Executive Guide for Marketing: 3 Models for Digital Transformation

How do you plan on leveraging technology to transform your business to take market share, lower costs and deliver value to shareholders? And how is digital asset management a part of that?

Executive Guide for Marketing: 3 Models for Digital Transformation
Executive Guide for Marketing: 3 Models for Digital Transformation

Our guide to digital transformation will help you develop strategies for inspiring digital ambition at your organization and show you why digital transformation starts with DAM.

Get the guide to learn:

  • How to align digital transformation initiatives to core business ambitions
  • Imperatives for marketing across the three models for digital transformation
  • How self-service solutions like digital asset management are key tech investments that enable digital transformation

Continue reading “Executive Guide for Marketing: 3 Models for Digital Transformation”

Brilliant Experiences, Channel by Channel

To build stronger relationships, brands need to ensure that they’re communicating in ways that speak to each customer as an individual.

Every messaging channel (email, push notifications, in-app messages, and more) serves a different marketing need—making it essential for brands to embrace channel expansion to match the appropriate messaging channel (or combination of channels) to each person’s place in the customer journey.

Brilliant Experiences, Channel by Channel
Brilliant Experiences, Channel by Channel

In this guide, Brilliant Experiences, Channel by Channel, we’ll investigate how you can provide that relevant, personalized experience by arming you with all the Dos and Don’ts for every channel you use to connect with customers, as well as exclusive data on the ideal outreach frequency for each major channel. Read on to get up to speed on:

  • Email
  • Mobile channels (such as SMS, push notifications, and in-app messages)
  • Web channels (such as in-browser messages and web push notifications)
  • Over-the-Top (OTT) messaging
  • And more!

Continue reading “Brilliant Experiences, Channel by Channel”

Doctor On Demand and Virtual Primary Care: What is Virtual Primary Care?

25% of all American adults and 50% of those under 30 years of age don’t have a primary care physician (PCP) and of those with a PCP, only 15% see them at least once per year. Why? The nature of primary care, and of what patients are looking for from PCPs has evolved.

Doctor On Demand and Virtual Primary Care: What is Virtual Primary Care?
Doctor On Demand and Virtual Primary Care: What is Virtual Primary Care?

At Doctor On Demand, we believe the time has come for telemedicine to evolve to address the growing challenges in healthcare. As a result, we introduced Virtual Primary Care to the healthcare ecosystem. How has telemedicine evolved and what is Virtual Primary Care?

Read on this article and learn:

  • What Virtual Primary Care provides that telemedicine does not.
  • The impact that Virtual Primary Care is having on clinical and financial outcomes, as well as the patient and provider experience.
  • How technology facilitates a better patient and physician experience.

Continue reading “Doctor On Demand and Virtual Primary Care: What is Virtual Primary Care?”

Information and Cyber Security News Headline Updated on 23 November 2019

The headline on 23 November 2019

Texas School District Pays Ransomware Demand. The Port Neches-Groves Independent School District in Texas has paid an undisclosed sum in Bitcoin to regain access to their files that were encrypted by ransomware. The district’s director of information services said that as of Monday, November 18, staff had regained access to nearly all files.

Read more in: The Beaumont Enterprise > PN-G pays ransom to regain access to district files

Veterinary Practices Hit with Ransomware. A ransomware attack affected computers at California-based National Veterinary Associates (NVA), causing problems at roughly 400 of the company’s veterinary practices and animal boarding facilities around the world. NVA discovered the attack on October 27 and hired two companies to help with the recovery. The attack affected patient records, payment systems, and office management software. The company did not say if it paid the ransom.

Read more in:
KrebsOnSecurity > Ransomware Bites 400 Veterinary Hospitals
threatpost > 400 Vet Locations Nipped by Ryuk Ransomware

French Hospital’s Computers Infected with Ransomware. A hospital in Rouen, France, was the victim of a ransomware attack that occurred on Friday, November 15. While the 6,000 computers were unavailable, healthcare providers at Centre Hospitalier Universitaire (CHU) resorted to pen and paper. CHU said that the incident has caused “very long delays in care.” According to Le Monde, France’s cybercrime agency ANSSI helped contain the effects of the attack and helped with the recovery.

Read more in:
BBC > Rouen hospital turns to pen and paper after cyber-attack
The Register > Bon sang! French hospital contracts 6,000 PC-locking ransomware infection
Infosecurity Group > French Hospital Crippled by Ransomware
Le Monde > Frappé par une cyberattaque massive, le CHU de Rouen forcé de tourner sans ordinateurs (in French)

DHS and VotingWorks Release Open Source Post Election Audit Tool. The US Department of Homeland Security’s (DHS’s) Cybersecurity and Infrastructure Security Agency (CISA) and VotingWorks have made an open source post election risk-limiting audit tool available on GitHub. Arlo, as the tool is named, “helps election officials complete a statistically valid audit of vote tabulation processes by comparing the votes marked on a random sample of original paper ballots with the electronically recorded votes for those same ballots.”

Read more in:
VotingWorks > Risk-Limiting Audits with Arlo
GitHub > votingworks/arlo
ZDNet > CISA and VotingWorks release open source post-election auditing tool

Critical Flaws in Oracle E-Business Suite. A pair of critical vulnerabilities in Oracle’s E-Business Suite (EBS) could be exploited to print checks and conduct electronic funds transfers. Oracle released fixes for the flaws in its April 2019 Critical Patch Update. The Onapsis researchers that found the flaws and reported them to Oracle in December 2018 estimate that about half of Oracle EBS customers have not yet applied the fixes.

Note:

  • Regression testing of changes to ERP systems is important, and it takes a lot of maturity to roll updates quickly. Due to the critical nature of the flaws, expedited testing is warranted; mitigate some of the risks by actively watching application logs for unauthorized transactions.

Read more in:
DARKReading > Patch ‘Easily Exploitable’ Oracle EBS Flaws ASAP: Onapsis
Bleeping Computer > Thousands of Enterprises At Risk Due to Oracle EBS Critical Flaws
Onapsis > Oracle PAYDAY Attacks Put Thousands of Global Organizations at Risk of Financial Fraud and Theft
Oracle > Oracle Critical Patch Update Advisory – April 2019

New Russian Law Requires Devices Sold Have Russian Software Pre-Installed. Russia’s parliament has passed a law that would prohibit the sale of certain electronic devices that do not have Russian software pre-installed. The law affects smartphones, computers, and smart TVs. Devices made in other countries may be sold with their own software, but the Russian software must be installed as well. While the law has been touted as promoting Russian software and making devices easier to use in that country, some are concerned that the law will increase surveillance.

Editor’s Note

  • This is a complex issue. Back in 1999, China started trying to mandate use of Chinese encryption software and standards in everything and largely backed off. It has now focused on a “Multi Level Procurement Standard” that only imposes domestic Intellectual Property requirements on use cases with higher levels of impact, similar to what the US calls Critical Infrastructure Systems. The US more recently has simply issued bans on software and hardware from Chinese and Russian suppliers for government use, regardless of criticality, while the UK has taken more of a required testing approach. There are no examples of positive outcomes when governments require software from their own countries get installed on commercial products.
  • As John says, this is complicated and will change over time. Expect trade restrictions and interplay with their ISP restrictions to come into play to force the issue.

Read more in:
BBC > Russia bans sale of gadgets without Russian-made software

Microsoft Patches Windows UAC Flaw. As part of its monthly security update for November, Microsoft last week released a fix for a vulnerability in the User Account Control (UAC) feature in Windows Secure Desktop. UAC is a security feature designed to help prevent unauthorized operating system changes. The flaw could be exploited to gain elevated privileges.

Read more in:
threatpost > High-Severity Windows UAC Flaw Enables Privilege Escalation
Zero Day Initiative > Thanksgiving Treat: Easy-as-Pie Windows 7 Secure Desktop Escalation of Privilege

Cleveland Federal Reserve President: Do a Better Job of Sharing Threat Information. Cleveland Federal Reserve President Loretta Mester said that financial organizations need to undergo tests to see how they handle cyberattacks, noting that “Such a test could help evaluate the financial system’s plans for data and core systems recovery and its reliance on third parties to implement that plan.” Mester also said that financial organizations, regulators, and government agencies need to do a better job of collaborating and sharing threat information. Mester spoke at a conference on financial stability hosted by the Cleveland Federal Reserve.

Read more in:
Reuters > Cleveland Fed’s Mester urges regulators to be more agile on cybersecurity risks

NeverQuest Banking Malware Developer Sentenced to Prison. A US District Count Judge has sentenced Stanislav Lisov to four years in prison for his role in creating NeverQuest, malware designed to steal funds from bank accounts. Lisov admitted that he stole more than $880,000 using NeverQuest.

Read more in:
cyberscoop > NeverQuest banking malware administrator sentenced to 4 years
Continue reading “Information and Cyber Security News Headline Updated on 23 November 2019”

Seven Reasons Hazelcast Is the Best Caching Technology

With so many options for caching technologies on the market today, how do you choose the one that’s best for you? You should think about more than the basic features of caches, and consider the expanded capabilities that in-memory systems provide.

Seven Reasons Hazelcast Is the Best Caching Technology
Seven Reasons Hazelcast Is the Best Caching Technology

If you need your applications to run faster, one way to speed them up is to use a data cache. This lets you reduce the bottlenecks associated with the latency of accessing a disk-based store. A cache leverages the speed of random access memory (RAM) for fast accesses to data.

In this article, we will first discuss the baseline capabilities you should expect from caching technologies today. Then we will discuss how Hazelcast offers a set of proven capabilities, beyond what other technologies provide, that make it worth exploring for your caching needs.
Continue reading “Seven Reasons Hazelcast Is the Best Caching Technology”

Why Are Taps Critical to Network Visibility and Security?

Monitor your traffic, don’t disrupt it. Learn how.

Placed between any two network devices, a tap duplicates all traffic on the link and forwards it to your monitoring tools. In this solution brief you will learn how the use of taps optimizes both network and personnel resources without alterations to the content or structure of the data.

Why Are Taps Critical to Network Visibility and Security?
Why Are Taps Critical to Network Visibility and Security?

Taps help IT, groups, easily and passively monitor all network data by providing a way to capture data and remove blind spots. Discover how taps provide continuous, nondisruptive access to the network data you need to monitor performance and troubleshoot problems.

The first building-block to your visibility architecture is access to the data. That comes in one of two forms: a network tap or a switch port analyzer (SPAN) port (also known as port mirroring). But which is the right one? This document should help answer that question. These days, your network is as important to your business as any other item—including your products.

Whether your customers are internal or external, you need a dependable and secure network that grows with your business. Without one, you are dead in the water. IT managers have a nearly impossible job. They must understand, manage, and secure the network all the time against all problems. Anything less than a 100 percent working network is a failure.
Continue reading “Why Are Taps Critical to Network Visibility and Security?”

Biometrics in Telecom: Improving Customer Authentication and Fraud Prevention

Carriers are constantly creating new ways for clients to interact with them that require as little friction and effort as possible, and are increasingly adopting voice and behavioral biometrics.

Biometrics in Telecom: Improving Customer Authentication and Fraud Prevention
Biometrics in Telecom: Improving Customer Authentication and Fraud Prevention

Why, as larger subscriber bases and more devices per subscriber result in more customer interactions, are biometrics a win-win for customers and carriers? Read on this article to find out.
Continue reading “Biometrics in Telecom: Improving Customer Authentication and Fraud Prevention”

Puppet, DevOps and the Path to Better Security and Compliance with Multifaceted IT Automation

More targets, more problems – manual methods won’t cut it in today’s IT landscape.

With complete, real-time visibility into the state of all your systems, security protocols can be consistently enforced. Remediation gets done faster with less need for human intervention. Whether you’re working with containers, traditional VMs, or hardware servers, we believe the best way to manage security is through automation that can facilitate open collaboration between all stakeholders.

Puppet, DevOps and the Path to Better Security and Compliance with Multifaceted IT Automation
Puppet, DevOps and the Path to Better Security and Compliance with Multifaceted IT Automation

The same infrastructure-as-code that is changing the game for DevOps can revolutionize security operations. To learn how this is possible, Read on this article
Continue reading “Puppet, DevOps and the Path to Better Security and Compliance with Multifaceted IT Automation”

Why Enterprise Media Needs to Automate Configuration, Pricing, Quoting (CPQ)

Media companies that have already integrated CPQ with their CRM are seeing sales cycles reduced by 33%, a 49% increase in the number of quotes, proposals, and RFP responses generated, and a 105% increase in deal sizes.

Why Enterprise Media Needs to Automate Configuration, Pricing, Quoting (CPQ)
Why Enterprise Media Needs to Automate Configuration, Pricing, Quoting (CPQ)

In this article, we share how CPQ integration works with CRM and ERP—and how optimal integration ensures a seamless, standardized data flow from opportunity awareness to order delivery.
Continue reading “Why Enterprise Media Needs to Automate Configuration, Pricing, Quoting (CPQ)”