Jasmine Henry

Copywriter, Ghostwriter, Technical Writer, Writer

Expert B2B Tech Writer | Cybersecurity & Analytics Specialist | Ghostwriter | Data Storyteller

Jasmine Henry is a Seattle-based freelance B2B technology writer and data storyteller who specializes in cybersecurity, mobility, analytics, and emerging enterprise technology trends. Her work has appeared in Forbes, Time, Reuters, HR Professionals Magazine, ADP Spark, HP Tektonika, Mimecast, and dozens of other publications.

With a background in IT project management and big data analytics, Henry has direct experience with IT management and strategy in both startup and enterprise environments. She specializes in translating complex trends and massive data sets into high-value, shareable stories, articles, and whitepapers about tech trends. Henry holds an MS in Informatics & Analytics from Lipscomb University in Nashville, where she also completed a graduate certificate in Health Care Informatics.
Categories
Content Types
Article, Blog Post, Ebook, Website Copy, Case Study, Buyers Guide, Press Release, Infographic Copy, Email Newsletter, Guide, Landing Page, Checklist
More Information
Lipscomb University, MS Informatics & Analytics
Lipscomb University, Graduate Certificate in Healthcare Informatics
Willamette University, Bachelor of Arts
Sequim, WA USA|English
Publications
N/A

Published Content

72
securityintelligence.com
A Complete Guide to Hacking the 2020 RSA Conference
January 23rd, 2020
securityintelligence.com
Article
9 Reasons Why Cybersecurity Stress Is an Industry Epidemic

The average job tenure of a CISO is just 18-24 months — much shorter than the average 8.4-year tenure of CEOs. And data from multiple sources shows that cyber careers stack up unfavorably when compared to the average American worker’s experience. Security professionals in particular are: More than twice as likely to report poor work-life balance (44 percent vs. 20 percent) More than five times as likely to worry about job security (32 percent vs. 6 percent) More than three times as likely not to take full vacation days (89 percent vs. 28 percent)

January 14th, 2020
forbes.com
Article
3 Innovative Concepts To Increase Collaboration In The Workplace

CHROs may want to consider adopting the title of Chief Human Collaboration Facilitators. Recent studies by Polycom indicate rapid globalization of the economy has created a need to increase collaboration "across time zones, borders and cultures." For Millennials especially, who are now the largest generation in the workplace, teamwork is a key workplace value. In a workplace that's increasingly global and mobile, HR leadership should focus on team-based collaboration. They can do that by taking advantage of programs and tools for worldwide teamwork. In addition, cross-departmental and cross-generational collaboration measures will help enterprise-wide knowledge sharing. Here are three suggestions to kick-start a broad range of collaborative experiences across your organization: Research by Robert Half indicates that 39 percent of employees struggle with "learning to interact with a variety of personality types." Employees need the tools and knowledge to work with individuals with a wide variety of communication and working styles. This need only becomes more pressing in a global workforce. As HR managers look toward a future — and present — where cross-team collaboration is a necessity, facilitating company-wide relationship building is crucial. Enterprise social networks (ESNs), department-wide social activities and frequent team flexibility can protect against the negative impacts of tribalism. Freibergs writes that "tribalism starts when employees and leaders view their organization as divisible and compartmentalized." Strong feelings of team loyalty aren't always a bad thing, but they can have a negative impact on cross-team work. Leaders should strive to develop a spirit of oneness for the entire organization. 2. Department-Wide Communication Cross-departmental conflicts can be a barrier to workplace productivity and employee engagement. Accounting's complaint that IT takes "forever" to respond to tickets, for example, could simply be a symptom of a different problem — poor tools for communication. Granicus reports that organizations with highly effective means of communication are "4.5 times more likely to have engaged employees." HR can minimize the friction between departments by helping employees share priorities and goals. Your teams should communicate well in advance of urgent deadlines that require collaboration. When employees have the ability to look far into the future and communicate their needs to their colleagues, they may be able to exceed expectations and be more productive. 3. Inter-Generational Cooperation The workforce is now made up of four different generations — with four different approaches to work. BizJournals recommends considering age diversity in the same vein as other forms of workplace diversity, including "gender, ethnicity, race, and religion." By providing opportunities for cross-generational collaboration, such as official mentor pairings, HR teams can prepare workers of all ages for productive relationships. In addition to cross-generational teams and relationships, SweetRush recommends leveraging a panel of age-diverse employees to develop training materials. By capturing the expertise of both older and younger workers, HR leaders can ensure that each generation's needs are accounted for. By providing employees with the tools and knowledge to work productively across teams, departments and generations, HR leaders can increase collaboration in the workplace. Technology, knowledge-sharing and relationship-building can all work to help you field a workforce that's flexible and ready to play well with others. For more information and for other articles like this, visit adp.com/Spark.

April 13th, 2016
forbes.com
Article
Remote Workplaces: Unraveling The Risks And Reward Of Flexible Work Environments

The potential risks and rewards of remote workplaces are among the hottest topics in HR today. ADP's study The Evolution of Work: The Changing Nature of the Global Workforce identified freedom as a basic human need, and consequently 81 percent of modern employees feel positively about being able to "work from anywhere in the world." An additional 49 percent of employees believe that the future of remote work is already happening today. While it's clear that contemporary talent values flexible work arrangements, CHROs and other HR leaders may feel a bit more hesitant about implementing a broad, work-from-home policy. From HR's perspective, work-from-home policies can offer a serious boost for critical talent retention strategies. The Society for Human Resource Management (SHRM), however, has highlighted the existence of a "flexibility paradox," or simply the risks of diminished work-life balance when an employee's home becomes their office. Worker stress costs the U.S. economy an estimated "$300 billion each year due to absenteeism, turnover, disabilities and reduced productivity," according to SHRM. In addition, maintaining productivity, engagement and collaboration can necessitate new technologies. Risk and Reward: What Employers and Employees Have to Say For employees, a primary draw to working from home is flexibility and work-life balance. For many personality types, a home environment can even increase productivity potential. However, there are risks to consider, such as collaboration difficulties, employee isolation and the higher possibility of distractions hindering productivity. From an employer's perspective, Bloomberg writes, common pitfalls of work-from-home policies can include increased incidences of employee disengagement, information and technology breaches and other liability issues. While mitigating common risks of work-from-home policies is best accomplished via collaboration between HR and legal counsel, HR can proactively prepare remote workers for success. Productivity By most accounts, employee productivity undergoes a boost when workers head to their home offices. The Harvard Business Review (HBR) reports that in one study, employees who worked remotely "were not only happier and less likely to quit but also more productive" than a control group working in an office. Individual or team productivity metrics can provide a clear set of expectations for accomplishments for the at-home worker and assuage any concerns about dips in productivity. But HRB goes on to report that poor productivity is often symptomatic of underlying cultural issues, such as mass disengagement or low morale, and not necessarily representative of the typical flexibly scheduled employee. Technologies to support remote worker productivity are often closely tied to internal and external communications. HR leaders should, therefore, consider adding the following to their portfolios: Internal chat software Web conferencing for internal and external communications Project management software Employee Engagement Gallup workplace studies indicate that remote workers are more likely to be engaged with their job than their office worker counterparts. However, the study admits that it's unclear whether previously engaged workers are more likely to head home, or remote work is a contributing factor. To maintain strong relationships between teams, HR should focus carefully on the technology needed to power engagement: Enterprise social networks Collaboration and file-sharing platforms Web conferencing Education and leadership development apps In many cases, HR should collaborate with team leads to develop strategies on the best applications of technology for engagement. Holding regular team meetings and one-on-one sessions via conferencing software can facilitate regular communications and feedback. Collaboration Regardless of your team's location, fostering collaboration can be a challenge. An underlying team culture of collaboration can be critical to encouraging employees to continue innovating and sharing knowledge when working from home. The following categories of technologies can be critical in enhancing collaboration: Team-based project management or prioritization tools Decision assistance tools to allow for voting Community-based knowledge sharing tools, such as employee portals As organizations worldwide increasingly turn to remote workplaces, CHROs must understand the benefits and risks to both their workers and their organization. In addition to open communication and education to mitigate risks, HR leaders must work closely with IT to build a comprehensive policy to ensure employees remain productive, engaged and collaborative while working from home. For more information on remote workplaces, download the report: Evolution of Work: The Changing Nature of the Global Workplace. For more information and for more articles like this, visit adp.com/Spark.

April 26th, 2016
forbes.com
Article
5 Smart And Data-Driven Tips For Sustainable Business Growth

When organizations fail to set sustainable business growth goals, CHROs may find that people are the ones that suffer. As Harvard Business Review (HBR) highlights, lofty targets can mean that that even "the best efforts go unrewarded, leaving people demoralized." As HR leaders work with executive teams to set growth targets, it's important to be prepared for common hurdles. In many cases, those include the challenge of ensuring profitability and sustainability during and after your organization's growth phases. Without an appropriate focus on potential trouble spots during growth, your growth initiatives could be doomed to fail before they even begin. So here are five smart strategies for sustainable business growth, and how you can use analytics to evaluate whether your organization is headed down the right path toward success.

April 26th, 2016
forbes.com
Article
Ways HR Data May Improve Your Bottom Line

The wealth of intelligence that can be gleaned from HR human capital management information systems could have remarkable value to your organization. Today's data-driven CHROs and HR leaders are discovering the potential to improve the bottom line with HR data-driven insights. According to Entrepreneur magazine, HR data and analytics are among the top areas of investment for HR teams, and implementation rates of big data programs are set to soar by 2018. The ADP Research Institute® also reports that a strengthened HR infrastructure can be critical to achieving many key objectives today and beyond, including the "overwhelming" tasks of global talent management and risk mitigation. For HR teams with a sufficient IT infrastructure to provide access to high-quality big data, the opportunities to realize cost savings and tax credits through analytics are immense.

April 21st, 2016
forbes.com
Article
Are You Prepared For The Coming Storm Of Generation Z Talent?

No longer just up-and-coming professionals, Pew Research reports Millennials, or individuals aged 20 to 35, now represent the largest segment of the U.S. workforce. What that means for CHROs? It is officially time to shift attention toward Generation Z, or people born after 1996. Not only is Gen Z beginning to enter the workforce, the New York Times reports they'll be the largest generation yet, at some 60 million members. For organizations struggling against talent shortages and impending boomer retirements, the oldest members of Generation Z can represent a new stream of entry-level talent for organizations. Here's how the youngest generation's values stack up against other members of the workforce, and how to capitalize on their values to stay relevant and competitive as your workforce evolves to include this new group.

April 26th, 2016
securityintelligence.com
Article
The Principle of Least Privilege Makes Total Sense, But How Do You Put It to Work?

It all starts with a PDF attachment. An employee doesn’t detect the signs of a social engineering attack, and so they open the attachment on their work-issued laptop, not knowing that their computer has local administrator access. Invisible malware then edits the laptop’s registry and erases the audit trails as it infiltrates the whole network. And this entire security breach could have been prevented with the principle of least privilege. Identity and access management (IAM) issues aren’t technically the leading cause of data breaches, but they’re definitely contributors. Countless enterprises are still using static, role-based access methods from the pre-cloud era, but assigning local admin group privileges based on a user’s job title is a recipe for overprivileged users and widespread vulnerabilities.

November 13th, 2019
mobilebusinessinsights.com
Article
Mobile hacking prevention: 3 ways C-level executives can protect data

Members of the C-suite aren’t just tasked with making hacking prevention decisions — they’re walking security risks. An eSecurity Planet study reveals executives are most at risk for mobile hacking attacks. The same report revealed 93 percent of members of the C-suite are concerned about the security threats faced by their increasingly mobile workforce. Implementing the right approach to mobile security needs to start at the top to ensure the organization’s sensitive data is protected from both technical and social engineering-based threats. Nearly one-third (32.5 percent) of CEOs’ mobile devices were subjects of attempted security attacks in a recent quarter, with 22.5 percent of those devices experiencing infection by medium- to high-severity malware, according to Skycure. Executives aren’t blind to mobile security risks, but cybercriminals understand decision-makers represent a potential payload of sensitive data.

August 29th, 2017
securityintelligence.com
Article
Considering Container Security? 6 Ways to Make a Case for Containerization

DevOp’s value to the organization depends on speed; velocity is a critical success measure on the road to digital transformation. While DevOps leaders understand the value of security by design, many struggle to create a secure code pipeline. In fact, according to a Logz.io report, 71 percent of industry professionals said their team lacks adequate knowledge of security best practices, such as container security and continuous delivery. Integrating security into the entire application life cycle without sacrificing speed isn’t simple. Countless organizations face a clear and overwhelming need to update both process and infrastructure for secure digital transformation.

August 28th, 2019
mobilebusinessinsights.com
Article
How women in technology can revolutionize app development

As executives consider ways to build successful mobile development teams, it’s important to ensure diversity. App development can benefit significantly from the inclusion of women in technology, as well as individuals from all backgrounds, ethnicities and races. Empowering female employees to excel in tech leadership roles can yield more transformative mobile development results. While women are absent from board leadership roles at nearly one-third of global firms, according to EY research, 30 percent female leadership can add 6 percentage points to profitability within the organization. Highly gender-diverse technology companies outperform their peers by 5.4 percent compared to just 1 to 2 percent in other industries, Morgan Stanley reports.

March 16th, 2018
securityintelligence.com
Article
7 Ways the Hidden World of the Darknet Is Evolving

The darknet isn’t as hidden as it used to be. The seamy digital underbelly of the internet, according to some sources, may be shrinking or entering the mainstream. After all, any digitally savvy person can figure out how to download a Tor browser and use cryptocurrency. Risks are certainly higher than ever for cybercriminals who use the darknet to openly sell narcotics, stolen data or illegal services. The original Silk Road founder, Ross Ulbricht, has lost appeals against a double life sentence plus 40 years for crimes of drug trafficking and money laundering beneath the surface of the web. And it’s easy to believe that the darknet isn’t as sketchy as it once was based on media stories. Narcotics traffickers are voluntarily banning sales of the synthetic opioid fentanyl due to safety concerns. Even Facebook has gone dark with an onion site accessed by 1 million Tor browser users each month.

June 28th, 2019
securityintelligence.com
Article
RSAC 2018 in Review: Highlights, Key Sessions and Emerging Trends

Last week, the RSA Conference 2018 drew 45,000 attendees to San Francisco’s Moscone Center for a week of education on the latest security trends, threats and solutions. Over its 27-year history as one of the world’s largest security conferences, RSAC has grown to a near-dizzying size. In 2018 the event included speeches from dozens of tech luminaries, 550 sessions and 650 exhibitors spread across a four-building campus. Keynote speakers this year included IBM Security General Manager Marc van Zadelhoff, Girls Who Code founder Reshma Saujani, game designer Jane McGonigal, activist Monica Lewinsky and RSA President Rohit Ghai.

April 24th, 2018
mobilebusinessinsights.com
Article
Healthcare mobility solutions: why mobile is key to data collection

Healthcare mobility solutions are becoming an integral part of many organizations’ care delivery systems. As health leaders work to improve patient care quality and outcomes while protecting electronic personal health information, mobile devices are improving data collection efficiency in the healthcare enterprise. More than three-quarters (81 percent) of physicians use smartphones for work, according to Kantar Media. Mobility has improved many areas of data operations, including information quality and transparency among members of the patient’s care team, but its impact on data collection is particularly profound. The role of healthcare mobility solutions in real-time data capture is already significant, but will likely continue to evolve in the years to come.

December 28th, 2017
securityintelligence.com
Article
10 Differences Between Digital Transformation Leaders and Laggards

Digital transformation isn’t just a matter of luck, perseverance or foresight. Research shows there are many differences between best-of-class enterprises, who are creating revolutionary new operating models, and their peers, who are falling behind. The challenge for enterprises is balancing speed with security and knowing how to roll out innovation in a way that creates advantages. Innovation leaders deploy more technologies, but their secret isn’t just speed — they’re also more likely to adopt certain strategies around design. Those leaders tend to consider data protection earlier in the process and tackle risks differently than their competitors.

November 11th, 2019
securityintelligence.com
Article
Can a Mature Bug Bounty Program Solve the Security Talent Shortage?

The IT skills gap has become a cybersecurity risk in its own right. As the security talent shortage increases, many organizations are considering alternatives to traditional hiring, including bug bounty programs, which offer formalized rewards for third-party disclosure of vulnerabilities. These programs aren’t new: Web browser vendor Netscape launched one of the first bug bounty programs in 1995 when it offered cash rewards to users who discovered security flaws in Netscape Navigator 2.0. While the concept is nearly 25 years old — and familiar to many security leaders — adoption remains relatively low.

June 14th, 2018
business2community.com
Blog Post
14 Tools to Create Images for Your Blog Posts in Less than 5 Minutes

A stock photo is worth a thousand words, but a custom image is worth a thousand page views. I’m pretty sure that almost every blogger knows on some level they should kick their addiction to stock photos and curated visual content. It’s enough to help you scrape by, but does it help you visually communicate your brand’s goals or voice? Do any of your audience members stop and say “wow, that’s a really cool picture!” Probably not, and this is why you should be investing in custom images. It’s easier said than done, though.

March 3rd, 2014
mobilebusinessinsights.com
Article
12 surprising mobile technology statistics from 2017

The new year is right around the corner. Reflecting on the top mobile technology trends over the past 12 months reveals significant changes in how individuals connect with mobile at home and at work. In many ways, 2017 has been the year mobility reached some major tipping points. Recent studies on mobility adoption, app trends and security reveal a changing mobile climate. Users are spending more time on video and demanding more personalized experiences if they’re comfortable sharing their data with brands. IT security professionals understand that between social engineering-based threats and the IoT, mobile security is more serious than ever before.

October 23rd, 2017
securityintelligence.com
Article
13 Retail Payment Security Tips for Safe 2019 Holiday Shopping

The holiday shopping season is officially upon us, and so is a new seasonal batch of payment security threats. The holiday sales rush spells payday for retail cybercriminals. Eight percent of consumers fell victim to identity theft or fraud during the holidays last year, according to a 2018 Experian survey, and nearly half of all holiday identity theft incidents are the result of shopping online. As you scramble to snag deals on gifts for your friends and family this month, don’t forget to stay safe and protect your sensitive data with these 13 security tips.

December 4th, 2019
mobilebusinessinsights.com
Article
Mobile analytics, VR, AI, apps: 6 retail innovations to watch in 2018

Digital transformation isn’t optional in retail, where mobile-empowered consumers have paved the way for new shopping experiences personalized through mobile analytics and enhanced with VR. With nearly 60 percent of today’s consumers using mobile devices to perform research in-store, there is a great increase in the demand for mobile-centered retail experiences, reports Retail Dive.

January 3rd, 2018
mobilebusinessinsights.com
Article
Mobile phishing in 2018: Why it's growing and how to stop it

A data-driven look at the impact of mobile phishing on email security, and the unique risks of text message social engineering attacks.

June 29th, 2018
mobilebusinessinsights.com
Blog Post
10 mobile myths that shouldn't spook you

An article debunking mobile myths about BYOD and other controversial topics. Written for an audience of CTOs, CIOs, CISOs, and other enterprise technology leaders.

October 31st, 2017
securityintelligence.com
Article
10 Surprisingly Bright Spots on the Darknet

A lighthearted look at the Darknet, and insights into how enterprise IT leaders should approach the dark web for threat inteligence.

September 10th, 2019
mobilebusinessinsights.com
Blog Post
Data protection secrets: The skeletons in a cybercriminal's closet

Most cybercriminals use social engineering in their attack strategies. A Nuix survey at the DEF CON hacker conference revealed 84 percent use social media and other methods to research their targets, while 86 percent deploy vulnerability scanning to plan out how they’ll gain traction through a mobile attack. Exactly half of the cybercriminals who participated in this survey admitted each mobile attack is fully customized based on findings about individuals and technical vulnerabilities during the research phase.

October 12th, 2017
mobilebusinessinsights.com
Article
Mobile World Congress 2018, Day 4: Wrapping up with women in tech

It’s been an action-packed four days in Barcelona as Mobile World Congress 2018 draws to a close. The world’s largest gathering on mobility, MWC 2018 drew 108,000 attendees and 2,300 exhibitors from 204 countries worldwide. Some of the most influential minds and innovative organizations in the tech industry convened around mobile development, AI and cognitive intelligence, IoT and more. On the ground at Mobile World Congress, attendees braved torrential rain to talk the ethics of applied AI, spectate the first 3-D selfies and gain inspiration that mobile will create a better future for everyone.

March 1st, 2018
securityintelligence.com
Article
5 Ways CISOs Can Improve Collaboration on Security Risks

As operational and security risks converge in the enterprise, the role of the chief information security officer (CISO) is evolving and expanding. Today’s CISO is seated closer to the executive function than ever before, and tasked with educating executives on enterprise security. According to a recent white paper from RSA, 82 percent of CISOs believe their executive leadership is on board with the security team’s efforts to protect the network and data. As security risks become increasingly intertwined with business risks, it’s no wonder the executive board is starting to catch on to the criticality of data security.

October 29th, 2018
securityintelligence.com
Article
Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk

The circle of life is predictable and short for corporate-owned mobile devices. Aging devices are ideally retired before they become a security or productivity risk, wiped clean and recycled. Disposal is a natural, important part of endpoint management, but it’s often beyond IT’s control. The rise of bring-your-own-device (BYOD) culture has made it significantly more complicated to ensure mobile endpoints never ride into the sunset with sensitive data onboard. Many resold smartphones still contain damaging personal data. Others contain traces of wiped data that can be recovered by hackers with moderate forensic skills.

September 17th, 2019
securityintelligence.com
Article
These 5 Types of Insider Threats Could Lead to Costly Data Breaches

Insider breaches — those caused by employees and leaders within an organization — are among the costliest and hardest to detect of all data breaches. Two-thirds of total data records compromised in 2017 were the result of inadvertent insiders, according to the “2018 IBM X-Force Threat Intelligence Index,” and insider threats are the cause of 60 percent of cyberattacks. Meanwhile, misconfigured cloud servers and networked backup incidents caused by employee negligence collectively exposed over 2 billion records last year. While organizations focus significant resources on the mitigation of external threat actors, insider risks are likely to pose an even greater financial threat to the enterprise. According to the Ponemon Institute’s “2018 Cost of Insider Threats” report, the average cost of insider-caused incidents was $8.76 million in 2017 — more than twice the $3.86 million global average cost of all breaches during the same year.

August 21st, 2018
mobilebusinessinsights.com
Blog Post
3 lessons for your mobility team from pro sports

It’s not all about the technology; your team is just as critical to advancing enterprise mobility. Though there’s little question that the enterprise mobility landscape is filled with challenges, C-level executives are wise to recognize their role for what it is — a mission-critical part of the organization. As a C-level exec, you know the business world is a fierce place. Between pressure to compete and talent shortages, it makes sense to think like someone who has one of the most high-pressure jobs in the world: the general manager (GM) of a professional sports team. A 2017 Apperian survey found that the complexity of the mobile landscape is a challenge facing 55 percent of executives. Thirty percent struggle with a lack of budget, while 13 percent cite a lack of talent as a barrier. But pro athletes are no strangers to obstacles.

November 30th, 2017
mobilebusinessinsights.com
Article
The pros and cons of technology in society: Both sides of the story

As the global mobility landscape continues to evolve and expand, it’s important to reflect on both the pros and cons of technology in society. In 2018, researchers at Zenith predict 66 percent of consumers in 52 key countries worldwide will own a smartphone. Simultaneously, IDC projects enterprise mobility spending worldwide will top $1.6 trillion this year. Clearly, there’s unstoppable momentum behind mobile innovation. Understanding the advantages of technology as well as the negative ways it affects society and culture can enable important conversations about inclusiveness and tech justice. While the following list is a far from an exhaustive look at the pros and cons of technology and society, they are a few examples worth considering:

April 23rd, 2018
mobilebusinessinsights.com
Article
Retail mobile innovation: 3 reasons AR apps may yield CX success

Executives in the retail industry face serious pressure to deliver on mobile innovation. Redefining the customer experience (CX) isn’t optional in today’s fast-changing marketplace of mobile consumers. STORES Magazine Editor Susan Reda recently described 2018 as one of the most transformative periods of retail she had experienced in decades in an article featured on NRF’s website. Retailers who use mobile to improve in-store experiences are projected to achieve 146 percent sales growth in 2018, according to Business Wire. Simultaneously, 75 percent of respondents said they do not have the right mobile apps in place. Though it may be clear that development is a priority in 2018, there’s less certainty about which retail mobile innovations are worth investment.

January 29th, 2018
securityintelligence.com
Article
The Biggest Stories From RSAC 2019: What Scares the Security Experts?

RSAC 2019 has officially wrapped. The reported attendance at San Francisco’s Moscone Center was more than 42,500, but to anyone who was there, it seemed like there was at least 60,000 security professionals on the ground. Whether or not you attended, there was no possible way to take in all of the 31 keynotes, 621 sessions and more than 700 vendors in the business expo. Fortunately, the RSA show website is filled with free materials, including on-demand presentation videos, conference blog posts and slide decks to capture what you missed. When you’re at a show as large as RSAC 2019, it’s only natural that you’ll discover perspectives that are new and, sometimes, at odds. The conference brings together luminaries and cybersecurity experts from diverse fields such as research, government, industry and nonprofit sectors. This can result in tension, like the clash in perspectives between cryptography experts and government officials around privacy rights on the show’s opening day.

March 18th, 2019
ibmbigdatahub.com
Article
The future of wind energy: Seamlessly powering urban areas

The future of wind energy is closely tied with tomorrow's urban power sources, as cities look toward renewable energy resources. Skyscrapers in Brooklyn, Portland and other major urban areas nationwide are beginning to feature small rooftop turbine installations, according to ScienceLine. While there are an estimated 155,000 small turbines under 100 kilowatts in the U.S., their current output is only enough to power 1,840 average American homes, according to the source. Planners are using small turbines in urban areas to change consumer attitudes toward renewable energy, and they must work collaboratively with energy companies if they want to have a bigger impact on energy generation.

December 14th, 2015
securityintelligence.com
Article
Blockchain Technology: Perspectives From the RSA Conference 2018

Blockchain technology was perhaps the most controversial topic at last week’s RSA Conference in San Francisco. It’s fitting, because distributed ledger technologies are also hotly debated in conversations about enterprise technology. For most organizations, the idea of blockchain is suspended somewhere between hype and disappointment, realism and naked hope. The perspective all depends on who you’re talking to. Twitter is a fairly good barometer to gauge how these competing viewpoints played out at RSAC 2018. Some participants in the discussion asserted that blockchain is the key to achieving General Data Protection Regulation (GDPR) compliance, while others questioned the technology’s scalability. Some RSAC attendees were unfamiliar with blockchain altogether.

April 23rd, 2018
mobilebusinessinsights.com
Article
SMS phishing: The mobile security risk you need to know about

Social engineering schemes targeted at executives and business decision-makers are big business for cybercriminals. The FBI reports CEO email scams cost US businesses over $360 million in 2016. However, the latest mobile security risk could land in your text message folder, not your email inbox. SMS phishing, or “smishing,” is on the rise. Though SMS phishing is nearly a decade old, the rate of attacks is growing quickly. According to Secure List, Kaspersky Lab data suggests smishing rates increased 300 percent between April and June 2017 alone. Like phishing, smishing scams generally encourage users to click on a link or respond directly with personal information. Cybercriminals design messages to snag personal information or infiltrate company networks.

October 16th, 2017
business2community.com
Blog Post
59 Killer Content Marketing Stats: 2014 Edition

Content marketing moves incredibly fast. So fast that just a decade ago, most of us had never heard of it – today, the tactic is used by 93% of marketers. There’s been a world of changes between then and now, which is why fresh research is crucially important. Whether you’re creating a blog or a presentation to prove to your boss just why original articles are the future, you’re in luck. We’ve curated 59 of the most powerful content marketing stats from the latest, high-quality research reports. Topics covered range from content marketing usage to consumer preferences, and far beyond. Buckle your seatbelts, because this is going to be epic:

February 12th, 2014
securityintelligence.com
Article
10 Reasons Cyber Range Simulation Is Vital to Incident Response

Are you really prepared to respond to a cyberattack? You don’t want to discover halfway through a data breach that your incident response (IR) playbook cracks under pressure. Just 23 percent of organizations have a consistently applied cybersecurity response plan, according to IBM Security and the Ponemon Institute’s recent “2019 Study on the Cyber Resilient Organization,” and even fewer firms know if their playbook can perform. What’s more, only 54 percent of organizations with an IR plan regularly test it. Cyber range simulations help build preparedness by allowing organizations to stress-test an IR playbook in a real-world situation. Immersive training builds situational awareness in a way that’s very hard to replicate with tabletop exercises or classroom training. Simulation leads to on-the-ground experience and offers numerous benefits, including performance data, real-time expert feedback and cross-functional training.

September 11th, 2019
securityintelligence.com
Article
Vigilance Is Key to Mitigating Retail Cybersecurity Risk on Black Friday

Retail cybersecurity is always crucial, but it’s officially time for both retailers and customers to prepare for Black Friday. This year, analysts predict global retail sales on Black Friday and Cyber Monday will hit $7.5 billion, a 20 percent increase over 2018. Cybercriminals are known to follow the money. The retail industry is a top target for financially motivated attacks year-round, and threat actors view holiday sales as an opportunity to strike it rich. The rate of cyberattacks against retailers spikes every November in the days after Thanksgiving.

November 25th, 2019
securityintelligence.com
Article
11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

global average cost of a data breach is now $3.92 million — a 12 percent increase since 2014. Fortunately, the average cybersecurity budget is also increasing alongside breach cleanup costs. How to prioritize your budget is never a simple question. However, there’s a lot of insight to be gleaned from industry studies on how chief information security officers (CISOs) are spending organization funds. For the first time ever, more than half of CISOs have a job tenure of more than five years, according to Kaspersky. Today’s average security chief is more seasoned than ever before.

October 15th, 2019
business2community.com
Blog Post
3 Conversion Psychology Principles to Use in Sales Copy

Sales people are in the business of convincing others. It may surprise you, but marketers are as well. HubSpot’s Ginny Soskey writes that it’s crucial to understand why “other people think and act the way you do.” In order to convert new leads, a marketer needs deep understanding of their company’s customers. You should also develop a strong knowledge of behavioral psychology principles. Choosing to integrate behavioral psychology into your sales copy process could be the best content marketing decision you make this year. By understanding what your future customers need from your organization, you’ll make the shift from self-centered landing pages to content that people love. Here are three of the most universal and meaningful psychology laws to get you started:

December 10th, 2014
mobilebusinessinsights.com
Article
What is IDaaS, and why does your mobile strategy need it?

The subscription economy has transformed enterprise technology and brought a new world of as-a-service offerings, such as software-as-a-service (SaaS), platform-as-a-service (PaaS) and desktop-as-a-service (DaaS). Now, there’s identity-as-a-service (IDaaS), an emerging technology category with the potential to significantly enhance secure user behaviors, especially in BYOD enterprise environments.

October 9th, 2017
ibmbigdatahub.com
Article
Analytics for renewable energy storage integration: Predicting the

As energy companies comply with regulatory requirements to use less fossil fuel, batteries may represent the missing link between renewable energy generation and utilization. According to Scientific American, the intermittent nature of renewable sources like wind and solar makes storage a primary area of focus. When integrated into a grid, stored energy can smooth disparities between consumer demand and availability, offering an availability advantage to utilities.

December 16th, 2015
securityintelligence.com
Article
Bridging the Divided Perspectives on SOC Tech and Talent

New research reveals the majority of security professionals involved in the management of a security operations center (SOC) want change. Across enterprises, however, there is a divide between the perspectives of executives, directors and individuals involved in day-to-day incident response (IR) activities. Sixty-two percent of executives, managers and analysts believe their organization needs improvement around technology, talent, processes or another key area of operations, according to Exabeam’s 2018 State of the SOC report. While technology is the biggest pain point across all positions, security operations professionals working in frontline roles are more than twice as likely as executives to identify technology as a barrier.

July 27th, 2018
mobilebusinessinsights.com
Article
How 3 organizations are riding the 'third way' in mobile innovation

In an increasingly fast-paced, consumer-focused global economy, mobile innovation has resulted in massive industry disruption. According to the American Enterprise Institute, 88 percent of 1955’s Fortune 500 companies are gone. Though many people are familiar with incremental versus radical disruption, the “third way” of innovating is all about the “power of little ideas.” Many of today’s most effective organizations are engaged with this approach, which, according to MIT lecturer David Robertson, “improves the value of a core product by innovating around it.”

September 12th, 2017
mobilebusinessinsights.com
Article
Mobile management services and technologies for the classroom

bile technology is a prominent part of the classroom in 2017 as schools focus on acquiring devices, developing mobile management services and finding the right applications for learning. More than 50 percent of teachers in the US report a 1:1 ratio of devices for students, an increase of 10 percentage points over last school year, according to Front Row.

September 22nd, 2017
mobilebusinessinsights.com
Blog Post
Cyberattack avoidance lessons from the White House

It seems no one is immune when it comes to being tricked by cybercriminals, with several top White House officials revealing they were hoodwinked recently by fake emails. CNN reports a hacker impersonated President Donald Trump’s son-in-law, Jared Kushner, and former Chief of Staff Reince Priebus in a late July cyberattack. Homeland Security Adviser Tom Bossert accepted a soiree invitation from a sender he believed was Kushner and provided his personal email address. Then-White House Communications Director Anthony Scaramucci was also harpooned into a heated email exchange with the cybercriminal, whom he believed was Priebus.

September 19th, 2017
mobilebusinessinsights.com
Article
4 ways GDPR compliance will impact operations

While the May 25 deadline for General Data Protection Act (GDPR) compliance has passed, many organizations are still shifting operations in this new era of data privacy. Despite the General Data Protection Act’s potential noncompliance penalties of up to and over 20 million euros, many organizations struggled to adapt their practices for the collection and processing of personal data. An April 2018 survey of over 1,000 organizations by Ponemon Institute found that almost 50 percent would not be fully compliant by May 25, including roughly 40 percent of tech industry respondents.

June 15th, 2018
mobilebusinessinsights.com
Article
Enterprise mobility: Selecting mobile services for changing workforces

Complexity is the new normal in enterprise mobility management. More than half of enterprises use a combination of CYOD, BYOD and other choice-driven approaches to mobility, a 2017 report from Mobi explains. Despite increased complexity, executives are hopeful that mobility solutions will drive results. Investment in mobile services for simplicity and security at scale are, predictably, at peak levels. Two-thirds of executives surveyed by the IBM Institute for Business Value (IBV) will spend at least $5 million on mobile initiatives this year. While 62 percent of these executives said their successful mobile initiatives paid for themselves in 12 months or fewer, strategic selection is key to achieving these returns.

December 28th, 2017
mobilebusinessinsights.com
Blog Post
Data storage apps and services for the 2018 enterprise

There are many new cutting-edge data storage apps and services available — and for good reason. Not only do these allow users to get quick and accurate insights, but they also allow for high-volume data storage, multi-platform compatibility and improved security — which are just a few of their benefits. But when considering new roles for data storage in any organization, it’s important to take a look at where exactly mobile fits into ever-growing enterprise data demands and the growing role of mobile security, too.

April 17th, 2018
business2community.com
Blog Post
30 Thought Leaders on the Top Marketing Skills for 2014

2011 was the year of social media, 2012 was the year of content marketing, and 2013 was the year where these two factors convened. But what does 2014 hold in store for inbound marketing professionals? We got the second-best thing to a crystal ball, which was to ask 30 of the sharpest marketers we know to give us their prediction. From big data to delegation, check out the skills these thought leaders think will matter most this year: In 2014, professional marketers…will have to be skilled in delegation…Marketers will need to be able to define, assign, review, and measure non-content focused marketing responsibilities, from advanced code to data modeling. These marketers will still have to be versed in these skills in order to effectively communicate expectations.

January 8th, 2014
© ClearVoice, Inc.