Blog

Artificial Intelligence in the Contact Centre – A Webinar Not To Be Missed!

Oliver Sears

On Thursday 10th May, activereach hosted a webinar alongside its technology partner, Enghouse Interactive. The hot topic being discussed was how artificial intelligence (AI) and virtual assistants are being used to enrich the customer experience and their developing role within Contact Centres. It’s a topic that I feel really passionate about!

more →

Blog

Stand-alone Web Application Firewalls are not enough!

This month we are publishing a blog from cloud security partner, Zenedge. Here, we explore the evolution of the security threat landscape, from threat actors improving their hacking techniques to the increasingly daunting task of protecting public-facing web applications and API endpoints. Not only do organizations need to get to grips with reality and understand they are under attack nearly 100 percent of the time, they must also come to terms with the fact that their current approach to defending their applications and APIs is woefully deficient.

more →

Blog

GDPR: Compliance Timeline For Implementing Technological Transformation (Part 4 of 5)

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data. In Part 3, we examined some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.

more →

Blog

GDPR: Technology Goals Aid Business Transformation And Legal Compliance (Part 3 of 5)

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data.

This post (Part 3) looks at some real life scenarios whereby organizations have effectively reduced their data security risk, and examines some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.

more →

Blog

GDPR: Taking A Risk-based Approach To The Technological Measures Required To Protect Data (Part 2 of 5)

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In this post, we highlight the major provisions in the GDPR for technological measures to protect data, and examine the importance of taking a risk-based approach to GDPR technology investments.

more →

Blog

GDPR Compliance: The Legal & Financial Consequences Of Technology Failure – A Guide For Security Professionals (Part 1 of 5)

The General Data Protection Regulation will change the way you do business

The EU General Data Protection Regulation (GDPR) comes into force on May 25, 2018. Every organization — regardless of its location — doing business with EU customers will need to make changes to its technology, processes, and people to comply with the new rules.

more →

Blog

2017 OWASP Top 10 Includes API Protection

This month we share a blog on the recently released OWASP Top 10 Application Security Risks, from our technology partner, Zenedge.

Open Web Application Security Project (OWASP) is an organization composed of international security experts who provide independent intelligence on applications and their security risks. Every four years, the OWASP Top 10 releases a list consisting of the most significant Application Security Risks.

more →