Sensitive Personal Data

Sensitive Personal Data Reports
CDP Beyond Marketing
sponsored by Informatica
WHITE PAPER: Data is taking over, and customer experience strategy is no exception. Today’s customers expect timely, personalized messages, and one of the most effective ways to do that is by harnessing and analyzing customer data with a CDP. Explore some of the top use cases for CDPs and tips for getting started in this white paper.
Posted: 08 Feb 2021 | Published: 19 Aug 2020

Informatica

Mozilla Gives Employees The Freedom To Solve Problems While Maintaining Enterprise Data Governance And Privacy
sponsored by Alchemer
CASE STUDY: In this case study, discover why Mozilla chose data collection platform Alchemer, and how its helped them gather customer feedback to improve experiences.
Posted: 15 Mar 2021 | Published: 12 Feb 2021

Alchemer

The components and objectives of privacy engineering
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

ComputerWeekly.com

CW Innovation Awards: SIA taps blockchain for loyalty app
sponsored by ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
Posted: 11 May 2021 | Published: 11 May 2021

ComputerWeekly.com

How CX will change in 2021
sponsored by Alchemer
WEBCAST: Digital transformation is having a dramatic effect on customer expectations. Watch this brief video to hear from experts at Alchemer as they discuss digital trends and how they’re shaping the future of CX.
Posted: 15 Mar 2021 | Premiered: Feb 11, 2021

Alchemer

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Data Privacy e-Book
sponsored by SearchSecurity.co.UK
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

SearchSecurity.co.UK

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Gigya

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire