Who is winning in text message (SMS) marketing?

Who is winning in text message (SMS) marketing?

Recent court decisions provide much needed clarity around issues of “consent” so that businesses using text message marketing know when they can rely on the recipient’s consent.

09/01/17

Cybersecurity is one of the top risks organizations must manage in 2017

Cybersecurity is one of the top risks organizations must manage in 2017

Cybersecurity and privacy continue to make headlines. Experts have more questions than answers addressing risk management concerns in the evolving cybersecurity market.

05/01/17

Trump's executive order travel ban and IT workers

Trump's executive order travel ban and IT workers

In light of the executive order restricting immigration from certain countries, should U.S. companies that rely on temporary or contract IT workers, or recruit skilled tech pros from other countries, be concerned about the visa status...

03/01/17

Echo chamber: Amazon device creates new legal privacy twist for smart home systems

Echo chamber: Amazon device creates new legal privacy twist for smart home systems

Given the sensitive nature and legal protections afforded to digital information obtained within the home, should law enforcement have the right to access data gathered by smart home devices?

01/09/17

5 questions to ask your retail clients about GPS tracking and geolocation

5 questions to ask your retail clients about GPS tracking and geolocation

As retailers and marketing consultants roll out GPS tracking, iBeacons and other tracking tools, those charged with implementing and understating tracking programs and technologies probably have a few questions. How does it work? Does...

12/08/16

FTC v. Wyndham and corporate cybersecurity

FTC v. Wyndham and corporate cybersecurity

Privacy and security are often perceived as weaknesses or risks, but they can be an opportunity. Reputation and brand protection have been identified as two of the biggest drivers behind increased IT spending to address security...

09/01/16

New federal Defend Trade Secrets Act expands protection, adds safe harbor

New federal Defend Trade Secrets Act expands protection, adds safe harbor

The continuous press for innovation in technology and media will challenge intellectual property laws to evolve. The new Defend Trade Secrets Act provides a powerful new tool to protect a business's intangible assets and a major...

05/27/16

5 key terms to know for vendor contracts

5 key terms to know for vendor contracts

Vendor and third-party contract management is a challenge for every organization. Focus on key contract areas to address risks from effects of mobile, social, cloud and big data on employee, vendor and customer access and use of...

05/10/16

4 questions from the standoff between the FBI and Apple

4 questions from the standoff between the FBI and Apple

At this year's RSA Conference on cybersecurity innovation - the world’s biggest digital security expo - the iPhone dispute between Apple and the FBI touched every conversation. The battle over access to encrypted data on an iPhone...

03/18/16

4 things CIOs need to know about the FCC, broadband and innovation

4 things CIOs need to know about the FCC, broadband and innovation

CIOs should take notice of recent developments with the Federal Communications Commission (FCC). It’s rulemaking authority are making many question if the FCC may write new rules applicable to Internet services specifically, and what...

02/04/16

Load More