As the national economy gradually re-opens, many employers have vowed to continue offering remote working opportunities to staff that do not need to be in the office to complete their tasks. After scr
Over the past few years, and even as recent as last week, organizations have suffered from ransomware attacks and/or have been affected by data breaches. These attacks have become so frequent that the
Imagine you are being audited or are under a discovery order to present all materials pertaining to a lawsuit. You have well-planned, maintained, and monitored Information Governance (IG) policies and
The Solar Winds cybersecurity attack and the recent zero-day exploit involving Microsoft Exchange servers have exposed vulnerabilities in the IT infrastructure of organizations at every level, from sm
Today, as misconfiguration becomes the greatest security risk to a public cloud IT infrastructure, it is critical that companies take proper preventative actions... View More
Over the years, while customer communications management (CCM) systems continued to expand with new features and capabilities that enhanced the customer experience, security was not always at the top... View More
These days, there’s no shortage of news stories about the latest data breach, which may leave a lot of cybersecurity professionals in a cold sweat more frequently. Furthermore, some of these professionals... View More
In 2019, look for data analytics and artificial intelligence (AI) to become game-changing technologies for the government sector, according to a recent Gartner survey. Government chief information officers... View More
With the General Data Protection Regulation (GDPR) now the law of the land, many companies are realizing that they still have work to do to achieve compliance with the European Union’s expansive... View More
Increasingly, business strategies across many industries are shifting to become more customer-centric than ever. At the same, there is tremendous market consolidation between customer relationship management... View More
At Microsoft Ignite 2018, a reported crowd of 26,000 attendees converged in Orlando, Florida to hear the latest updates from the Redmond-based tech giant, and Microsoft was ready to deliver with five major... View More
Customer management technology firm Glassbox announced the closing of a $25 million round of financing, late last week. This investment by Updata Partners, a Washington, DC-based growth equity firm focused... View More
It's safe to say that blockchain is on the verge of redefining traditional business models, changing paradigms around data security, accountability, and transparency. In fact, the potential to reshape... View More
Ever since the introduction of cloud and cloud services, we have heard the mantra to migrate the enterprise information infrastructure to the cloud. While this may be an attractive idea, there has long... View More
In content management, metadata is used to uniquely identify content objects, improve search, and manage the life cycle of content. In some cases, it can even reference information that is not necessarily... View More
Cybersecurity is getting harder, not easier. So, are you cyber resilient? Here's a look at a recent Ponemon Institute and IBM study on why cybersecurity incidents still pose a major problem for many businesses
IBM this week unveiled their new data science and machine learning platform, displaying their aggressive push to speed up artificial intelligence (AI) adoption at organizations worldwide. The new Cloud... View More
DATAMATX announced it has met the certification requirements as a service provider for the Payment Card Industry Data Security Standard (PCI DSS) version 3.2. In an ongoing effort to respond to cyberattacks... View More
As artificial intelligence (AI) becomes more ingrained into our daily lives, we are starting to do things very differently. According to a recent article, the ... View More
As companies grow, processes and systems that operate well at a certain capacity often cannot keep up with larger demand, which inevitably complicates workflows and slows operations
When we look at evolving customer communications, we often focus on improving the experience by adding new delivery channels, improving content by adding color and variable images based on the audienc
In a world where data breaches are a daily reality, safeguarding critical communications — like bills, invoices and healthcare documents — has become paramount. With sensitive personally identifia
A dashboard that consolidates data from all of your applications and systems into a single view is critical to optimizing performance and avoiding dangers
As companies strive to meet customer expectations, it’s no surprise that communications have become a focus to ensure customer needs are met and that customer experience is seamless across touchpoints