

As part of the growing movement toward encrypting web data, Google announced this week that it will boost the search status of web sites that use HTTPS (Hypertext Transfer Protocol Secure) to encrypt data, shedding more light on its own motivations to lock and further anonymize  the web.

Displaying 1-15 of 188 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next >