Conversational commerce is the process of interacting with a brand or buying a product or service through non-traditional channels, such as voice assistants, SMS text and online and social media chat.
Quote of the Day
“Improved AI and natural language processing also will help bring voice commerce into B2B and B2C spaces, simply by improving the capabilities and easing the process.” – Jesse Scardina
CX strategy a vital part of modernizing a business
Organizations need to pay attention to CX strategy and improving the employee experience to provide convenient shopping experiences that today’s customers expect.
Voice commerce rides on the backs of little smart speakers
As consumers get comfortable with the many aspects of emerging voice commerce, businesses are beginning to find ways to integrate voice assistants not only into the buying process, but also to assist employees with their job.
CRM vs. CX: How companies are pivoting in philosophies
In the shift between CRM vs. CX, businesses begin to change practices, focusing on personalized customer experiences rather than straightforward business transactions.
How AI in e-commerce makes vendors more responsive to customers
Retailers are embracing AI in e-commerce as a way to make their outreach and offerings more personalized and relevant to their customers, but there’s still lots of room for growth.
Clicks-and-bricks one-up online companies with behavioral data
Clicks-and-bricks banks and retailers face deep cost disadvantages battling digital-only competitors. Their secret weapon: customer behavioral data gleaned from their physical stores to build more realistic online customer experiences.
In the future, marketers won’t ask for consumers’ __________ just read their minds.
a. opinions: They’ll
b. opinions, they’ll
A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time, but because of the nature of the device or system, the operations must be done in the proper sequence to be done correctly.
Quote of the Day
“Race conditions are notoriously difficult to find, reproduce and debug. They are usually only found by accident when a system becomes overloaded in a manner unforeseen by the programmer.” – Michael Cobb
How were Android Pixel vulnerabilities exploited?
Android Pixel vulnerabilities enabled the smartphone to be hacked last year. Here’s a look at how someone was able to bypass the phone’s security and what can be done about it.
What went wrong with the Dirty COW vulnerability patch?
The Dirty COW vulnerability was patched, but researchers discovered issues with the patch. Here’s a look at what went wrong and what users should do.
Static code analyzer tests for dangerous race conditions
The Coverty Prevent SQS static code analyzer helps developers identify race conditions and other concurrency defects in multi-threaded applications earlier in the development cycle.
How can the Dirty COW vulnerability be used to attack Android devices?
The Dirty COW vulnerability, which remained hidden for nine years, allows attackers to gain root access to Android devices. Find out how this attack works.
How can a directory traversal attack be mitigated?
New research showed AirDrop-enabled devices are vulnerable to a directory traversal attack. Here’s what the threat means for enterprise security teams.
Exploit kits allow non-technical threat actors to do ____ of damage.
A. a lot
Have I Been Pwned (HIBP) is a website that allows users to search and find out if an email address’s password has been compromised by data breaches.
Quote of the Day
“Using Have I Been Pwned? as a tool to increase your situational awareness on the status of current major breaches is an added way to keep yourself and your organization safe.” – Matt Pascucci
Collection #1 breach data includes 773 million unique emails
A new trove of 773 million unique emails — known as the Collection #1 breach data — gathered from various data breaches were added to Have I Been Pwned, but there are questions about the freshness of the data.
Have I Been Pwned integration comes to Firefox and 1Password
Both Firefox and 1Password announced new Have I Been Pwned integration to help users discover if email addresses have been compromised in known data breaches without disclosing personal information.
Firefox Monitor offers breach alerts on visited websites
Mozilla has begun rolling out a new feature of Firefox Monitor, which will provide breach alerts when a user visits a recently compromised website, based on data provided by Have I Been Pwned.
Risk & Repeat: Who’s to blame for bad passwords?
This Risk & Repeat podcast examines a recent Twitter debate between Duo Security’s Wendy Nather and Troy Hunt, owner of Have I Been Pwned, over bad passwords. Are users who create and reuse weak passwords mostly to blame or are the technical systems that allow the behavior the primary cause?
How should security teams handle the Onliner spambot leak?
Expert Matt Pascucci explains what actions enterprises should take after a list of 711 million user credentials was stolen by the Onliner spambot.
The credit union website uses two-factor authentication to protect _____ members.
Amazon Aurora is a relational database engine from Amazon Web Services.
Quote of the Day
“Aurora handles many of the granular, low-level tasks needed to deploy a database, such as provisioning, setup, patching and backup.” – Stephen J. Bigelow
Follow these steps for an Oracle-to-AWS migration
Many organizations have considered an Oracle-to-AWS migration to reduce overhead. Review the steps needed for a successful move to Amazon’s cloud, and discover which option is the best fit for your organization, from EC2 to Aurora.
AWS, MongoDB database collision stirs open source tensions
Amazon DocumentDB serves as a competitive broadside against the MongoDB database and fuels the debate around open source software licensing.
RDS on VMware extends AWS’ hybrid strategy
RDS on VMware is only available in a public preview, but users can still examine its features before it goes GA and identify if the service will be the proper match for their hybrid workloads.
Amazon Aurora Parallel Query blurs database lines
The Amazon Aurora Parallel Query feature adds analytical capabilities to a transactional database. It could make the managed service more attractive, as long as AWS doesn’t overlook the need to also improve the core database functionality enterprises require.
Perform an Amazon RDS failover with minimal downtime
Multi-availability-zone deployments are the bread and butter for most AWS users, but what happens in the Amazon RDS failover process? Walk through this example using the Amazon Aurora engine to learn more.
The AWS portfolio ______ more than 100 services, including those for compute, databases, infrastructure management, application development and security.
Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity. Continue reading…
Quote of the Day
“The goal of software-defined perimeter is to remove internet-connected devices and applications from public visibility and reduce the surface area for attack.” – Lee Doyle
What is a software-defined perimeter, and do I need it?
A software-defined perimeter improves enterprise security by making users and devices invisible to outside attacks. Discover the basics of SDP and learn how it can alleviate common security challenges.
Next-gen automotive cybersecurity with software-defined perimeter and blockchain
Combining a software-defined perimeter with blockchain is an ideal way to secure autonomous vehicles. Movimento Group’s Mahbubul Alam explains.
How has software-defined networking security evolved?
Microsegmentation is a vital component of software-defined networking security, and network analytics are tagging along for the ride as well. But SDN can be applied to other security missions like security DMZs and network monitoring.
Software-defined networking security involves 3 factors
When it comes to software-defined networking security, IT teams can cover their backs by addressing three main points: confidentiality, integrity and availability. They should also take the time to consider compliance requirements.
How to improve IoT security and resilience with SD-WAN and SDP
For IoT to move from consumer curiosity to industry workhorse, organizations need confidence in the availability and performance of IoT architectures. Cato Networks’ Gur Shatz explains how SD-WAN and SDP can help achieve this.
The Cloud Security Alliance (CSA) has worked with European officials to support implementation of the _____ privacy and related data use laws and regulations.
Red teaming is the practice of rigorously challenging plans, policies, systems and assumptions by adopting an adversarial approach.
Quote of the Day
“Red teams must use a no holds barred approach to validate the posture and security of your organization and the assets that are important to your business.” – Matthew Pascucci
How to mitigate risks caused by supply chain software
As cybersecurity attacks on supply chain software become more widespread, organizations must determine whether their software is secure and evaluate the risks by performing penetration testing, red teaming and risk assessments.
BT Security CEO: Red teaming is valuable, but challenging
At MIT’s Computer Science and Artificial Intelligence Laboratory conference, Securing the Enterprise, BT Security CEO Mark Hughes talked about the importance of red teaming and why it’s hard to make the most out of your cybersecurity investments.
Red team assessments and post-assessment posture improvement
With the use of red team assessments on the rise, knowing the difference between red teaming and penetration testing is crucial, especially when assessing an organization’s security maturity. Discover the difference with expert Matt Pascucci.
White hat Dave Kennedy on purple teaming, penetration testing
In this Q&A, Marcus Ranum discusses breaking and entering with renowned white hat hacker Dave Kennedy. What is purple teaming, and where does it fall on the security test spectrum? Kennedy talks about how collaboration works to shorten the time between detection and protection.
Penetration testing, ethical hacking and vulnerability assessments news, help and research
Learn how to conduct a vulnerability assessment with security testing and ethical hacking and get information on penetration testing tools and techniques.
Ethical hacking is similar to penetration testing, intrusion _________________.
a. testing, and red teaming
b. testing and red teaming
Hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms. Continue reading…
Quote of the Day
“Implement a hybrid cloud piece by piece: Start with a limited deployment, address specific workload goals by adding capabilities and then build it out as each success demonstrates value.” – Nick Moore
Hybrid cloud trends offer lessons for potential adopters
Hybrid cloud trends are garnering more attention, and IT administrators who want to adopt the technology should use these tips to prepare for hybrid cloud deployment and migration. A need for workload flexibility drives most hybrid cloud use cases, but admins must carefully plan their approach.
Hybrid cloud vs. multi-cloud storage: Choose wisely
In the hybrid cloud vs. multi-cloud storage debate, both methods come with their own benefits. In this tip, we offered some assistance in making the right choice for your organization.
Hybrid cloud technologies become table stakes in IaaS market
AWS, Azure and Google had their sights set on hybrid cloud technologies in 2018. And with a shift in focus to on-premises appliances, such as AWS Outpost, as well as software, like Google Cloud Services Platform, experts expect more hybrid moves in 2019.
What’s the difference between multi-cloud vs. hybrid cloud strategies?
What’s the difference between multi-cloud vs. hybrid cloud deployments? The distinction between the two strategies largely hinges on cloud management tools and concepts.
Cloud predictions for 2019 hone in on containers, IT skills
In 2018, technologies such as AI and machine learning dominated the cloud market. But what should we expect in 2019? Our contributors share their cloud predictions around serverless, IT skills and more.
In a hybrid cloud, sensitive data and computing resources may be maintained in two _________ environments.
Communications platform as a service (CPaaS) is a cloud-based delivery model that allows organizations to add real-time communication capabilities such as voice, video and messaging to business applications by deploying application program interfaces (APIs).
What do you think?
If you are looking for communication tools to boost collaboration, should you be researching Unified Communication as a Service (UCaaS) or Communication Platform as a Service (CPaaS) vendors? Let us know.
Quote of the Day
“A CPaaS platform on top of a UCaaS platform can extend an organization’s ability to interact with a wide range of customers without complete ripping and replacing its communications infrastructure.” – Michael Brandenburg
Infrastructure as code (IaC) is an approach to software development that treats physical compute, storage and network fabric resources as web services and allows apps to run where they are best suited, based on cost and performance data, instead of geographical location. Continue reading…
Quote of the Day
“Infrastructure as code doesn’t mean you create full software applications from scratch — tools are there to do the heavy lifting — but admins must understand code structure, syntax and design.” – Adam Bertram
Insight launches IaC offering to boost cloud operating model
Insight Enterprises is providing an infrastructure as code offering that aims to help customers establish a cloud operating model. Learn about the potential benefits of this approach.
IT organizations anticipate DevOps evolution in 2019
Interest in DevOps has waxed and waned in the years since it popped up, but DevOps evolution has picked up steam and won’t slow any time soon. Expect developments in areas such as CI/CD and containerization.
How infrastructure as code benefits and eases provisioning
With infrastructure as code, organizations can automate provisioning. Among the infrastructure as code benefits is the power for an IT team to use scripts to deploy infrastructure more efficiently and the ability for an organization to avoid vendor lock-in.
Benefits of infrastructure as code range from speed to scaling
IT organizations must learn new skills, and possibly new tools, to reap the benefits of infrastructure as code. The effort pays off with enhanced automation and consistency, among other rewards.
Infrastructure as code benefits range from audits to ops
Infrastructure as code benefits an IT organization in daily management, as well as audit tasks, but it’s only achieved with hard work and new skills.
Successfully _______ a DevOps culture in a data center isn’t easy, but it brings great rewards.
Amazon Connect is an Amazon Web Services (AWS) public cloud customer contact center service. Continued…
Quote of the Day
“Together, Amazon Connect and Lex can benefit call center agents, as chatbots reduce the workload and provide valuable insights into the customer experience.” – George Lawton
Amazon contact center now supports real-time voice streaming
Businesses using the Amazon contact center platform can now run the audio of customer phone calls through AI engines in real time.
Amazon Connect integrations aim to improve call center apps
Amazon Connect integrations with Lex chatbots generate data that can lead to more efficient communications in your call center.
With Amazon Connect, AWS puts experience to work in contact center space
Amazon Connect hopes its cloud-based, pay per minute strategy earns a chunk of the nearly $10 billion contact center market.
5 UC trends that drove headlines in 2018
Discover the news stories that affected the UC industry in 2018 and learn the UC trends — from AI assistants to team collaboration — that are driving the market in the new year.
Future of AWS hinges on AI, Lambda and on premises
What’s in store for the near-term future of AWS? SearchAWS contributors make their predictions, with a focus on AI, machine learning and further integration with native services.
Telecom carriers are increasingly making a ______ into cloud services.