Extra Crunch Partner Perk: Get 6 months free of Zendesk Support and Sales CRM

We’re excited to announce an update to the Extra Crunch Partner Perk from Zendesk. Starting today, annual and two-year Extra Crunch members that are new to Zendesk, and meet their startup qualifications, can now receive six months of free access to Zendesk’s Sales CRM, in addition to Zendesk Support Suite, Zendesk Explore and Zendesk Sunshine. […] Continue reading Extra Crunch Partner Perk: Get 6 months free of Zendesk Support and Sales CRM

Microsoft Teams gets breakout rooms, custom layouts and virtual commutes

Unsurprisingly, Teams has become a major focus for Microsoft during the COVID-19 pandemic and so it’s no surprise that the company is using its annual Ignite IT conference to announce a number of new features for the services. Today’s announcements follow the launch of features like Together Mode and dynamic view earlier this summer. Together […] Continue reading Microsoft Teams gets breakout rooms, custom layouts and virtual commutes

84% of Businesses Are Likely to Expand WFH Ability Despite Security Risks. Is Remote Work Becoming the New Normal?

Despite the downsides of replacing on-premise work with remote work, 84% of companies anticipate a consistent expansion of remote work practices, according to a 2020 Remote Work-From-Home Cybersecurity Report published earlier this week.
The post … Continue reading 84% of Businesses Are Likely to Expand WFH Ability Despite Security Risks. Is Remote Work Becoming the New Normal?

Why Fraudsters Are Flying High on Airline Loyalty Programs

Reading Time: 6 minutes While the value of airline loyalty programs and the customers they serve is well-established, protecting these assets with security controls needs to be more than an afterthought.

The post Why Fraudsters Are Flying High on Airline Loyalty Programs appeared first on Security Intelligence.

Continue reading Why Fraudsters Are Flying High on Airline Loyalty Programs

Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need?

Reading Time: 6 minutes Instead of just throwing money at increasingly complex security issues, organizations should embrace fraud detection and user authentication tools that flex to match risk appetite and business goals.

The post Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need? appeared first on Security Intelligence.

Continue reading Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need?

Adobe’s Amit Ahuja will be talking customer experience at TechCrunch Sessions: Enterprise

As companies collect increasingly large amounts of data about customers, the end game is about improving the customer experience. It’s a term we’re hearing a lot of these days, and we are going to be discussing that very topic with Amit Ahuja, Adobe’s vice president of ecosystem development, next month at TechCrunch Sessions: Enterprise in […] Continue reading Adobe’s Amit Ahuja will be talking customer experience at TechCrunch Sessions: Enterprise

IDC: Asia-Pacific spending on AI systems will reach $5.5 billion this year, up 80 percent from 2018

Spending on artificial intelligence systems in the Asia-Pacific region is expected to reach $5.5 billion this year, an almost 80 percent increase over 2018, driven by businesses in China and the retail industry, according to IDC. In a new report, the research firm also said it expects AI spending to climb at a compound annual […] Continue reading IDC: Asia-Pacific spending on AI systems will reach $5.5 billion this year, up 80 percent from 2018

Security Considerations for Whatever Cloud Service Model You Adopt

Regardless of what cloud service model you adopt, it’s important to consider security implications related to application development, data and contract management, and IT asset governance.

The post Security Considerations for Whatever Cloud Service Model You Adopt appeared first on Security Intelligence.

Continue reading Security Considerations for Whatever Cloud Service Model You Adopt

10 Cybersecurity Conference Trips You Should Make Time for This Year

Not sure where to distribute IT budgets for ideal returns? Here’s a roundup of the top 10 cybersecurity conference trips to make time for this year.

The post 10 Cybersecurity Conference Trips You Should Make Time for This Year appeared first on Security Intelligence.

Continue reading 10 Cybersecurity Conference Trips You Should Make Time for This Year

The System Development Life Cycle: A Phased Approach to Application Security

By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.

The post The System Development Life Cycle: A Phased Approach to Application Security appeared first on Security Intelligence.

Continue reading The System Development Life Cycle: A Phased Approach to Application Security