-
Sep 11, 2018
The future Customer Experience is AI.
... -
Aug 24, 2018
Implementing Automation in your Contact Center? Read This First!
The following excerpt of an interview with Erin Van Remortel, Customer Experience (CX) Strategist at Verizon Enterprise Solutions, was conducted by Ryan Gaviria, Senior Analyst and Conference Director at the Customer Management Practice, who granted permission to repost much of the content of the original article.
-
Aug 11, 2018
The four key steps to improving customer experience with artificial intelligence
From finance to sales to operations, artificial intelligence (AI) and other self-learning automation are impacting every part of your business. But what about customer experience (CX)?
-
Jul 31, 2018
Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence.
When it comes to improving customer experience, we’re in the midst of a true revolution. Nearly 80 percent of companies selling to consumers report that they are already using or plan to use an AI-powered virtual agent for customer service by 2020.
-
Jul 24, 2018
Helping your workers get the most out of your new cloud-based communications solution
By now the benefits of unified communications (UC) platforms are well known, and many businesses are rushing to make the move. UC can help your organization to better control costs, streamline your operations, improve employee productivity and deliver better customer experiences.
-
Jul 17, 2018
How to break down the barriers to SDN adoption
The number of organizations implementing software-defined networking (SDN) technologies is set to increase dramatically, according to our latest research. We believe there are good reasons for that, particularly in a world where digital transformation requires organizations to be ever-more agile and fleet-of-foot.
-
Jul 10, 2018
Why 56% of large businesses are turning to SDN for cybersecurity
Cybersecurity is a critically important C-suite issue for the companies we meet. From the threat of a devastating attack to the possibility of a damaging customer privacy breach, the vast majority of boards we talk to now recognize the potentially existential danger of poor cybersecurity and resilience.
-
Jul 09, 2018
Leading the way for Vision Zero
As more people are moving to cities, traffic-related fatalities have risen. The National Safety Council estimates 40,100 traffic deaths occurred in the U.S. in 2017, with Rhode Island posting an 87% increase in traffic deaths from 2015-2017 and Kansas increasing 29% in that same timeframe.
-
Jul 02, 2018
How SDN can help your business transform and grow
In this age of digital transformation and accelerated change, every business is under mounting pressure to embrace reinvention and focus on innovation. But what does that mean in practice?
-
Jun 25, 2018
How to keep your business communications secure
The popularity of cloud-based services is growing rapidly. It’s predicted that by 2020, 92% of workloads will be processed by cloud data centers[i]. As more enterprises make the shift to managed network and cloud services, they’re using them to transform the way they do business.
-
Jun 22, 2018
Five reasons why your business needs software-defined networking
Many of our larger clients face a daunting dilemma. On the one hand, they have never been under more pressure to be nimble as they face rapid transformation and disruption in their key markets.
-
Jun 11, 2018
The Delicate Nature of Trust
There are a few companies that I trust with my identity information and personal data implicitly, even as a lifelong security guy. They simply give me so much value that I stay authenticated to their services at work, at home, in the car, and on mobile. On the other hand, there are many companies that I completely avoid because of the annoying and creepy methods they use to showcase how they are tracking me, my location and my behavior. After all, there is a fine line between digital stalking and consumer trust.
-
Feb 08, 2017
Data Breach Digest: Perspective is reality
Our 16 new cybercrime case studies provide insight into the biggest threats you face—plus tips on how to prevent them.
-
Feb 02, 2017
Data Breach Digest IoT Calamity: the Panda Monium
Read about one of the 2017 Data Breach Digest characters, Panda Monium. This scenario looks at what happened when one university was attacked by an Internet of Things (IoT) botnet barrage of 5,000 hosts.
-
Jan 23, 2017
Harvard Business Review - Big Data
Can you handle the volume, variety and velocity of IoT data?
-
Oct 28, 2016
Data Breach Digest Update - Data ransomware: User and file space error
Scenario #15 of the cybercrime case studies detailed how employees at one small company had access to their files held to ransom. Discover how you can avoid finding yourself in a Catch 22 situation.
-
Oct 26, 2016
Hybrid IT takes center stage
-
Oct 06, 2016
Giving up control article
-
Oct 05, 2016
Data Breach Digest Update - Hacktivist attack: Shedding light on the matter
Data Breach Digest scenario #8 focused on a critical infrastructure breach by a hacktivist. But it’s not just high-profile organizations that are at risk. Get our top tips for mitigating and responding to hacktivist attacks.
-
Sep 09, 2016
Data Breach Digest Update - CMS security: Keeping the pirates at bay
One of the cybercrime case studies in the Data Breach Digest involved pirates hacking into a global shipping company’s content management system to access data that aided their plunder. Learn how to protect yourself.
-
Sep 09, 2016
Verizon Intelligent Lighting Solutions
- Will SDN replace MPLS? Not so fast.The future of connected vehicles hinges on today’s investments.Disclosing cyber risk? New SEC guidance requires it.Revolutionize your communications: Migrating to a cloud-based platformThe role human touch plays in the digital customer experience.The importance of public-private partnerships to make smart cities a realityStaying Ahead of the CurveWhy network visibility is important for your businessAre You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?Stop skimping. Cybersecurity breaches can severely hurt your bottom line.Are you “over-sharing” your customer feedback data?Get the SD WAN facts before you buyCloud storming: You need more than an umbrella to stay secureKeep the ‘person’ in personalized customer experienceTough Love and the Customer Experience CultureRetail’s Digital RoadmapMobile Customer Experience: Savvy shoppers. Ready associates.Operation “Surprise and Delight”Adaptive CX Means Liquid PersonalizationFederal Government Modernization: Priorities for the Federal IT ExecutiveDigital Convergence: The Perfect StormWhat’s driving the development of Virtual Network Services at Verizon?What to consider when planning your future digital networkWhat does IoT really mean for the enterprise?Smart traffic helps improve quality of lifeSmart cities are the wave of the futureData breaches in industrial environments: Safety comes firstAcceptable use policies: Keeping your workplace secureSocial engineering: Strengthening the weakest linkPowering the digital economy with modern utilitiesInsider Threat: One pattern, four scenarios, thirteen countermeasuresMake sure the bad guys don’t get what they’re hoping for this ChristmasDarknet: The shady underbelly of the icebergDelivering smart, sustainable energy solutionsStaying safe online: Observing good digital hygieneData breaches: how long does the damage last?CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”CX Day 2017: Celebrating customer experienceMy superb “Go-To-Gemba” customer experienceCan you explain IoT without saying IoT?Creating the city of the future todayData Breach Digest Update: Data ransomware - the Catch 22Preparing for GDPR? PCI DSS could helpMan vs machine, which delivers the best customer experience?My experience with the Kano Model: Don't try to delight2017 Data Breach Digest: Half Year Anniversary6 Reasons You Can’t Afford to Go Cheap on NetworkVerizon’s Data Breach Digest – Perspective is reality.As social engineering activities increase buyer beware of tech support scamsCyber insurance part VHacktivist attack - the Dark ShadowData Breach Digest Update: CMS CompromiseMaking the most of limited security resourcesMaking the move to managed security servicesBriefing the board: Directing security evolvementWhat's in your wallet?Hospitality: Customizing the perfect guest experienceInformation security for SMBs…who me?Phishing license: training and awarenessThe spirit and intent of the DBIRSecurity maintenance: More valuable than goldAnatomy of well-managed malware incidentWeekly Intelligence Summary Lead Paragraph: 2016-03-11Weekly Intelligence Summary Lead Paragraph: 2016-03-18Phishing for W-2 data - The business email compromise (BEC)RSA Conference was one for the booksBack to (security) basicsThe resonant theme of RSA 2016One better risk approach… to rule them allCrypto malware – Do you play, pay or go on holiday?Talkin’ trash: Three reasons why most confidential waste disposal programs stink.Setting priorities in healthcare securityDATA Breach Digest – Scenarios from the FieldWeekly Intelligence Summary Lead Paragraph: 2016-02-26Weekly Intelligence Summary Lead Paragraph: 2016-02-19So you want to be a CISO? (Here's what senior management expects from the successful job candidate)Security through the time machine and back againWeekly Intelligence Summary Lead Paragraph: 2016-02-12The Internet of Things - Consider the privacy and security implications.Retail CISOs: "Old school" threats still loom large.Weekly Intelligence Summary Lead Paragraph: 2016-02-05Weekly Intelligence Summary Lead Paragraph: 2016-01-29Weekly Intelligence Summary Lead Paragraph: 2016-01-22Weekly Intelligence Summary Lead Paragraph: 2016-01-15Weekly Intelligence Summary Lead Paragraph: 2016-01-08Weekly Intelligence Summary Lead Paragraph: 2016-01-01Weekly Intelligence Summary Lead Paragraph: 2015-12-25Weekly Intelligence Summary Lead Paragraph: 2015-12-18Weekly Intelligence Summary Lead Paragraph: 2015-12-11Weekly Intelligence Summary Lead Paragraph: 2015-11-27ModPOS risk or not?Weekly Intelligence Summary Lead Paragraph: 2015-11-20Weekly Intelligence Summary Lead Paragraph: 2015-11-13Weekly Intelligence Summary Lead Paragraph: 2015-11-06Weekly Intelligence Summary Lead Paragraph: 2015-10-30Weekly Intelligence Summary Lead Paragraph: 2015-10-23Weekly Intelligence Summary Lead Paragraph: 2015-10-16Weekly Intelligence Summary Lead Paragraph: 2015-10-09Weekly Intelligence Summary Lead Paragraph: 2015-10-02Weekly Intelligence Summary Lead Paragraph: 2015-09-25Weekly Intelligence Summary Lead Paragraph: 2015-09-18Weekly Intelligence Summary Lead Paragraph: 2015-09-11Incident discovery and containment: Average is over.Weekly Intelligence Summary Lead Paragraph: 2015-09-04Weekly Intelligence Summary Lead Paragraph: 2015-08-28Inside (r) JobMake your own DBIR charts, part 4 of 4: See trends over time.Make your own DBIR charts, part 3 of 4: From JSON to charts.Make your own DBIR charts, part 2 of 4: Making VERIS data.Make your own DBIR charts, part 1 of 4: The tools.Weekly Intelligence Summary Lead Paragraph: 2015-08-21Encryption as protection? Maybe not.Weekly Intelligence Summary Lead Paragraph: 2015-08-14Stagefright and security frightInternal vs. external discovery in the DBIRWeekly Intelligence Summary Lead Paragraph: 2015-07-17Weekly Intelligence Summary Lead Paragraph: 2015-07-10Weekly Intelligence Summary Lead Paragraph: 2015-07-03DBIR the missing section: PhishingTwitter for InfosecWeekly Intelligence Summary Lead Paragraph: 2015-06-26Weekly Intelligence Summary Lead Paragraph: 2015-06-19Weekly Intelligence Summary Lead Paragraph: 2015-06-12Mitigations aren't effective after the first six (A DBIR attack graph analysis).Weekly Intelligence Summary Lead Paragraph: 2015-06-05Weekly Intelligence Summary Lead Paragraph: 2015-05-29Weekly Intelligence Summary Lead Paragraph: 2015-05-22A DBIR attack graph web app!Tweetalytics of DBIR-2015Weekly Intelligence Summary Lead Paragraph: 2015-05-15Weekly Intelligence Summary Lead Paragraph: 2015-05-08Weekly Intelligence Summary Lead Paragraph: 2015-05-01The DBIR attack graph: redux!Weekly Intelligence Summary Lead Paragraph: 2015-04-24Weekly Intelligence Summary Lead Paragraph: 2015-04-17Weekly Intelligence Summary Lead Paragraph: 2015-04-100'day campaigns for everyone!The circle of life: A DBIR attack graphThe Other DBIR: Database Breach Investigations ReportWeekly Intelligence Summary Lead Paragraph: 2015-04-03Weekly Intelligence Summary Lead Paragraph: 2015-03-27Weekly Intelligence Summary Lead Paragraph: 2015-03-20DBIR - The missing section: stolen credsMalware and the Heavy TailWeekly Intelligence Summary Lead Paragraph: 2015-03-13Weekly Intelligence Summary Lead Paragraph: 2015-03-06Weekly Intelligence Summary Lead Paragraph: 2015-02-27Weekly Intelligence Summary Lead Paragraph: 2015-02-20Weekly Intelligence Summary Lead Paragraph: 2015-02-13Weekly Intelligence Summary Lead Paragraph: 2015-02-06Weekly Intelligence Summary Lead Paragraph: 2015-01-30Easy breach analysis with association rulesWeekly Intelligence Summary Lead Paragraph: 2015-01-23Weekly Intelligence Summary Lead Paragraph: 2015-01-09Weekly Intelligence Summary Lead Paragraph: 2014-12-26Weekly Intelligence Summary Lead Paragraph: 2014-12-19The 2014 Data [In]Security Hall of FameWeekly Intelligence Summary Lead Paragraph: 2014-12-12Weekly Intelligence Summary Lead Paragraph: 2014-12-05Making informed decisions by using meaningful security metricsWeekly Intelligence Summary Lead Paragraph: 2014-11-28Weekly Intelligence Summary Lead Paragraph: 2014-11-21Weekly Intelligence Summary Lead Paragraph: 2014-11-14Twitter and information security awarenessWeekly Intelligence Summary Lead Paragraph: 2014-11-07Context graph-based analysis of Apple Pay domains – Part 3 of 3Introducing Verum: A Context graph system - Part 2 of 2Introducing Verum: A Context graph system - Part 1 of 2Context graph-based analysis of Apple Pay domains – Part 2 of 3Context graph-based analysis of Apple Pay domains - Part 1 of 3Weekly Intelligence Summary Lead Paragraph: 2014-10-31Getting started with VERIS (part 1)Criminals dress up as Apple Pay for HalloweenWeekly Intelligence Summary Lead Paragraph: 2014-10-24A thought experiment about shared credentialsWeekly Intelligence Summary Lead Paragraph: 2014-10-17When is an Intelligence Feed Record New?Weekly Intelligence Summary Lead Paragraph: 2014-10-10I made a million models.Why every board needs an independent InfoSec advisorWeekly Intelligence Summary Lead Paragraph: 2014-10-03Shellshock and Ebola: or How I learned to seek actionable intel and ignore the FUDHealthcare data breaches: Using VCDB and Mongo to find answers (Part 3)Weekly Intelligence Summary Lead Paragraph: 2014-09-26Wade Baker on C-SPAN discussing security breachesThe Importance of dataWeekly Intelligence Summary Lead Paragraph: 2014-09-19Healthcare data breaches: Using VCDB and Mongo to find answers (Part 2)Weekly Intelligence Summary Lead Paragraph: 2014-09-12Weekly Intelligence Summary Lead Paragraph: 2014-09-05Weekly Intelligence Summary Lead Paragraph: 2014-08-29Regardless of the length or complexity, passwords can't do it alone.Weekly Intelligence Summary Lead Paragraph: 2014-08-22Weekly Intelligence Summary Lead Paragraph: 2014-08-15It's campaign season, and I don't mean politicsDo not use the Force.Advanced threat detection – Adapting to changeWeekly Intelligence Summary Lead Paragraph: 2014-08-08Weekly Intelligence Summary Lead Paragraph: 2014-08-01Weekly Intelligence Summary Lead Paragraph: 2014-07-25This framework ain't big enough for the both of us.Weekly Intelligence Summary Lead Paragraph: 2014-07-18Weekly Intelligence Summary Lead Paragraph: 2014-07-11How ICS Security can Impact Retail BusinessModeling geographic ambiguity with VERISWeekly Intelligence Summary Lead Paragraph: 2014-07-04Healthcare data breaches: Using VCDB and Mongo to find answers (Part 1)Creating the 2014 DBIR Cover ChallengeIs defense-in-depth dead or is defense-in-dearth the real problem?An interactive timeline of public breachesWeekly Intelligence Summary Lead Paragraph: 2014-06-27Weekly Intelligence Lead Summary Paragraph: 2014-06-20
RSS2009 DBIR: Compromised data2009 DBIR: Compromised assets2009 DBIR: DemographicsLost productivity rather than attacks the real risk from ATL issuesWeekly Intelligence Summary: 2009-10-09The APT Goat RodeoDBIR cover challenge solved!Weekly Intelligence Summary: 2010-08-27Helping your CIRT enhance your security managementWeekly Intelligence Summary: 2011-03-112011 Data Breach Investigations Report releasedWeekly Intelligence Summary: 2011-06-24Weekly Intelligence Summary: 2011-07-01Evidence-based risk management, a new serviceWeekly Intelligence Summary: 2011-07-15New Millennium, New Expectations, New Customer ExperiencesDigital Transformation Video - Verizon Enterprise SolutionsWhy do digital transformations fail?State of the Market: Internet of Things 2016A 7-minute Healthcare Cybersecurity UpdateSmarter Manufacturing Security in 7 MinutesVerizon Retail Cybersecurity Roundtable2016 Data Breach Investigations ReportDBIR2016 Overview2016 Data Breach Investigations Report - Executive SummaryBuild a hyperconnected workforce.What's next for your cloud?Think mobile first.You are going to be breached.