• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

security

Salesforce1: Employee Productivity and Mobile Experiences

Salesforce1: Employee Productivity and Mobile Experiences

By Michael Fauscette on January 9, 2014

At Dreamforce last Fall, Salesforce introduced it’s new platform offering, Salesforce1. This week I attended the World Tour event in NYC for Salesforce1 and spent some time talking to Salesforce execs and an assortment of customers about the platform. I’ve started to write this post several times since I first heard about it, but after […]

Posted in Featured Posts, Technology / Software | Tagged ap, application, CRM, Customer Experience, CX, enterprise, mobile, salesforce, salesforce1, security

Seven Lessons Learned In Customer Experience Strategies During A Data Breach (such as Target’s)

Seven Lessons Learned In Customer Experience Strategies During A Data Breach (such as Target’s)

By R "Ray" Wang on December 27, 2013

Every Brand Should Have A Plan For A Data Breach The confluence of centralized personally identifiable information, reliance on digital channels, ease of hacking of magnetic stripes, and the application of the Willy Sutton rule ( a.k.a. you rob banks because that’s where the money is) improve the odds that many organizations will face a […]

Posted in Business, Featured Posts | Tagged Apps Strategy, best practices, Big Data, BigData, business strategy, Business Transformation, Chief Customer Officer, Chief executive officer, Chief Marketing Officer, CMO, Crisis Communications, CRM, CustExp, customer engagement, Customer Experience, customer experience management, customer relationship management, customer service, customer service; -business, CXP, Cyber security, data breach, data privacy, Digital Business, Digital Disruption, Digital Divide, Digital identity, digital marketing, Digital Strategy, engagement, enterprise applications, enterprise apps, Enterprise apps strategy, enterprise software, Identity, Identity management, Infosecurity, Leadership, marketing, Marketing strategy, Marshall's, Next Gen Customer Experience, Next Gen CXP, Privacy, Privacy Rights, R "Ray" Wang;, rwang0, security, social business, Social Media, Software Insider, SoftwareInsider, Target, TJ Maxx, TJX, vendor strategy | 2 Responses

IDG Cloud Computing Survey: Security, Integration Challenge Growth

IDG Cloud Computing Survey: Security, Integration Challenge Growth

By Louis Columbus on August 14, 2013

IDG Enterprise recently published Cloud Computing: Key Trends and Future Effects Report, showing how enterprises continue to struggle with security, integration and governance while finding immediate value in collaboration and customer relationship management (CRM) applications. IDG’s methodology is based on interviews with 1,358 respondents, stratified across CIO, Computerworld, CSO, InfoWorld, ITworld, and Network World websites, in addition […]

Posted in Featured Posts, Technology / Software | Tagged byline=Louis Columbus, Cloud Computing, CRM, customer relationship management, enterprise software, IDG, IDG Enterprise, Intelligent Tech, Louis Columbus' blog, SaaS, security, software as a service, Tech | 2 Responses

PRISM Projected To Cost U.S. Cloud Computing Industry $35B

PRISM Projected To Cost U.S. Cloud Computing Industry $35B

By Louis Columbus on August 9, 2013

U.S.-based cloud computing providers are projected to lose up to 20% of foreign market revenues or $35B over the next three years as a result of disclosures involving PRISM. The Information Technology and Innovation Foundation (ITIF), a Washington, D.C.-based think tank published How Much Will PRISM Cost the U.S. Cloud Computing Industry? (free to download, […]

Posted in Business, Featured Posts | Tagged Cloud Computing, Data Driven, Germany, Information Technology and Innovation Foundation, Intelligent Tech, Jeff Nolan, Louis Columbus' blog, PRISM, security, Tech

Innovating IT Risk Management

Innovating IT Risk Management

By Vinnie Mirchandani on August 7, 2013

A sad truth in our industry is CIOs don’t often get fired for not being innovative. But they do get fired for major data or security breach or business continuity failure. In spite of that it is a bit concerning how IT risks keep exploding. Here are some: There is growing acceptance that most commercially […]

Posted in Business | Tagged Anti-virus, backup, InformationWeek, IT risk management, Risk management, security

Shifting IT delivery to tablets: The strategic issues

Shifting IT delivery to tablets: The strategic issues

By Dion Hinchcliffe on May 29, 2012

Tablets are likely to become the primary computing experience for workers over the next few years. What will it take to successfully shift IT delivery to these devices given the security worries, legacy IT landscape, BYOD, and other issues?

Posted in Featured Posts, Technology / Software | Tagged android, google, iPad, NetBank, security, tablet, Twitter

Flashback kicks the myth of Apple invincibility squarely in the jewels

Flashback kicks the myth of Apple invincibility squarely in the jewels

By Phil Fersht on April 10, 2012

One of the critical areas we believe is too-frequently neglected in today’s business operations planning is security and risk.   With the amount of data flitting between hundreds of global locations and millions of servers -to how much risk are your operations, today, being exposed?  How many local and regional regulations are you flouting?  How […]

Posted in Featured Posts, Technology / Software | Tagged apple, BPO, Captives and Shared Services Strategies, Cloud Computing, Current Affairs, Engineering & Supply Chain Outsourcing, Enterprise Irregulars, IT Outsourcing / IT Services, Knowledge Process Outsourcing, Outsourcing and Politics, Outsourcing and Technology, procurement, SaaS, security, Security and Risk, slaby, Sourcing Best Practises

Password Strength and Security

Password Strength and Security

By Basab Pradhan on September 19, 2011

xkcd has a cartoon that beautifully explains why strict password rules have brought us to a pass where it remains relatively easy for a computer to hack the password. But very difficult for people to remember them. My company, like most large corporates, has a password policy that forces the use of numbers, large caps, […]

Posted in Featured Posts, Technology / Software | Tagged Facebook, password, Password policy, security, technology, Twitter

Your Security Rests With Sites You Don’t Even Own

Your Security Rests With Sites You Don’t Even Own

By Bob Warfield on September 12, 2011

What if your business could suffer a major security breach even though your own sites were all properly secured and not penetrated? ”How can that happen?” you ask.
Welcome to the world of typosquatting. The problem starts when employees send emails containing sensitive information. If they mistype the name of the destination domain slightly…

Posted in Featured Posts, Technology / Software | Tagged Domain Name System, Doppelgänger, Encryption, SaaS, security, typosquatting

Private Social Networks

Private Social Networks

By Michael Fauscette on June 29, 2011

By now you’d pretty much have to live under a rock to be completely ignorant about online social networks, whether you participate in them or not. Earlier this week facebook hit the news again with its ever rising valuation now…

Posted in Featured Posts, Technology / Software | Tagged "private, collaboration, Community, network, security, socbiz, Social

« PreviousNext »

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • The difference between customer engagement and customer experience, and how they go hand-in-hand
  • Improve your efficiency with new ways of automating tasks and accessing apps in Zoho Projects
  • ProTips: 5 ways to maximize form conversions
  • Introducing Contact Center: Pave the way for more customers by opening more doors of interaction
  • 5 ways to take the “cold” out of cold calling
  • Top 5 reasons why every organization should use an employee management system
  • Developer platforms and their importance
  • App Spotlight: Yeaster P-Series for Zoho CRM
  • The Story and History behind CA Day Retold by Zoho Books
  • From homemaker to mompreneur: Bhavani’s digital transformation journey
  • 30 minutes is all you need. Change your business forever this MSME Day!
  • 5 ways to make your employees feel valued on their work anniversary
  • Notebook turns six
  • Simplifying your LinkedIn prospecting
  • SecurePass Email: confidential and password-protected email

EI Tweets

My Tweets

Popular Posts

  • Apple, Adobe, Punctuated Equilibrium, and Commoditization
  • Strategy, Business Model, and Who's Your Customer
  • Three types of GUIs - past, present and the future
  • 2021 Roundup Of AI And Machine Learning Market Forecasts Show Strong Growth
  • How is big data faring in the enterprise?
  • FinancialForce's Spring 2022 Release Defines the Future of FP&A In Services
  • The Best Tech Companies For Remote Jobs In 2021 According To Glassdoor
  • Salesforce Now Has Over 19% Of The CRM Market

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: