I have all the data…how do I find it? A case for Enterprise Data Catalog

The era of Big Data has been growing over the last 10 years.  Many enterprises have deployed a Hadoop distribution and have put in as much data as possible hoping to solve business problems and drive growth.  Data is the new currency is what we all hear, and we hoard all data we can get

Marketing Analytics and Cybersecurity

Cybersecurity and marketing analytics go hand-in-hand because at the end of the day it’s still about keeping data about your customer and prospects safe and out of the hands of cyber criminals.  You certainly do not want the theft of sensitive information to be the next news headline! In this first of six video blogs,

CTI CustomerUniverse: Insights and Analytics

In this part 4 of 6 video blogs, Mark Janowicz, Product Director of CTI CustomerUniverse explains how CTI provides marketers with insights and analytics to help complete the 360-degree view of the customer. Touching on the unique attributes of the CTI CustomerUniverse; Mark discusses how customer insights and analytics allow Marketers to review behaviors as

CTI CustomerUniverse: Getting to a 360-Degree View of the Customer

In this part 3 of 6 video blog series: Mark Janowicz, Product Director of CTI CustomerUniverse explains how CTI provides marketers with a complete 360-degree view of the customer. Touching on the unique attributes of the CTI CustomerUniverse; Mark discusses how the collecting, combining and visualization of a number of marketing metrics from customer analytics

There is no immunity from cyber attacks, so be prepared

Threat Assessment

Devastating cases of cyber-attack scenarios continue to mount. Unfortunately,  the most recent high-profile example is a harbinger of things to come.  By now, everyone is at least peripherally aware of the WannaCry ransomware attack that occurred just a few weeks ago.  If you somehow missed it, the WannaCry ransomware attack was a worldwide exploit by

Why You Should Adopt a Cybersecurity Framework

A Primer on the NIST Cybersecurity Framework Adverse security events make the news daily; from compromised personal information to ransomware.  The IoT (Internet of Things) has opened up all kinds of new possibilities for the bad guys.   These internet-connected devices that we bring into our homes / businesses are being exploited.[1] Is your organization prepared