Search

Results 1-20 of 42083 for .

Why Web-Based Businesses Should Automate Their Content Security Policy

By continually crawling a website and acting like an actual user, an automated CSP approach can effectively evaluate scripts, data and what they’re doing — all before it’s too late.

Security Pros Lured to Bug Bounties by Big Pay Days

As criminal activity on the internet continues to accelerate, bug hunting for cash has begun to attract more and more security researchers. In its latest annual report, bug bounty platform Intigriti revealed that the number of analysts signing up for its services has increased 43% from April 2021 to...

Digital Devices of Corporate Brass Ripe for Hacker Attacks

Digital devices and home networks of corporate executives, board members and high-value employees with access to financial, confidential and proprietary information are ripe targets for malicious actors, according to a study released Tuesday by a cybersecurity services firm. The connected home is a ...

cryptocurrency wallet
EXCLUSIVE INTERVIEW

Cryptocurrency Custody Concerns: Who Holds the Digital Storage Keys?

Got Crypto? Make sure you own and have access to it in a secure digital stronghold. Having self-custody of your crypto keys and managing your digital assets can help stave off digital bankruptcy or loss through theft.

Attacks on Cloud Service Providers Down 25% During First 4 Months of 2022

New research from Atlas VPN shows that cloud-native exploits on major cloud service providers (CSPs) declined during the first four months of 2022. Cloud-native exploits dropped by 25%, from 71 exploits in the first four months of 2021 to 53 exploits in the first four months of this year, Atlas rese...

Buyer Personas: Digital Marketing’s Secret Sauce

Buyer personas — also known as customer, audience, or marketing personas — although fictional, rely on research-based insights collected from prospective customers.

How To Tackle Mobile Ad Fraud Before It Destroys Your Brand

The surge in mobile ad spending in addition to device usage has led to a wave of criminal activity called mobile ad fraud. Let’s talk about exactly what mobile ad fraud is, the various types of mobile ad fraud to look out for, and three ways to help prevent mobile ad fraud from taking place at you...

OPINION

With Sheryl Sandberg Gone, Does Meta Grow Up, or Die?

What does it mean for Facebook when the adult leaves the table, and the unprepared CEO then has nothing to turn him toward a less risky path? Let’s discuss that this week.

Why the Real Estate Industry Should Embrace the Cloud

Not every industry has kept up with the evolution of cloud technologies brought forth by digital transformation. A prime example is the real estate industry. Overall, the real estate sector has been slow to digitize operations and move to the cloud; leaving agents, brokers and their clients underser...

Lax Cyber Skills, Dev Blind Spots Behind Organizations’ AppSec Breakdowns

Government organizations and educational institutions, in particular, are increasingly in hackers’ crosshairs as severe web vulnerabilities spiral upward. Remote code execution (RCE), cross-site scripting (XSS), and SQL injection (SQLi) are all top software offenders. All three increase or hov...

EXCLUSIVE INTERVIEW

The Business Case for Clean Data and Governance Planning

Is your company's data is clean and well managed? Why does that matter anyway? Ataccama VP David Kolinek discusses the challenges and solutions related to the formal management of data assets within an organization.

Netenrich Introduces AI/ML Platform for Cloud Security

The security and operations analytics SaaS company hopes to disrupt legacy security ops with an artificial intelligence-driven approach to security operations built into its Resolution Intelligence platform.

Marketers: Beware Florida’s Mini-TCPA

The state of Florida has amended its Telemarketing Act, creating what is being called the “Mini-TCPA.” Florida’s new law changes electronic and telemarketing in significant ways — even if you’re not in Florida.

Hackers Cast LinkedIn as Most-Popular Phishing Spot

The social media platform for professionals was in the crosshairs of 52 percent of all phishing scams globally in the first quarter of 2022. This is the first time that hackers leveraged LinkedIn more often than any tech giant brand name like Apple, Google, and Microsoft.

VENDOR WATCH

Zoho Consolidates Marketing Functions

Zoho Marketing Plus is an attempt to bring things back into focus so that SMBs can do the same things in marketing that larger companies do with more labor. You might call this the second democratization of information.

Open Source Leaders Push WH for Security Action

The Linux Foundation and the Open Source Software Security Foundation brought together over 90 executives from 37 companies and government leaders from the NSC, ONCD, CISA, NIST, DOE, and OMB to reach a consensus on key actions to take to improve the resiliency and security of open-source software.

E-Commerce Fulfillment Gains Driving Global, Channel Expansion

E-commerce expansion can take several paths based on finding new sales channels and reaching new or less saturated consumer bases globally. Optimizing shipping and fulfillment strategies as businesses scale can further streamline inventory management while meeting customers where they are.

Cloud Providers Push Products, Tactics, To Win Customers in Competitive Market

In the current cross-industry scamper among enterprises migrating to clouds, no clear winners have yet to emerge in the race for market share among the hyperscale public cloud providers. Automated cloud migration company Next Pathway on April 20 unveiled a new report with key data on the overall sta...

Third-Party Risk Could Cost E-Commerce Sites Millions

Plugins or other software dependencies can inadvertently or maliciously introduce vulnerabilities or data leaks that can expose e-commerce site users to risk.

Sports Betting Platforms Gambling With Substandard CX

Online gambling is at an all-time high in accessibility and popularity. But many betting app developers are rolling the dice blindly without addressing users’ customer experience concerns.

E-Commerce Times Channels