Hyper personalization is the key to a seamless customer experience
More than two thirds of companies now compete on the basis of customer experience. Customer service is the competitive differentiator, and it is essential now more than ever to maintain brand loyalty and meet business goals. Companies can face losing customers if they don’t keep up with the ever-increasing standard of service expected of them.
Delivering superior service is particularly challenging during spikes in the volume of customer contact. Human agents on their own cannot manage these peaks, let alone deliver a consistent and personalized customer experience. Long call queues and fragmented customer engagement lead to disappointed customers, reputational damage and ultimately financial losses.
SMEs forced to meet cybersecurity demands in order to win contracts
Supply chain threats are a major problem for enterprises and they are forcing smaller businesses to take security more seriously in order to win contracts.
A study by cyber security awareness platform CybSafe shows nearly 37 percent of organizations have been required to achieve a recognized cyber security standard by their enterprise customers before successfully securing contracts. This represents a nine percent increase over 2017.
Handling user feedback data and the rise of 'ResearchOps' [Q&A]
Customer experience has become a massive, sprawling industry that includes the many systems and touchpoints that lie between companies and their users. It's projected to be a $32B market by 2025.
One of the most interesting new sub-categories emerging within customer experience is ResearchOps. It's a new discipline -- with a growing community of practitioners -- focused on better infrastructure around customer research, and operationalizing the user research process so it can be done faster and have a bigger impact.
New platform helps automate security operations
Speed of response is critical for security teams, which is why many companies employ Security Orchestration, Automation and Response (SOAR) tools.
Security automation platform LogicHub is looking to take SOAR a step further with the launch of a SOAR+ platform offers autonomous detection and response, advanced analytics and machine learning to automate decision making with accuracy across disparate security operations.
25 percent of security analysts' time is wasted on false positives
Security analysts in US enterprises spend around a quarter of their time chasing false positives because security alerts or indicators of compromise (IOCs) are erroneous.
This is among the findings of research carried out by Exabeam and the Ponemon Institute which also shows that security teams must evaluate and respond to nearly 4,000 security alerts per week.
85 percent of enterprise web traffic is cloud services
A new study based on aggregated, anonymized data from millions of global users reveals that cloud services now account for 85 percent of all enterprise web traffic.
The report from cloud security company Netskope also reveals that heavy use of cloud services is often driven by multiple instances of cloud service usage across an organization.
Closing the complexity gap in device management
The device landscape is becoming increasingly complex, as the proliferation of platforms, manufacturers and ownership options intersects with the need to track, manage and secure these devices in an ever-changing risk environment.
Piece by piece, IT teams have picked up new devices and solution-specific tools to manage and track each device or pain point as it arises. Over time, organizations may develop entirely different teams to oversee similar management tasks for different platforms. While these specialized tools are effective individually, as the device landscape and management tasks expand, the net result of these devices and siloed tools is a "complexity gap" that outpaces the staff needed to manage them all.
Four ways your boss can access your private data
Privacy is a currency these days. With social media, target advertising, and constant connectivity, it’s harder than ever to keep elements of your private life truly private. This crisis of privacy becomes especially concerning in the context of the workplace.
In the old days, it was easy to keep your work life and your personal life entirely separate. Today, those boundaries are blurrier than they used to be, and that fact has led to a big question for many employees: how much of my private data can my boss access?
More than half of enterprises don't know if their security tools are working
According to a new report, 53 percent of enterprise security leaders don't know if their security tools are working, despite massive spending.
The study carried out for continuous validation specialist AttackIQ by the Ponemon Institute shows companies surveyed are spending an average of $18.4 million annually on cybersecurity and 58 percent will be increasing their IT security budget by an average of 14 percent in the next year.
Qualys makes IT asset discovery and inventory app available for free
Security and compliance specialist Qualys is announcing today that it's making its Global IT Asset Discovery and Inventory app available to all businesses for free.
With the app users can automatically create a continuous, real-time inventory of known and unknown assets across a global IT footprint. The assets can be anything from on-premises, endpoints, multi-cloud, mobile, containers, OT and IoT.
65 percent of cybersecurity analysts say they've considered quitting
Working in a security operations center is stressful, so much so that 65 percent of analysts report having considered changing careers or quitting their jobs.
This is among the findings of a new study carried out by the Ponemon Institute for data analytics platform Devo Technology, which also finds that 49 percent say their SOC is not fully aligned with business needs.
Avoid chaos at scale: How to prevent your robots from running amok
Although robotic process automation (RPA) is at the heart of many digital transformation efforts, it’s all too common for organizations to roll out their software robots in a piecemeal fashion. For example, finance deploys its own set of bots, while manufacturing rolls out another, without coordination between the departments. This decentralized approach presents a risk -- one that leads to problems later.
For instance, automated processes often require robots to interact with each other and access or disseminate data, which means they’re often dependent on related systems and policies. But what happens when one of those policies change or a system breaks down?
22 percent of businesses hit by phishing attacks in the last quarter
In the past three months 22 percent of businesses have suffered a data breach as a result of an email attack according to a new report.
The study released by email security platform GreatHorn spoke to more than 1,000 professionals to get a better understanding of the current state of enterprise email security.
Enterprises lagging behind on Windows 10 migration
Windows 7 support comes to an end six months from now, although businesses will be able to pay for Windows 7 Extended Security Updates (ESU) for a further three years -- at a ratcheted cost. Windows Enterprise customers can expect to pay $25 per device for the updates, rising to $100 in the third year. For Windows 7 Professional, the starting figure is $50 per device, rising to $200.
Aware that time is running out, many enterprises have already moved to Windows 10, but a large number remain significantly behind in completing the migration process, according to new findings from endpoint management and security company 1E.
Enterprises are modernizing data architectures but still have major concerns
A new study of over 300 IT executives in large enterprises by database company DataStax reveals all are modernizing their data architecture, but most are still struggling with major challenges.
The results show 99 percent of IT execs report challenges with architecture modernization and 98 percent with their corporate data architectures (data silos). Vendor lock-in (95 percent) is also a key concern among respondents.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.