Connect with us

Startups

Internal Issues And Regulatory Pressure Kill Off Meta’s Crypto Project “Diem”

Published

on

Diem Association, the consortium founded in 2019 to build a payment network linked to the cryptocurrency promoted by Meta Platforms Inc (NASDAQ:FB) has reached an agreement to sell its technological assets to Silvergate Capital Corp (NYSE:SI) for $200 million. Silvergate focuses on bitcoin and blockchain companies.

sergeitokmakov / Pixabay – Valuewalk

Q4 2021 hedge fund letters, conferences and more

Foiled Plans

As reported by The Washington Post, Libra —as it was known initially— sought to create a digital currency backed by a basket of currencies. However, given the pressure from regulators, it ended up being backed solely by the dollar to offer more stability.

In 2020, the consortium hired Stuart Levey, a former U.S. Treasury official and lead counsel for HSBC Holdings plc (LON:HSBA), who as CEO dropped the Libra name in favor of Diem.

Also, last May, the group moved its operations from Switzerland to the U.S. and announced that Silvergate would become the exclusive issuer of its stablecoin and manage its reserves. However, the project is yet to gain approval by U.S. regulators while David Marcus, the brains behind the initiative, left Meta late last year.

Thus, with the sale of its assets, the platform falls apart less than three years after the public presentation of Libra, the cryptocurrency backed by reserve assets aimed at Facebook and WhatsApp users.

Imploding

The Washington Post reports that “Internal troubles also helped scuttle the project, including clashes of vision between its leader and chief backer, former Facebook vice president Marcus, and CEO Mark Zuckerberg, one of the people said.”

“Marcus, a well-liked executive who was formerly president of PayPal, announced his resignation in November —just two months after he had traveled to Washington to pitch the recently rebranded project to journalists and regulators.”

According to Bloomberg, Meta owns about a third of the consortium and the rest is owned by association members, which include venture capital firms and technology companies caused Facebook to decide to change focus and rename the project to Diem.

Meta is part of the Entrepreneur Index, which tracks 60 of the largest publicly traded companies managed by their founders or their founders’ families.

Startups

Better together: Offsetting cybersecurity’s labor challenges with API integrations

Published

on

The labor challenges afflicting cybersecurity teams far and wide are no secret. A razor-tight hiring market coupled with surging demand and an accelerating threat landscape has created a perfect storm of complexity, resulting in a widening skills gap that is driving higher levels of burnout and human error across the sector. In fact, Verizon’s independently commissioned 2022 Data Breach Investigations Report found that 82% of breaches today involve some degree of human error. Whether it’s an unsuspecting end user or a bleary-eyed analyst, the vulnerabilities caused by cognitive overload shouldn’t be overlooked.  

Take the recent high-profile Uber data breach. A malicious actor, posing as an internal IT administrator, used digital collaboration channels to trick an Uber employee into giving up their VPN credentials, leading to a total compromise of the rideshare giant’s network infrastructure. The breach exemplified the consequences of a social engineering attack targeting the always-on hybrid workforce. And with the rate of such attacks accelerating in volume and velocity, it’s clear that more visibility of these threats is needed for security teams to effectively remediate them.

Many organizations are investing in a plethora of new, best-in-class security products in response to staffing shortages. However, reactive patchwork spending on the industry’s latest niche products shouldn’t be viewed as the answer, as the tool sprawl often creates additional complexity that hurts organizations more than it helps. Enterprises, on average, have 60 to 80 different security monitoring tools in their portfolio, many of which go unused, underutilized or forgotten. Forcing security teams to master a myriad of tools, consoles and workflows shifts priorities from managing risk to managing technology.

An integrated cybersecurity framework

The companies best positioned to offset cybersecurity’s labor challenges are those adopting best-of-breed security tools and platforms that offer a deep library of API and third-party integrations. Above all, an integrated framework empowers organizations to effectively navigate their unique environments by consolidating tools and reducing human error through the following three processes:

Event

Intelligent Security Summit

Learn the critical role of AI & ML in cybersecurity and industry specific case studies on December 8. Register for your free pass today.


Register Now

  • Improved protection via security intelligence and threat sharing: This enables rapid recognition and response to incoming threats via machine learning analytics tools, strengthening a human analyst’s ability to formulate swift and comprehensive cyberdefense measures.
  • Improved efficiency via automation: This enables offloading of repetitive and mundane manual tasks to AI-enabled tools, streamlining human workflows by accelerating and improving key facets of incident response and vulnerability management.
  • Improved prevention via sharing and consolidating tool data: This enables complete, real-time visibility into an organization’s entire security environment to promote the creation of targeted alerts that uncover unknown threats.

In collaborating with a wider range of security vendors, organizations leveraging API integrations benefit from the combined knowledge of all integrated platforms to greatly improve overall security posture. The extensive access to timely threat intelligence allows security teams to align prevention, investigation and response plans across multiple security controls, as well as increase the speed of their detection and remediation efforts.

Amid the widespread adoption of cloud-based hybrid work environments, it’s increasingly clear that organizational security architectures must consist of scalable, tightly integrated solutions that combine the right balance of automated prevention, detection and response capabilities to effectively protect data across its lifecycle.

Enhancing detection and increasing cybersecurity efficacy

An open API integration framework is the embodiment of unlocking strength in numbers. It stitches together the critical functions and processes performed by foundational security tools — email security, endpoint security, web security, NDR, data security — into a single meshed framework that operates in unison and shares centralized threat intelligence data across its ecosystem. By connecting all the pieces of the puzzle, organizations gain the resources to enhance their prevention and detection capabilities in complex environments.

In one scenario, an API framework could enable automated processes to continuously flow between an email gateway and security service edge (SSE) to corresponding SIEM/XDR systems. This would allow security teams to share rich logging, metadata, indicators of compromise, malicious URLs, user activity, data movement and machine learning analytics in real time. The AI-powered SIEM platform automates the analysis of that threat data, sifting through the noise to generate actionable alerts with contextual information for security teams. Meanwhile, the real-time contextual insights provide simplified guidance for analysts to alleviate potential threats and, if needed, formulate a swift response to an attack.

With access to a wider range of threat data touchpoints, cybersecurity teams can also create customized scripts within the overarching API library. This gives them “targeted capabilities” that more directly align with their specific needs and skillsets. For instance, the team could create a script that simultaneously analyzes email security logs from Vendor A, data protection logs from Vendor B, web security click logs from Vendor C, and spam filter logs from Vendor D, based on which intel is most relevant to their specific use case. Filtering the exceedingly high volumes of incoming alerts enhances the efficiency of the entire team, empowering analysts to identify needles in the haystack by prioritizing the right alerts at the right times for maximized protection.

Automating manual processes and workflows

Despite the growing number of innovative, best-in-class products available on the market today, it’s important to remember that a multi-vector social engineering attack is exceedingly difficult for hybrid security teams to combat regardless of the tools in their stack. Quick and agile responses are non-negotiable in these situations, but with resources stretched thin and employees working from multiple locations, executing swift corrective action free of human error is easier said than done. Even the most experienced and skilled security teams are susceptible to mistakes while trying to remediate an attack. Therefore, identifying how to automate well-defined processes wherever possible is imperative for tightening these response durations and ensuring security teams can remediate quickly and effectively.

With access to an open API library, organizations can integrate the capabilities of additional AI/ML security tools into their existing security architecture to automate the repetitive steps of protection, detection, response, mitigation and intelligence sharing. Whether it’s informing an endpoint security provider of an emerging alert, or securely moving data from one storage solution to another, API-driven automation can handle the routine, error-prone tasks cybersecurity teams perform every day. Streamlining these otherwise human-centric workflows allows overstretched analysts to instead focus on more critical threat assessments requiring extensive time and attention. That, on a macro level, strengthens the security posture of the greater organization.

There’s no magic bullet that will completely reverse cybersecurity’s labor challenges in the immediate future. But there are proactive steps organizations can take now to provide the critical support their security teams need today. For effectively navigating a complex threat landscape, there’s no better place to start than with the applied adoption of a deep API integration framework.

After all, cybersecurity is a team sport. Why defend alone when you can defend together? 

Joseph Tibbetts is senior director for tech alliances and API at Mimecast.

Source link

Continue Reading

Startups

This Top-Rated PDF Solution Is 66% Off Now

Published

on

Opinions expressed by Entrepreneur contributors are their own.

Paper has made its way largely out of business, but that doesn’t mean you don’t still work with documents regularly. Instead, we’re just working with them differently: with the dreaded PDF. These static files can be great if you’re positive that a document is ready, but a serious nightmare when you have to make changes. When you’re working with a lot of PDFs, you need a quality digital solution.



Superace

We’ve got a deal you’ll like. For a limited time, you can get a lifetime subscription to UPDF Pro for 66% off.

UPDF Pro is one of the top-rated PDF solutions on the market. Geeky Gadget writes, “UPDF is a potent PDF editor and PDF converter designed to stay up with advanced technologies. It ensures that whichever features you use are up to date. UPDF not only converts PDF to Word but can perform many advanced editing.” Fossbytes adds, “UPDF doesn’t have a boring interface like other PDF software. The design is stunning and eye-catching. On top of it, it is convenient to use. You wouldn’t be bothered with a complex design that is very time-consuming.”

These are just the tip of the iceberg of positive reviews for this all-in-one PDF solution for individuals and businesses. With it, you can edit any PDF document across Windows, Mac, iOS, and Android devices, adding or deleting text, editing fonts and color, and much more. The tool allows you to add, crop, rotate, replace, extract or delete images, watermark documents, and password-protect them for elevated confidentiality. You can also easily annotate PDFs, highlight, underline, or strike out text, add shapes and notes, and much more. Finally, it’s even easy to convert any PDF to Word, Excel, PowerPoint, and a ton of other file types in just a click.

Working with PDFs has never been easier than with a lifetime subscription to UPDF Pro. Grab it on sale for 66% off $149 at just $49.99, the best price you’ll find online.

Prices subject to change.

Continue Reading

Startups

Using data to boost event ROI

Published

on

Events are essential to any marketing strategy. Because they have the power to bring people together, events offer a unique opportunity to engage and deeply connect with a target audience while enriching a sales pipeline for the business. 

During the pandemic, events went through a transformation. In addition to navigating drastic changes to how and where we met, event experience leaders employed new technologies to facilitate connections. In so doing, they learned more about improving event experiences for all attendees, speakers and sponsors. The most significant change to events: Technological advancements enable event organizers to act on data insights before, during and after an event to optimize outcomes.

As we enter a new era of events, it’s more critical than ever to know how to capture the right data — and use it meaningfully. According to a recent survey of more than 200 event organizers, 85% plan to host at least three in-person events in 2023, with 35% planning to host at least 10. The opportunity is ripe to unleash the power of event data to maximize business impact. 

In-person events, reimagined with better data 

With event professionals producing in-person events again, they bring the lessons learned from more than two years of constant upheaval and technological transformation. Event experience leaders at all organizations are tackling the “event impact gap”: The disparity between event organizers’ aspirations to produce impactful experiences and their ability to execute those goals with available technology.

Event

Intelligent Security Summit

Learn the critical role of AI & ML in cybersecurity and industry specific case studies on December 8. Register for your free pass today.


Register Now

While the role of event organizer has been evolving for many years, the pandemic quickly accelerated the change. In addition to planning and logistics expertise, event organizers now bring a host of other skills to the table: data analysis, marketing operations and digital production. But even with their enhanced skillsets, organizers continue to wrestle with outdated event software that keeps them from accessing and activating their data. That obstacle hinders organizers’ ability to design and execute personalized experiences and truly connect with their audiences. 

Better data activation empowers marketers to personalize outreach and drive engagement at scale, incorporating events deeper into their demand generation strategies. This fosters attendee engagement, driving increased revenue and ROI. 

Leveraging data to accelerate pipeline

In-person events possess enormous data potential waiting to be unlocked. Events stand out as a prime opportunity to understand how your target audience behaves, where their interests lie and what engages them deeply. When you’re onsite, you have an unparalleled window into the content, peers and exhibitors that appeal to your audience and how the audience is connecting to your brand. These insights inform both your future event strategy and your broader marketing strategy.

Use data to engage attendees

It’s one thing to decide what data to collect and another to be strategic about what you’ll do with the data. Event organizers’ experience executing virtual events showed that having access to data is half the battle. The real value of your data lies in your ability to turn it into something actionable and use it to your advantage. How do you bring the behavioral and engagement data you collect into the extended marketing fold? You need technology that enables your teams to use your data instantly and easily to personalize post-event content and communications. 

With the knowledge of whom an attendee interacted with, the sessions they liked and the type of content they downloaded, you’ll craft more effective outreach. This extends the value of your event for your attendees and your demand generation efforts. Rather than sending the same message to every attendee, with their name appended to the beginning of an email, you can use data to rouse your attendees’ interests and keep them meaningfully engaged. 

Understanding how engagement translates to leads  

The same data you use to customize an attendee’s event experience can enrich and accelerate your sales pipeline. By capturing insights into attendee activity — the polls attendees participated in, the sessions they checked into and the exhibitors they spent time with — you can use robust event experience technology to assign engagement scores to each attendee. From there, you can segment attendees by their levels of engagement and personalize your post-event follow-up.

In addition, equipping sales teams with the data needed to prioritize the most engaged leads lets them focus their time and efforts on maximizing conversion success. And because of the rich data you’ve collected about each attendee, sales teams can discern whether a correlation exists between an attendee’s high engagement levels and their likelihood of becoming an opportunity, enabling better future strategies.

Using data-enabling technology to refine experiences

Data-enhanced experimentation isn’t limited to your sales team. Events of all formats offer ample opportunities to experiment, iterate and improve experiences and business outcomes — before, during and after an event. 

Ensure you collect data corresponding with your event format. For instance, an in-person event with a virtual component requires data collection strategies for both audiences. Customize questions to speak to the distinct experiences of virtual and in-person attendees. And use event software that supports audience engagement measurement both on the floor and through the screen.

Maximize the value of behavioral data 

Use registrants’ behavioral data to build personalized session tracks and networking opportunities. Collecting behavioral data at in-person events can feel daunting compared to virtual events, but it doesn’t have to. Event experience leaders are leveraging new solutions like wearable technology to gain insights.

Today’s wearable event technology has the power to offer attendees more personalized networking and session experiences while simultaneously giving organizers unmatched data capture. Your budget may not permit wristbands, high-tech badges and other wearables as must-haves for every event, but they function as a powerful data source. When attendees wear these devices, they automatically provide information to help you optimize future events. Depending on the technology you employ, you’ll gain: 

  • Advanced analytics, such as dwell time.
  • Records of touchless contact exchanges.
  • Event gamification for attendees.
  • Lead collection for sponsors.
  • Integrated tracking and reminders for session check-ins.

The behavioral data you collect, combined with pre- and post-event surveys, deepens event insights and facilitates more personalized opportunities for attendees, speakers and sponsors. 

Experiment and follow the data 

Data empowers event experience leaders to test new ideas and follow where the data leads. 

Experimentation can apply to anything from registration forms and email marketing subject lines to in-session polling strategies and other event messaging. Start small, and choose three to five key metrics to test based on past event data. Once you put an experiment out into the world, evaluate the results. Then plan for your next experiment based on what you learned and pivot your event strategies as needed to keep refining your efforts. 

Data maturity powers advanced insights 

Actionable data not only enables better event experiences, it also empowers CMOs and marketing leaders to demonstrate the impact of events. Prioritizing a data maturity model ensures you can effectively communicate the value of your event experience program to all stakeholders, especially as organizations navigate economic uncertainty. Rather than evaluating data in a vacuum, a data maturity model connects each event touchpoint, providing insights that allow you to align event strategy against key success metrics.

Four steps comprise data maturity: 

  • Data capture: Accessing your data is the first tactic. Your organization needs the ability to gather data holistically, including granular information like session attendance and demographics. 
  • Data integration: Connecting the data you capture to your business systems enables you to take action in the future. 
  • Data utilization: Use the integrated data to offer the audience more valuable event experiences. Identify and curate precise data points to help achieve personalized experience goals, such as customized communications, to help increase conversion and attendance rates. 
  • Data translation: Take what you’ve learned from past events and act. Using actionable data insights from past events to inform decision-making results in a virtuous cycle, constantly renewing and improving event experiences.  

When you can access, integrate and activate your event data, your teams will maximize ROI by optimizing the attendee experience, driving lead generation and contributing to overall marketing goals in measurable ways.

Attendee expectations continue to evolve, and rather than trying to return to business as usual, event experience leaders must leverage data to direct and inform event decisions. There’s never been a more exciting time to collect onsite and virtual data, experiment and iterate on data findings, personalize event experiences and take your sales pipeline to the next level. 

Alon Alroy is CMO and cofounder of Bizzabo.

Source link

Continue Reading

Trending

URGENT: CYBER SECURITY UPDATE