By Vinnie Mirchandani on March 3, 2014
Time (sub required) has a detailed story on the elite team that rescued the HealthCare.gov site. You can feel the intensity of the salvage project, the apolitical results-oriented approach while the mood all around the project was hostile, the relentless use of “stand up” meetings, the brainpower of A+ technicians many of who have helped […]
Posted in Trends & Concepts | Tagged data breach, healthcare.gov, Outsourcing
By Denis Pombriant on January 9, 2014
Once More into the Data Breach If you’re sickened by the holiday season data breach that took place at Target, take heart, there really is something you can do about it or more precisely there’s something your credit card issuers can do. First, some fun facts courtesy of the New York Times. The United States […]
Posted in Technology / Software | Tagged Credit card, data breach, Debit card, Smart card |
By R "Ray" Wang on December 27, 2013
Every Brand Should Have A Plan For A Data Breach The confluence of centralized personally identifiable information, reliance on digital channels, ease of hacking of magnetic stripes, and the application of the Willy Sutton rule ( a.k.a. you rob banks because that’s where the money is) improve the odds that many organizations will face a […]
Posted in Business, Featured Posts | Tagged Apps Strategy, best practices, Big Data, BigData, business strategy, Business Transformation, Chief Customer Officer, Chief executive officer, Chief Marketing Officer, CMO, Crisis Communications, CRM, CustExp, customer engagement, Customer Experience, customer experience management, customer relationship management, customer service, customer service; -business, CXP, Cyber security, data breach, data privacy, Digital Business, Digital Disruption, Digital Divide, Digital identity, digital marketing, Digital Strategy, engagement, enterprise applications, enterprise apps, Enterprise apps strategy, enterprise software, Identity, Identity management, Infosecurity, Leadership, marketing, Marketing strategy, Marshall's, Next Gen Customer Experience, Next Gen CXP, Privacy, Privacy Rights, R "Ray" Wang;, rwang0, security, social business, Social Media, Software Insider, SoftwareInsider, Target, TJ Maxx, TJX, vendor strategy |
By Michael Krigsman on June 14, 2010
Today, thanks to flaws in AT&T’s service, I’m at risk for identity theft along with 114,000 other iPad owners.
Posted in Business | Tagged AT&T, data breach, iPad, Privacy, security