Over the past few years, and even as recent as last week, organizations have suffered from ransomware attacks and/or have been affected by data breaches. These attacks have become so frequent that the
Imagine you are being audited or are under a discovery order to present all materials pertaining to a lawsuit. You have well-planned, maintained, and monitored Information Governance (IG) policies and
The Solar Winds cybersecurity attack and the recent zero-day exploit involving Microsoft Exchange servers have exposed vulnerabilities in the IT infrastructure of organizations at every level, from sm
Today, as misconfiguration becomes the greatest security risk to a public cloud IT infrastructure, it is critical that companies take proper preventative actions... View More
Over the years, while customer communications management (CCM) systems continued to expand with new features and capabilities that enhanced the customer experience, security was not always at the top... View More
These days, there’s no shortage of news stories about the latest data breach, which may leave a lot of cybersecurity professionals in a cold sweat more frequently. Furthermore, some of these professionals... View More
In 2019, look for data analytics and artificial intelligence (AI) to become game-changing technologies for the government sector, according to a recent Gartner survey. Government chief information officers... View More
With the General Data Protection Regulation (GDPR) now the law of the land, many companies are realizing that they still have work to do to achieve compliance with the European Union’s expansive... View More
Increasingly, business strategies across many industries are shifting to become more customer-centric than ever. At the same, there is tremendous market consolidation between customer relationship management... View More
At Microsoft Ignite 2018, a reported crowd of 26,000 attendees converged in Orlando, Florida to hear the latest updates from the Redmond-based tech giant, and Microsoft was ready to deliver with five major... View More
Customer management technology firm Glassbox announced the closing of a $25 million round of financing, late last week. This investment by Updata Partners, a Washington, DC-based growth equity firm focused... View More
It's safe to say that blockchain is on the verge of redefining traditional business models, changing paradigms around data security, accountability, and transparency. In fact, the potential to reshape... View More
Ever since the introduction of cloud and cloud services, we have heard the mantra to migrate the enterprise information infrastructure to the cloud. While this may be an attractive idea, there has long... View More
In content management, metadata is used to uniquely identify content objects, improve search, and manage the life cycle of content. In some cases, it can even reference information that is not necessarily... View More
Cybersecurity is getting harder, not easier. So, are you cyber resilient? Here's a look at a recent Ponemon Institute and IBM study on why cybersecurity incidents still pose a major problem for many businesses
IBM this week unveiled their new data science and machine learning platform, displaying their aggressive push to speed up artificial intelligence (AI) adoption at organizations worldwide. The new Cloud... View More
DATAMATX announced it has met the certification requirements as a service provider for the Payment Card Industry Data Security Standard (PCI DSS) version 3.2. In an ongoing effort to respond to cyberattacks... View More
As artificial intelligence (AI) becomes more ingrained into our daily lives, we are starting to do things very differently. According to a recent article, the ... View More
One of the biggest challenges in developing a personalized customer communications strategy may not be the lack of customer data but whether the data you have is supporting those efforts—or hurting... View More
Big or small, these changes are incredibly costly and time consuming to implement, hampering agility and efficiency of marketing and customer management teams
To think about AI in terms of previous multiplicative measurements of data growth and tech capability like Moore’s Law is delimiting. Incremental improvements don’t produce breakthroughs
Enterprise content management (ECM) is a strategic approach to managing an organization's information, supporting processes for creating, capturing, delivering and archiving content
As we stand at the forefront of a rapidly changing digital landscape, customer communications management (CCM) is facing a critical inflection point. The way businesses communicate with their customer