Customer data privacy and security
Data privacy and security form the foundation of customer trust, especially in this age of massive data breaches and increased regulator scrutiny on how companies both secure customer data and share it with partners and other entities. Here's the latest news and breakdown of best practices for customer privacy and security.
New & Notable
Customer data privacy and security News
-
January 25, 2022
25
Jan'22
Google debuts Topics, its latest third-party cookie replacement
Topics, a replacement for browser tracking cookies, is Google's latest idea to preserve browser privacy while preserving the value of its digital ad platform.
-
September 23, 2021
23
Sep'21
Senators press Facebook, Google on consumer data value
Facebook and Google took the hot seat Tuesday during a Senate subcommittee hearing to defend their companies' business practices and answered questions regarding consumer data.
-
June 23, 2021
23
Jun'21
Salesforce previews low-code, pro-code developer tools
Salesforce to release new low-code and pro-code tools for developers, as well as DevOps Center, which catalogs app dev efforts and offers a planning platform.
-
February 18, 2021
18
Feb'21
Qualtrics vaccine management gains steam among states
Qualtrics lands Missouri's state vaccine registration site as the voice-of-the-customer tech vendor claims 200 county governments and public health organizations among its users.
Customer data privacy and security Get Started
Bring yourself up to speed with our introductory content
-
customer-managed relationship (CMR)
A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, apps and perhaps internet capability to encourage the customer to control access to information and ordering. Continue Reading
-
information lifecycle management (ILM)
Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, starting with its creation and acquisition through when it becomes obsolete and is deleted. Continue Reading
-
Endpoint security quiz: Test your knowledge
Test your knowledge of SASE, split tunneling, and device discovery tool capabilities and best practices in this endpoint security quiz for IT professionals. Continue Reading
Evaluate Customer data privacy and security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
How privacy engineers promote innovation and trust
Forward-thinking companies are hiring privacy engineers. Could your organization benefit? Uncover how these experts promote innovation and fortify customer trust. Continue Reading
-
Select a customer IAM architecture to boost business, security
Not all customer IAM platforms are created equal. Will a security-focused or marketing-focused CIAM architecture best meet your organization's needs? Read on for help deciding. Continue Reading
-
Evolving customer data platform features set sights on CX
In pursuit of the perfect customer experience, CX pros increasingly look to CDPs to unify data and provide a deeper understanding of behavior patterns and buying habits. Continue Reading
Manage Customer data privacy and security
Learn to apply best practices and optimize your operations.
-
How to train agents on call center fraud detection
Poorly trained call center agents are easy targets for bad actors. Organizations must prepare for call center fraud with proper agent training and anti-fraud technologies. Continue Reading
-
3 steps to create a low-friction authentication experience
Passwords are no longer sufficient, but more secure authentication methods frustrate users. Explore how to create a low-friction authentication process for improved UX and trust. Continue Reading
-
What the loss of third-party cookies means for IT departments
Due to browsers and companies making it all but impossible to use third-party cookies, companies should consider a strong foundation of customer data to stay relevant. Continue Reading
Problem Solve Customer data privacy and security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Who wins the security vs. privacy debate in the age of AI?
When trying to maintain balance between security and privacy in an AI-enabled world, who decides which side should tip and when? So continues the security vs. privacy debate. Continue Reading
-
IoT security regulations refocus data privacy best practices
New and old IoT regulations create a maze of rules and best practices that organizations must navigate to become more transparent about their IoT security practices. Continue Reading
-
IoT data privacy forces organizations to rethink data ownership
Now more than ever, providers of IoT devices and experiences play an integral role in addressing IoT data privacy issues and influencing outcomes, market forces and societal health. Continue Reading