Infographic: Bud Light’s Dylan Mulvaney Backlash, a Year Later

Around this time in 2023, Bud Light started a marketing firestorm when it partnered with transgender influencer Dylan Mulvaney and then seemed to distance itself from the relationship amid backlash. The fallout continues to smolder.

Global mentions of Bud Light across social networks such as X, Reddit and Instagram surpassed 800,000 during the week of April 10-17, 2023, according to consumer intelligence platform Talkwalker. For context, those seven days saw more mentions of the beer brand than the entire first quarter of 2023.

The

#paywall-subscribe { margin:0; padding: 1rem 2.4rem; } #paywall-subscribe .holder { background-color:#eee; border:15px solid #f2f2f2; padding:30px; margin:0 auto!important; text-align:center; } #paywall-subscribe a.underline { color:#000; text-decoration:underline; } #paywall-subscribe img { margin-bottom:10px; width: 140px!important; height: auto!important; } #paywall-subscribe h3 { font-weight:bold; font-size:16px; text-transform:uppercase; width:80%; margin:0 auto; margin-bottom:20px; text-align:center; } #paywall-subscribe h3 span { display:block; font-size:14px; } #paywall-subscribe h2 { font-weight:800; font-size:24px; text-transform:uppercase; } #paywall-subscribe p { font-size: 16px; color:#000; padding: 0; } #paywall-subscribe .cta { margin-top:20px; margin-bottom:10px; font-size:14px; text-transform:capitalize; color: #fff; background-color: #E50000; border:none; padding:12px 28px; text-decoration:none; -webkit-transition: .3s ease; -moz-transition: .3s ease; -o-transition: .3s ease; -ms-transition: .3s ease; transition: .3s ease; } #paywall-subscribe .cta:hover { color: #fff; background-color: #181818; transform: scale(1.02); } #paywall-subscribe .already-a-member { font-size:14px; } @media (max-width: 1024px) { #paywall-subscribe .holder { border:12px solid #f2f2f2; padding:25px; } #paywall-subscribe img { width: 120px!important; } } @media (max-width: 768px) { #paywall-subscribe .holder { border:10px solid #f2f2f2; padding:20px; } #paywall-subscribe img { width: 100px!important; } #paywall-subscribe h3 { font-size:14px; } #paywall-subscribe h3 span { font-size:12px; } #paywall-subscribe h2 { font-size:18px; } #paywall-subscribe p { font-size:14px; } #paywall-subscribe .cta { font-size:12px; padding:10px 24px; } #paywall-subscribe .already-a-member { font-size:11px; } } AW+

WORK SMARTER – LEARN, GROW AND BE INSPIRED.

Subscribe today!

To Read the Full Story Become an Adweek+ Subscriber

View Subscription Options

Already a member? Sign in

https://www.adweek.com/commerce/bud-light-dylan-mulvaney-one-year-later/




This Data Recovery Software Keeps Your Business Safe, and Now It’s $45.97 for Life

Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

According to TrueList, 94% of companies that face a major data loss don’t end up recovering. And while you may not think about data loss on a daily basis as an entrepreneur, it’s something to seriously consider. Fortunately, there are now tools ready to help in the event it happens, like EaseUS Data Recovery Wizard.

Recover lost data easily and efficiently anytime with a lifetime subscription to EaseUS Data Recovery Wizard. Though it usually sets you back $149, you can currently score it for just $45.97 — no coupon code required — right here through January 21.

Cover your bases in the event of a data loss with help from EaseUS Data Recovery Wizard. This powerful software is ready to recover your precious info after any type of data loss scenario, working to retrieve deleted, formatted, or lost files from PCs, laptops, hard drives, SSDs, USB Drives, and more. The software has an impressive 99.7% success rate, so you sleep easy knowing you’re in good hands.

There are an impressive 2,000 recoverable device types and 1,000 file types supported. And with its user-friendly interface and quick scanning process, EaseUS Data Recovery Wizard is straightforward to use. There are only three steps to take — you scan for lost data in the location where you lost files, preview the lost data filtered by path or type, and then sit back and recover your lost data by selecting the files you want to recover.

Safeguard your business with a lifetime subscription to EaseUS Data Recovery Wizard, now just $45.97 (reg. $149) with no coupon code required now through January 21 at 11:59 p.m. PT.

StackSocial prices subject to change.

https://www.entrepreneur.com/science-technology/this-data-recovery-software-keeps-your-business-safe-and/468538




Data Security Firm ALTR Banks $25M Series C 

Late-stage data security startup ALTR on Wednesday announced the closing of a $25 million funding round to continue building and marketing its SaaS-based data access governance and security products.

The company said the Series C was led by John Stafford III and included new, unidentified investors from the financial, medical, and data space.

The Florida-based ALTR  has raised more than $55 million since emerging from stealth in 2018 with ambitious plans to build data security tools on blockchain technology.

The company said the new financing will be used to speed up its go-to-market strategy by expanding its footprint across various data sources, grow partner integrations, and develop channel relations.

ALTR is selling technology that enables database administrators, data engineers, and data architects to reduce manual tasks, get visibility into data usage, automate data access controls, and secure data with rate-limiting and tokenization-as-a-service.

The suite of products offer corporate defenders the ability to see what data is used, by whom and when, including visuals for data usage heatmaps and analytics dashboards.

ALTR said its tools can also be used to control access to sensitive data with classification-based policies and apply data-masking over PII like social security numbers or email addresses to keep sensitive data private.

Get auditable query logs to prove privacy controls are working correctly and make the governance team happy.

Advertisement. Scroll to continue reading.

Related: ALTR Emerges From Stealth With Blockchain-Based Data Security Solution

Related: IBM Snaps up DSPM Startup Polar Security

Related: Symmetry Systems Raises $17.7M for DSPM Platform

Related: Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security

https://www.securityweek.com/data-security-firm-altr-banks-25m-series-c/




‘Setting Up A Cottage Industry:’ California’s Delete Act Raises Concerns Over Motivations


.article-native-ad { border-bottom: 1px solid #ddd; margin: 0 45px; padding-bottom: 20px; margin-bottom: 20px; } .article-native-ad svg { color: #ddd; font-size: 34px; margin-top: 10px; } .article-native-ad p { line-height:1.5; padding:0!important; padding-left: 10px!important; } .article-native-ad strong { font-weight:500; color:rgb(46,179,178); }

Have questions about making AI—and all things tech—work for you? November 14-15, get answers from experts at NexTech, in NYC and virtually. Save 35%.

California’s hotly debated Delete Act (SB 362), if passed, could upend the ad-tech data broker market. The proposal appears to be moving quickly, coming in less than a year after the Consumer Privacy Rights Act (CPRA) went into effect in January. And, since it’s a legal matter about privacy, you can bet there are a few vague terms that are muddying the waters.

SB 362 gives people a universal delete mechanism for data collected by brokers, and passed the Assembly this week. The bill now returns to the Senate for approval and could be passed as law in a matter of days.

However, this advancement has sparked debate among both supporters and opponents over the bill’s co-author Tom Kemp, also an angel investor in a company offering data deletion services for a fee.

It’s not uncommon for legislators to rely on industry expertise when drafting laws over complex topics. An investigation by USA Today underscores this trend that over 10,000 bills introduced in U.S. statehouses were copied from bills drafted by influential groups and lobbyists. Still, legal experts and bill opponents—including the vocal ad industry which has relied on using peoples’ data to target ads—are raising questions over the motives behind the legislation. Some are pushing to pause the bill’s progress to have a more transparent discussion about the consequences.

“When California passes a law, other states pay attention. It’s important for legislators to get this bill right so that other states don’t follow a severely flawed approach,” said Dan Smith, CEO of the Computer Data Industry Association (CDIA). “[If the bill passes in its current state], you could see institutions, companies and individuals set up a cottage industry.”

Why the fracas?

According to SB 362, the residents of California can request to delete their data via a free delete button on a government website. However, the bill includes a provision that lets “authorized agents” assist individuals with their deletion requests.

But, the bill lacks a clear definition of authorized agents.

“With no guardrails,” said Smith, “any company or an individual could be an authorized agent.”

Alan Chapell, president of law firm Chapell & Associates, previously looked into companies that work on behalf of people to make data subject access requests (DSAR). He found that companies tend to overstate risks to people and do a poor job of explaining how they can help consumers.

“Many misstate what the law requires companies to do, perhaps deliberately,” Chapell told Adweek. “[Authorized agent provision] incentivizes behaviors that don’t help consumers.”

Ok, why is this important?

While the Delete Act was introduced in April by California State Senator Josh Becker (D-Menlo Park), it has attracted media attention due to the involvement of Tom Kemp, a Silicon Valley-based entrepreneur, investor, and policy advisor who co-authored the bill.

Kemp explicitly identified himself as the bill’s co-author, discussing his role and amendments across different platforms, including in an email to Adweek.

According to his website, Kemp co-wrote the bill with Emory Roane of the non-profit organization Privacy Rights Clearinghouse and presented SB 362 to Senator Becker.

So, what’s the concern?

Kemp also serves as an angel investor in several companies, with investments ranging from $50,000 to $300,000. This includes a for-profit company called Atlas Privacy, which offers data removal services at a price of $150 annually. So far, the company has raised $375,00, according to Crunchbase.

Co-authoring a bill that stands to benefit an individual’s private business is a scenario that presents a conflict of interest, four sources told Adweek.

“Kemp says he’s deeply involved in the bill’s amendment process,” said CDIA’s Smith. “And he’s invested in a company that stands to be one of these authorized agents … potentially making a lot of money off the bill’s passage.”

In response to these concerns, Kemp said “It’s funny that [the opponents] are shouting about a conflict of interest. Their financial conflict in opposition [to mine] would be a million times more.”

Passing this bill will likely lead to more signal loss, conceivably making it more difficult for marketers to target audiences. Previously, tech lobbyists have pushed their agenda over water-downed versions of state privacy laws.

For Matthew Schwartz, policy analyst, Consumer Reports, the financial motivations of the opponents of the bill outweigh that of Kemp’s.

“I wouldn’t say it should be disqualifying that one person could gain from the bill without adding that the public would gain from deleting their data,” Schwartz said. “People in opposition also have a vested financial interest in the bill’s outcome.”

There are others who don’t see an issue with Kemp’s involvement.

“This is no different than any lobbyists that help craft the legislation that’s financially beneficial to [them],” said Jordan Fischer, partner at law firm Constangy, Brooks, Smith & Prophete.

Where this does become a concern is when an entire business model is generated off the backs of a law, sources say.

But, who qualifies as an author?

The debate also raises questions over who can co-author a bill.

In California, legislators author the bill when an individual or group convinces a Member of the Legislature to do so, as in the case of Kemp. The Member then sends the idea and the language for the bill to the Legislative Counsel’s Office, where it is drafted into the actual bill. The drafted bill is returned to the legislator for their review alongside the people who originated the idea for the bill. This is to ensure that the provisions they desire are in the bill in the correct form, according to California’s legislative process.

That said, the Electronic Frontier Foundation, a nonprofit group that endorsed SB 362, classifies only elected officials running a bill as its authors.

“Organizations primarily supporting the bills are referred to as sponsors. It’s common for sponsors to be folks and/or companies that have an interest in a bill’s passage,” said Hayley Tsukayama, associate director of legislative activism at EFF. “In this case, Kemp is a sponsor and not an author.”

However, Kemp contested Tsukayama’s definition and pointed out that he does not qualify as a sponsor. This is as per the latest floor alert sent to all Legislators on Sunday as reviewed by Adweek, which acknowledged groups like Privacy Rights Clearinghouse among its main sponsors.

“You can call me a volunteer, a contributor, someone who helped to draft it,” said Kemp. “But I am not officially considered a sponsor.”

.font-primary { } .font-secondary { } #meter-count { position: fixed; z-index: 9999999; bottom: 0; width:96%; margin: 2%; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; -webkit-box-shadow: 0 0px 15px 4px rgba(0,0,0,.2); box-shadow:0 0px 15px 4px rgba(0,0,0,.2); padding: 15px 0; color:#fff; background-color:#343a40; } #meter-count .icon { width: auto; opacity:.8; } #meter-count .icon svg { height: 36px; width: auto; } #meter-count .btn-subscribe { font-size:14px; font-weight:bold; padding:7px 18px; color: #fff; background-color: #2eb3b2; border:none; text-transform: capitalize; margin-right:10px; } #meter-count .btn-subscribe:hover { color: #fff; opacity:.8; } #meter-count .btn-signin { font-size:14px; font-weight:bold; padding:7px 14px; color: #fff; background-color: #121212; border:none; text-transform: capitalize; } #meter-count .btn-signin:hover { color: #fff; opacity:.8; } #meter-count h3 { color:#fff!important; letter-spacing:0px!important; margin:0; padding:0; font-size:16px; line-height:1.5; font-weight:700; margin: 0!important; padding: 0!important; } #meter-count h3 span { color:#E50000!important; font-weight:900; } #meter-count p { font-size:14px; font-weight:500; line-height:1.4; color:#eee!important; margin: 0!important; padding: 0!important; } #meter-count .close { color:#fff; display:block; position:absolute; top: 4px; right:4px; z-index: 999999; } #meter-count .close svg { display:block; color:#fff; height:16px; width:auto; cursor:pointer; } #meter-count .close:hover svg { color:#E50000; } #meter-count .fw-600 { font-weight:600; } @media (max-width: 1079px) { #meter-count .icon { margin:0; padding:0; display:none; } } @media (max-width: 768px) { #meter-count { margin: 0; -webkit-border-radius: 0px; -moz-border-radius: 0px; border-radius: 0px; width:100%; -webkit-box-shadow: 0 -8px 10px -4px rgba(0,0,0,0.3); box-shadow: 0 -8px 10px -4px rgba(0,0,0,0.3); } #meter-count .icon { margin:0; padding:0; display:none; } #meter-count h3 { color:#fff!important; font-size:14px; } #meter-count p { color:#fff!important; font-size: 12px; font-weight: 500; } #meter-count .btn-subscribe, #meter-count .btn-signin { font-size:12px; padding:7px 12px; } #meter-count .btn-signin { display:none; } #meter-count .close svg { height:14px; } }

Enjoying Adweek’s Content? Register for More Access!

https://www.adweek.com/programmatic/setting-up-a-cottage-industry-californias-delete-act-raises-concerns-over-motivations/




Salesforce’s AI-Focused Brand Campaign Has a Lot of Questions


.article-native-ad { border-bottom: 1px solid #ddd; margin: 0 45px; padding-bottom: 20px; margin-bottom: 20px; } .article-native-ad svg { color: #ddd; font-size: 34px; margin-top: 10px; } .article-native-ad p { line-height:1.5; padding:0!important; padding-left: 10px!important; } .article-native-ad strong { font-weight:500; color:rgb(46,179,178); }

Don’t miss Brandweek, Adweek’s ultimate experience for marketers, September 11-14 in Miami. Connect with peers and gain insights and inspiration from top brand marketers and industry icons at Glossier, Coca-Cola, Taco Bell and more. Register.

Salesforce is not new to artificial intelligence (AI), having used the technology through its platform in various ways for the last decade. But, as with most tech companies, it has faced a surge in interest from customers in recent months, asking about the potential and pitfalls of generative AI (GenAI).

Those questions are now part of a new brand campaign, “Ask More of AI,” led by Salesforce pitchman and ambassador Matthew McConaughey.

The company’s first major announcement in the generative space came in March with Einstein GPT. Sales GPT and Service GPT followed that.

“We see a little bit of a gold rush mentality happening in the market,” said Colin Fleming, evp of brand and marketing for Salesforce. With the new offerings, Fleming says b-to-b brand is “applying Gen AI into the use cases that people trust us for right in their companies.”

The questions we ask are not meant to stoke fear, but just meant to shine a light.

Colin Fleming, EVP, brand and marketing, Salesforce

“The big important part of this,” Fleming told Adweek, “is the idea of trust. We do believe that a lot of the startups and a lot of the companies have been throwing caution to the wind and really not considering what CIOs care about: data integrity, trust and residency. That’s where we feel like our investments have really helped us along the way and really created some space for us in the market.”

Fleming and McConaughey spent time learning about GenAI and writing a list of their questions, which became a part of the “Ask More of AI” campaign.

“We realized that GenAI is all about asking questions. But are we asking the right ones?” he mused.

A series of three tongue-in-cheek 15-second spots focus on questions that should be asked about data and privacy security. They each see the Academy Award-winning actor step into a different environment—be it a Wild West town or a forest filled with magic and fantastic imagery—as he is prompted to ask something about the impact of AI technology.

The first spot, “AI Sheriff,” wonders who is looking after us, while “Data Forrest” is about data privacy and the latest, titled “Self Aware Squirrel,” questioning movement towards the singularity.

The ads have been released in the U.S., but the campaign will be rolled out globally with less reliance on McConaughey and more supplementary content.

“We are trying to be very thoughtful about ensuring that the questions we ask are not meant to stoke fear, but just meant to shine a light on where we think the direction should be going,” explained Fleming, who also revealed that he uses ChatGPT with his daughter, writing bedtime stories.

The spots were developed in-house by the Salesforce marketing team, allowing the company to produce ads quickly to meet emerging business trends. The slightly unreal and inauthentic feel was intentionally added in post-production.

The use of GenAI visual effects is something the company has begun to explore, including testing what a Gen AI-created McConaughey would look like, although Fleming doubts the results will ever see the light of day.

“There’s a lot of advancement that has still to come in the generative video market. It’s not fully there yet. But we’ve learned a lot, and we think of that to do with the campaign,” he said.

B-to-b marketing continues to resemble b-to-c from both the creative side and the media buying and planning. Fleming, who’s spent more than 12 years at Salesforce and has b-to-c marketing background, says that is no accident. (Fun fact: before marketing, Fleming was a professional race driver for Red Bull.)

“We’re selling to humans. We’re selling to people. Businesses are writing the checks, but these are humans,” said Fleming of his customers. “We know that the tendencies of consumers are the same as business buyers, so we have tried to level the playing field in how we approach briefs and how we approach the work we put forth.”

.font-primary { } .font-secondary { } #meter-count { position: fixed; z-index: 9999999; bottom: 0; width:96%; margin: 2%; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; -webkit-box-shadow: 0 0px 15px 4px rgba(0,0,0,.2); box-shadow:0 0px 15px 4px rgba(0,0,0,.2); padding: 15px 0; color:#fff; background-color:#343a40; } #meter-count .icon { width: auto; opacity:.8; } #meter-count .icon svg { height: 36px; width: auto; } #meter-count .btn-subscribe { font-size:14px; font-weight:bold; padding:7px 18px; color: #fff; background-color: #2eb3b2; border:none; text-transform: capitalize; margin-right:10px; } #meter-count .btn-subscribe:hover { color: #fff; opacity:.8; } #meter-count .btn-signin { font-size:14px; font-weight:bold; padding:7px 14px; color: #fff; background-color: #121212; border:none; text-transform: capitalize; } #meter-count .btn-signin:hover { color: #fff; opacity:.8; } #meter-count h3 { color:#fff!important; letter-spacing:0px!important; margin:0; padding:0; font-size:16px; line-height:1.5; font-weight:700; margin: 0!important; padding: 0!important; } #meter-count h3 span { color:#E50000!important; font-weight:900; } #meter-count p { font-size:14px; font-weight:500; line-height:1.4; color:#eee!important; margin: 0!important; padding: 0!important; } #meter-count .close { color:#fff; display:block; position:absolute; top: 4px; right:4px; z-index: 999999; } #meter-count .close svg { display:block; color:#fff; height:16px; width:auto; cursor:pointer; } #meter-count .close:hover svg { color:#E50000; } #meter-count .fw-600 { font-weight:600; } @media (max-width: 1079px) { #meter-count .icon { margin:0; padding:0; display:none; } } @media (max-width: 768px) { #meter-count { margin: 0; -webkit-border-radius: 0px; -moz-border-radius: 0px; border-radius: 0px; width:100%; -webkit-box-shadow: 0 -8px 10px -4px rgba(0,0,0,0.3); box-shadow: 0 -8px 10px -4px rgba(0,0,0,0.3); } #meter-count .icon { margin:0; padding:0; display:none; } #meter-count h3 { color:#fff!important; font-size:14px; } #meter-count p { color:#fff!important; font-size: 12px; font-weight: 500; } #meter-count .btn-subscribe, #meter-count .btn-signin { font-size:12px; padding:7px 12px; } #meter-count .btn-signin { display:none; } #meter-count .close svg { height:14px; } }

Enjoying Adweek’s Content? Register for More Access!

https://www.adweek.com/brand-marketing/salesforces-ai-focused-brand-campaign-has-a-lot-of-questions/




Find Your ‘Why’ Behind Data Clean Rooms


.article-native-ad { border-bottom: 1px solid #ddd; margin: 0 45px; padding-bottom: 20px; margin-bottom: 20px; } .article-native-ad svg { color: #ddd; font-size: 34px; margin-top: 10px; } .article-native-ad p { line-height:1.5; padding:0!important; padding-left: 10px!important; } .article-native-ad strong { font-weight:500; color:rgb(46,179,178); }

Leaders from Colgate, TikTok, Amazon and more will gather at Commerceweek to discuss how to leverage new strategies, trends and tech to drive ROI and growth. Join us July 11–12 in NYC.

At every industry event, and across my many friends in the advertising business, I am most often asked, “Why should I buy a data clean room?” My response is always the same: “What are you trying to build? What compelling products can you offer the market today that you could not offer yesterday?” 

The data clean room (DCR) is currently one of the most discussed solutions within the ad-tech and mar-tech ecosystems. There is, however, some confusion around this new acronym, with many organizations knowing they need a DCR but unsure of what they should be investing in.

Data clean rooms are about building anew, not ticking a box on a mar-tech shopping list. DCRs can and do replace antiquated and obsolete technology of the past. But the most exciting part of my job is helping customers build the next generation of advertising products—performant products that enable planning, targeting and measurement while respecting user privacy and maintaining control over sensitive data.

Not all data clean rooms are created equal 

At this stage, let’s deal with definitions. There’s a strong argument to be made that these technologies are better described as data collaboration platforms (DCPs), and I would agree. A DCP is the underlying technology that can enable DCR use cases and do so much more. However, as “data clean room” has been common parlance in ad tech, I’ll stick to that term for the sake of clarity. 

It’s important to understand that not all DCRs are created equal, and some aren’t or shouldn’t be called data clean rooms because they lack even the most basic privacy principles and protocols. Various technologies have been positioned in the market under this title, leading to the IAB Tech Lab publishing its Data Clean Room Guidance & Recommended Practices to help the industry reach a common understanding of what defines a DCR. 

Some solutions described as DCRs don’t even provide basic functionality like enhanced privacy protection and decentralization of data. Broadly speaking, there are two different types: Firstly, there is a centralized multiparty clean room, such as a data warehouse. These do allow for collaboration on analytics and data science processes between multiple organizations, with first-, second- and third-party data sets stored together in one place. However, they are generally very complex to use and may not provide adequate control or ownership of data, which could compromise the privacy of customers.

Secondly, there are decentralized multiparty clean rooms, which are the truest version of a data clean room. As they are decentralized, all data processing takes place where the data is located, so there is no need for the data itself to move. Instead, a mathematical model of the individuals in each data set is generated, which is anonymized so no personally identifiable information is compromised. These solutions, while providing greater control and protection, are actually built for ease of use and speed to accelerate adoption rather than slowing it.

Only the second of these options offers the full feature set and functionality to cover all the desired use cases of a DCR. There are six key considerations that businesses should be looking for when evaluating the solution they want to invest in: privacy, scale, speed, transparency, simplicity and control. But even with the right technology, successfully implementing a DCR requires a clear strategic vision. 

Building new products with data clean rooms 

The businesses that have been most successful in implementing this new technology, and so have enjoyed the maximum value from their investment, have built and launched innovative new advertising solutions with a DCR at their core.

Take, for example, U.K. broadcaster Channel 4, which set up its Brandm4tch platform to partner with brands including supermarkets, banks, utility providers, retailers and fast food delivery companies. Aware of the challenges surrounding TV advertising—in particular, the lack of transparency and availability of data—Brandm4tch enables advertisers to match their own first-party data with the 24 million registered viewers on Channel 4’s streaming service and create custom audiences, leading to campaigns that have measurably increased awareness and consideration. Each brand retains full control of their data, and customer privacy is fully respected.

While Channel 4 was an early adopter of the DCR, it’s the strategic path it has taken that has driven its success—not the technology itself. And it has only just begun to tap into the potential of DCRs, enabling rewarding new partnerships and creating valuable new revenue streams. 

The way forward in 2023 

If your business is looking to implement a DCR solution in 2023, then there are some key principles you should follow. As mentioned above, you should have a clear business objective at the center of your strategy. But beyond that, you should be thinking about the future—will your DCR be fit for purpose in five, 10 years’ time?

It’s an important question to ask yourself. While in the short term you may have partnerships already in place, think about the kind of collaborations you want to enable in the future. As the number of data sets available grows, your DCR needs to be able to scale up while still providing speedy, actionable insights.

The most important thing, though, is to prioritize privacy. Compliance with regional privacy laws and legislation is obviously essential, but it’s the bond of trust you have with your customers that really matters. Consumer awareness of how their data is stored, used and shared has never been greater, and organizations that fail to protect customer privacy risk substantial reputational damage. Businesses have to be sure there’s no way the personal data of an individual can be compromised, whether accidentally through misconfiguration or intentionally.

If you want to clearly demonstrate to your customers that you respect their privacy, the right DCR strategy is key. But it’s also fundamental that the DCR delivers valuable use cases and facilitates the kind of collaborations that will drive real business results now and in the future. So when it comes to implementing a DCR, ensure your purpose is crystal clear; only then will you be able to work toward tangible objectives and select the technology that is truly fit for purpose. 

.font-primary { } .font-secondary { } #meter-count { position: fixed; z-index: 9999999; bottom: 0; width:96%; margin: 2%; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; -webkit-box-shadow: 0 0px 15px 4px rgba(0,0,0,.2); box-shadow:0 0px 15px 4px rgba(0,0,0,.2); padding: 15px 0; color:#fff; background-color:#343a40; } #meter-count .icon { width: auto; opacity:.8; } #meter-count .icon svg { height: 36px; width: auto; } #meter-count .btn-subscribe { font-size:14px; font-weight:bold; padding:7px 18px; color: #fff; background-color: #2eb3b2; border:none; text-transform: capitalize; margin-right:10px; } #meter-count .btn-subscribe:hover { color: #fff; opacity:.8; } #meter-count .btn-signin { font-size:14px; font-weight:bold; padding:7px 14px; color: #fff; background-color: #121212; border:none; text-transform: capitalize; } #meter-count .btn-signin:hover { color: #fff; opacity:.8; } #meter-count h3 { color:#fff!important; letter-spacing:0px!important; margin:0; padding:0; font-size:16px; line-height:1.5; font-weight:700; margin: 0!important; padding: 0!important; } #meter-count h3 span { color:#E50000!important; font-weight:900; } #meter-count p { font-size:14px; font-weight:500; line-height:1.4; color:#eee!important; margin: 0!important; padding: 0!important; } #meter-count .close { color:#fff; display:block; position:absolute; top: 4px; right:4px; z-index: 999999; } #meter-count .close svg { display:block; color:#fff; height:16px; width:auto; cursor:pointer; } #meter-count .close:hover svg { color:#E50000; } #meter-count .fw-600 { font-weight:600; } @media (max-width: 1079px) { #meter-count .icon { margin:0; padding:0; display:none; } } @media (max-width: 768px) { #meter-count { margin: 0; -webkit-border-radius: 0px; -moz-border-radius: 0px; border-radius: 0px; width:100%; -webkit-box-shadow: 0 -8px 10px -4px rgba(0,0,0,0.3); box-shadow: 0 -8px 10px -4px rgba(0,0,0,0.3); } #meter-count .icon { margin:0; padding:0; display:none; } #meter-count h3 { color:#fff!important; font-size:14px; } #meter-count p { color:#fff!important; font-size: 12px; font-weight: 500; } #meter-count .btn-subscribe, #meter-count .btn-signin { font-size:12px; padding:7px 12px; } #meter-count .btn-signin { display:none; } #meter-count .close svg { height:14px; } }

Enjoying Adweek’s Content? Register for More Access!

https://www.adweek.com/performance-marketing/find-your-why-behind-data-clean-rooms/




TELCO e Cybersecurity, come affrontare le sfide alla sicurezza nel settore delle telecomunicazioni

Le aziende di telecomunicazioni (TELCO) rivestono un ruolo cruciale nel garantire la sicurezza delle reti e dei servizi offerti ai loro clienti.

In un mercato globalizzato e iperconnesso, la sicurezza delle infrastrutture sottostanti ai servizi di telecomunicazioni esercita un’influenza diretta su diversi settori ad alto tasso di criticità. Tra questi:

  • sanità – sin dal periodo pandemico il campo dell’e-health si è rivelato estremamente esposto alle mire del cybercrime, affrontando rischi assai seri anche in ragione della sensibilità delle informazioni trattate;
  • asset governativi – la digitalizzazione delle Pubbliche Amministrazioni e l’interconnessione dei servizi alla cittadinanza, oltre a molti vantaggi, comporta pericoli resi evidenti dai numerosi attacchi (per lo più dimostrativi) andati a segno contro istituzioni nazionali e comunitarie negli ultimi mesi;
  • comparto finanziario – da anni in cima alla lista dei più colpiti insieme alle P.A., il mondo Finance è destinatario di rilevanti minacce informatiche in considerazione dei grandi flussi di valore in esso trattati;
  • trasporti ed energia – il settore delle utilities risulta soggetto in misura crescente a campagne d’attacco che, oltre al guadagno economico perseguito da criminali comuni, includono scopi propagandistici o di destabilizzazione politica imputabili a gruppi organizzati (spesso riconducibili ad attori Nation-State).

La necessità di proteggere reti, infrastrutture e dati si pone rispetto a molteplici tipologie di minacce informatiche, talune generiche e altre specificamente mirate ai fornitori di servizi di telecomunicazioni, come:

  • DDoS (Distributed Denial of Service), da sempre fra le tipologie di attacchi più semplici e ricorrenti;
  • tecniche di Network Hacking, facilitate dal moltiplicarsi delle reti negli ecosistemi 5G;
  • furti di dati, per lo più attuati tramite Phishing e ingegneria sociale;
  • attacchi malware e, in particolare, ransomware;
  • vulnerabilità nelle infrastrutture, soprattutto di tipo Zero-Day;
  • Insider threat, frequenti specialmente in aziende con importanti numeri di dipendenti ed elaborate catene di fornitura dei servizi.

Come le Telco affrontano le sfide di cybersecurity

Alla luce di un simile scenario, una valida strategia di sicurezza informatica per le Telco deve includere:

  • il costante monitoraggio, classificazione e valutazione delle minacce note;
  • robuste policy per la gestione di accessi, identità e privilegi;
  • regolari attività di formazione che coinvolgano personale interno ed esterno, nonché campagne di sensibilizzazione rivolte agli utenti;
  • procedure per la rapida presa in carico, gestione e mitigazione degli incidenti di sicurezza in un’ottica di business continuity;
  • collaborazioni con validi partner che sappiano supportare l’azienda nella sua mission di garantire la sicurezza dei propri servizi;
  • protocolli di assessment, test e valutazioni finalizzati a un miglioramento continuo.

Un punto di attenzione è costituito anche dalla supply chain. Come spiega Claudio Mantovani, Manager of Enterprise Cybersecurity Competence Center di Fastweb, “nell’ambito dell’erogazione dei servizi è fondamentale aumentare ancor di più il controllo al fine di garantire un elevato standard di qualità e governo della cyber security, anche sui fornitori minori”.

Dove investire per innalzare la resilienza dell’ecosistema Telco

Consapevoli che garantire la sicurezza informatica è fondamentale anche per mantenere la fiducia dei clienti, da sempre le aziende Telco investono massicciamente in tecnologie e processi tesi a proteggere le reti, i dati e la continuità dei loro servizi. Si stima che il mercato relativo alla cyber security nell’industria delle telecomunicazioni, che ha raggiunto la cifra di 30.18 billion USD nel 2021, avrà un tasso di crescita annuale composto del 12.1% dal 2022 al 2030.

Visto l’attuale scenario di rischio, oggi gli sforzi di cybersecurity dovrebbero concentrarsi in particolare sulle seguenti aree.

  • Network protection: strumenti “classici” come i firewall e/o sistemi di Intrusion Detection, filtri per intercettare il traffico dannoso, tecniche di virtualizzazione (NFV) e separazione delle reti sono tutte risorse che permettono di migliorare la sicurezza dei servizi pur garantendone l’operatività;
  • Data Protection: per proteggere i dati (in transito o “a riposo”) è opportuno impiegare protocolli di crittografia e rigorose policy di controllo degli accessi;
  • IAM – Identity and Access Management: strettamente connesso al precedente, include l’uso di autenticazione a più fattori (anche biometrici) e scrupolosa gestione delle password;
  • IDR – Incident Detection and Response: per rilevare e contrastare le minacce oggi è imprescindibile avere team specializzati che sappiano combinare strumenti di analisi comportamentale, Intelligenza Artificiale e Machine Learning per velocizzare le risposte agli incidenti di sicurezza, mitigandone tempestivamente gli effetti;
  • Cloud Security: MFA, crittografia dei dati e monitoraggio continuo sono necessari a garantire la protezione dei dati dei clienti entro contesti di tecnologie distribuite e diffuse;
  • Cooperation&Compliance: condividere le informazioni disponibili su minacce, vulnerabilità e best practices nonché conformarsi a regolamentazioni e standard di sicurezza (soprattutto nel contesto europeo, con gli stringenti obblighi del GDPR e dei regolamenti DSA/DMA) serve sia ad adeguarsi alle normative vigenti, sia a innalzare i livelli globali di sicurezza del settore;
  • Awareness: programmi di formazione, comunicazione trasparente e linee guida per un corretto uso dei servizi sono essenziali per evitare che i precedenti passaggi siano vanificati dagli errori umani, da sempre l’anello debole nella catena della sicurezza informatica.

Tra i numerosi filoni d’azione citati emergono come fondamentali le collaborazioni con aziende specializzate in cybersecurity.

Infatti, secondo Niccolò Vascellari, Sales Engineer Manager di 7Layers, “solo mediante tali sinergie, i TSP possono accedere a pacchetti di soluzioni integrate per proteggere i loro complessi ambienti operativi, ottenendo piena visibilità su rischi ed eventuali debolezze per poi porvi rimedio arrivando ad innalzare i livelli di resilienza alle minacce informatiche. Passaggi necessari non solo per garantire ai clienti una protezione completa dei loro dati ma anche per migliorare la generale sicurezza delle telecomunicazioni, restituendo alle Telco un ruolo trainante nel campo dell’innovazione digitale”.

Condividi sui Social Network:

https://www.ictsecuritymagazine.com/notizie/telco-e-cybersecurity-come-affrontare-le-sfide-alla-sicurezza-nel-settore-delle-telecomunicazioni/




Generative AI To Face Fresh Transparency Concerns in EU Thanks to New Bill


.article-native-ad { border-bottom: 1px solid #ddd; margin: 0 45px; padding-bottom: 20px; margin-bottom: 20px; } .article-native-ad svg { color: #ddd; font-size: 34px; margin-top: 10px; } .article-native-ad p { line-height:1.5; padding:0!important; padding-left: 10px!important; } .article-native-ad strong { font-weight:500; color:rgb(46,179,178); }

The brightest minds in marketing and tech converge at NexTech, Nov. 14–15 in NYC. Get your pass for the latest on generative AI, gaming and more.

Emerging as the first formal regulation of artificial intelligence, lawmakers in Europe signed off on a comprehensive set of rules—the EU’s Artificial Intelligence Act.

This groundbreaking legislation could serve as a potential blueprint for policymakers worldwide who are tasked with setting guardrails for the rapidly evolving technology.

What does the bill entail?

In the latest version of the bill, passed on Wednesday, generative AI would be subject to new transparency requirements. This includes publishing summaries of copyrighted material—something publishers have asked for under fair compensation. Additionally, makers of generative AI models will be required to put guardrails in place to prevent the generation of illegal content.

“The AI Act puts some fairly reasonable guardrails in place,” said Chris Pedigo, svp of government affairs at Digital Content Next. “The transparency piece gives publishers an opportunity to regain control over their content.”

The regulation is far from becoming law and its final version is not anticipated to be introduced until later this year. However, it’s the first of its kind and alleviates some publisher concerns over fair use and the possibility that they will lose out on traffic and revenue.

How does the rule work?

Measures to rein in AI were first proposed in 2021 but did not give much attention to generative AI. This time, makers of AI systems such as ChatGPT will be required to disclose information used to build the program. The law also regulates any product or service that uses AI while curtailing the use of facial recognition software.

The legislation follows a risk-based approach and categorizes AI systems into four levels of risk, ranging from minimal to unacceptable. Through risk assessments, makers of the technology will asses the everyday use of the tech before making it widely available.

The EU bloc, made up of 27 member states, will enforce the rules and could force companies to withdraw their products from the market. Proposed fines could reach $43 million or 7% of a company’s annual global revenue.

“It’s too early to tell if this act will have some real teeth to compel the tech companies to curb the harmful effects of AI,” said Chirag Shah, a professor at the Information School at the University of Washington. “What I see currently lacking, is a notion of accountability. Perhaps these details will emerge over time.”

What’s happening in the U.S.?

On this side of the Atlantic, Sen. Chuck Schumer (D-NY) is developing an AI framework and is hoping to move legislation at some point this year. In May, Sam Altman, the CEO of OpenAI, the maker of ChatGPT, urged legislators to act. “I think if this technology goes wrong, it can go quite wrong. And we want to be vocal about that,” Altman told members of the Senate subcommittee for privacy and technology.

The U.S. Copyright Office is also getting input from stakeholders on how to incorporate AI rules into the existing copyright framework.

“The big question is the extent to which copyright holders are entitled to compensation in the various use cases where AI systems are scraping content,” Pedigo added. “[The copyright office] may be waiting for Congress or the other agencies to provide guidance.”

.font-primary { } .font-secondary { } #meter-count { position: fixed; z-index: 9999999; bottom: 0; width:96%; margin: 2%; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; -webkit-box-shadow: 0 0px 15px 4px rgba(0,0,0,.2); box-shadow:0 0px 15px 4px rgba(0,0,0,.2); padding: 15px 0; color:#fff; background-color:#343a40; } #meter-count .icon { width: auto; opacity:.8; } #meter-count .icon svg { height: 36px; width: auto; } #meter-count .btn-subscribe { font-size:14px; font-weight:bold; padding:7px 18px; color: #fff; background-color: #2eb3b2; border:none; text-transform: capitalize; margin-right:10px; } #meter-count .btn-subscribe:hover { color: #fff; opacity:.8; } #meter-count .btn-signin { font-size:14px; font-weight:bold; padding:7px 14px; color: #fff; background-color: #121212; border:none; text-transform: capitalize; } #meter-count .btn-signin:hover { color: #fff; opacity:.8; } #meter-count h3 { color:#fff!important; letter-spacing:0px!important; margin:0; padding:0; font-size:16px; line-height:1.5; font-weight:700; margin: 0!important; padding: 0!important; } #meter-count h3 span { color:#E50000!important; font-weight:900; } #meter-count p { font-size:14px; font-weight:500; line-height:1.4; color:#eee!important; margin: 0!important; padding: 0!important; } #meter-count .close { color:#fff; display:block; position:absolute; top: 4px; right:4px; z-index: 999999; } #meter-count .close svg { display:block; color:#fff; height:16px; width:auto; cursor:pointer; } #meter-count .close:hover svg { color:#E50000; } #meter-count .fw-600 { font-weight:600; } @media (max-width: 1079px) { #meter-count .icon { margin:0; padding:0; display:none; } } @media (max-width: 768px) { #meter-count { margin: 0; -webkit-border-radius: 0px; -moz-border-radius: 0px; border-radius: 0px; width:100%; -webkit-box-shadow: 0 -8px 10px -4px rgba(0,0,0,0.3); box-shadow: 0 -8px 10px -4px rgba(0,0,0,0.3); } #meter-count .icon { margin:0; padding:0; display:none; } #meter-count h3 { color:#fff!important; font-size:14px; } #meter-count p { color:#fff!important; font-size: 12px; font-weight: 500; } #meter-count .btn-subscribe, #meter-count .btn-signin { font-size:12px; padding:7px 12px; } #meter-count .btn-signin { display:none; } #meter-count .close svg { height:14px; } }

Enjoying Adweek’s Content? Register for More Access!

https://www.adweek.com/programmatic/generative-ai-to-face-fresh-transparency-concerns-in-eu-thanks-to-new-bill/




Marketers Are Clueless About Post-Cookie Solutions


If it feels like we’ve been talking about the death of the cookie for years, it’s because we have. Google’s first hint that the third party cookie would depart its popular chrome browser was in 2019. Now 2024, the current demise date, is fast approaching.

Yet many marketers still aren’t ready. Surveying 1,000 major brands and media agency executives, tech solutions provider Ogury found that 41% have a low awareness of cookieless ad-tech solutions.

“Targeting technologies that are independent of advertising identifiers tend to be complicated to understand from an outsider’s perspective,” said Geoffroy Martin, CEO of Ogury.

“The ever-increasing number of cookieless solutions that are emerging on the market—like contextual and semantic targeting, unified IDs and cohorts-based targeting—means advertisers find it difficult to grasp, let alone choose between the options at hand.”

Some marketers have bitten off pieces of cookieless solutions, such as data clean rooms, while others are hoping their agency partners will bring new solutions to the table.

Adoption of existing cookieless solution

Gartner surveyed 324 marketers last year and found all have at least one cookieless identifier deployed across their media buying capabilities. Data clean rooms are being utilized by 47% of those surveyed, while identity resolution is used by 30%, and consent and preference management is used by 48%.

Nearly 90% of the travel and hospitality industry adopted data clean rooms, while 10% were in the process of securing funds or deploying this technology. In the commerce space, more than 50% of retail brands have adopted data clean rooms.

Identity resolution within the travel and hospitality industry also remained high, where identity resolution providers use match keys—deterministic or probabilistic—to identify when two records refer to the same individual or household.

Meanwhile, consent and preference management platforms are a top choice in the IT and finance industries, followed by travel/hospitality and healthcare providers.

Increase in cookie alternative investment

33Across, a publisher monetization company, expects to see more of the pharmaceutical/OTC and travel industries increase their cookie alternative investments this year.

Recent research by the company analyzed programmatic spend for each vertical across cookie and cookie-alternative traffic in Q1 2023. It found marketers in programmatic buying within the tech, travel and pharma industries grew their cookie alternative share of voice investment (SOV) significantly in Q4 of last year.

Though insurance advertisers’ overall programmatic spend decreased, the industry finished a third consecutive quarter of non-cookie programmatic buys outpacing cookie-dependent buys.

In terms of content categories that monetized the most cookie alternative supply, 33Across found mixed results in Q1 of this year. Categories like cooking, tech and games saw growth as high as 41% while sports, news, and health & wellness cooled slightly from Q4 of 2022. To that, most media outlets saw lower revenue due to limited ad budgets and lesser tentpole events.

Brands pass the buck to agency partners

As the industry prepares for the death of the cookie, Ogury’s research found scalability remains a top concern for brands and agencies: 61% of brands said they were confident about being able to reach audiences at scale, while a lower percentage of agencies (51%) shared similar confidence. This is because agency executives are more acquainted with the pitfalls ahead and tend to take a more cautious view, the study found.

.font-primary { } .font-secondary { } #meter-count { position: fixed; z-index: 9999999; bottom: 0; width:96%; margin: 2%; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; -webkit-box-shadow: 0 0px 15px 4px rgba(0,0,0,.2); box-shadow:0 0px 15px 4px rgba(0,0,0,.2); padding: 15px 0; color:#fff; background-color:#343a40; } #meter-count .icon { width: auto; opacity:.8; } #meter-count .icon svg { height: 36px; width: auto; } #meter-count .btn-subscribe { font-size:14px; font-weight:bold; padding:7px 18px; color: #fff; background-color: #2eb3b2; border:none; text-transform: capitalize; margin-right:10px; } #meter-count .btn-subscribe:hover { color: #fff; opacity:.8; } #meter-count .btn-signin { font-size:14px; font-weight:bold; padding:7px 14px; color: #fff; background-color: #121212; border:none; text-transform: capitalize; } #meter-count .btn-signin:hover { color: #fff; opacity:.8; } #meter-count h3 { color:#fff!important; letter-spacing:0px!important; margin:0; padding:0; font-size:16px; line-height:1.5; font-weight:700; margin: 0!important; padding: 0!important; } #meter-count h3 span { color:#E50000!important; font-weight:900; } #meter-count p { font-size:14px; font-weight:500; line-height:1.4; color:#eee!important; margin: 0!important; padding: 0!important; } #meter-count .close { color:#fff; display:block; position:absolute; top: 4px; right:4px; z-index: 999999; } #meter-count .close svg { display:block; color:#fff; height:16px; width:auto; cursor:pointer; } #meter-count .close:hover svg { color:#E50000; } #meter-count .fw-600 { font-weight:600; } @media (max-width: 1079px) { #meter-count .icon { margin:0; padding:0; display:none; } } @media (max-width: 768px) { #meter-count { margin: 0; -webkit-border-radius: 0px; -moz-border-radius: 0px; border-radius: 0px; width:100%; -webkit-box-shadow: 0 -8px 10px -4px rgba(0,0,0,0.3); box-shadow: 0 -8px 10px -4px rgba(0,0,0,0.3); } #meter-count .icon { margin:0; padding:0; display:none; } #meter-count h3 { color:#fff!important; font-size:14px; } #meter-count p { color:#fff!important; font-size: 12px; font-weight: 500; } #meter-count .btn-subscribe, #meter-count .btn-signin { font-size:12px; padding:7px 12px; } #meter-count .btn-signin { display:none; } #meter-count .close svg { height:14px; } }

Enjoying Adweek’s Content? Register for More Access!

https://www.adweek.com/programmatic/marketers-are-clueless-about-post-cookie-solutions/




Quasi tre quarti delle vittime di ransomware ha pagato il riscatto


Rubrik ha annunciato i risultati della nuova ricerca The State of Data Security by Rubrik Zero Labs: The Hard Truths of Data Security, che approfondisce il tema della sicurezza dei dati alla luce delle esperienze registrate nel corso dell’ultimo anno.

Il sondaggio è stato commissionato a Wakefield Research e ha coinvolto 1.625 responsabili di IT e sicurezza di aziende con almeno 500 dipendenti provenienti da negli Stati Uniti, Regno Unito, Francia, Germania, Italia, Paesi Bassi, Giappone, Australia, Singapore e India.

Quasi tutti i responsabili IT e della sicurezza (96%) a livello globale temono che la loro organizzazione non sia in grado di mantenere la continuità operativa in seguito a un attacco informatico.

Attenzione crescente

La Data Security sta diventando sempre più complessa poiché i dati da proteggere stanno crescendo rapidamente. Secondo i dati di Rubrik, nel 2022 la crescita media dei dati protetti è stata del 25%, con un aumento del 19% dei dati on premise, del 61% dei dati cloud e del 236% dei dati SaaS rispetto all’anno precedente.

Oltre la metà (56%) delle organizzazioni ha adottato almeno un’iniziativa “zero trust”, che in Italia sale al 61%. Tuttavia, solo il 56% dei responsabili IT e della sicurezza ha sviluppato o ridefinito un piano di risposta agli incidenti nel 2022 e il 54% ha testato le opzioni di backup e ripristino.

Il 99% delle organizzazioni ha una tecnologia di backup e ripristino, ma il 93% ha riscontrato problemi significativi. Il 73% delle organizzazioni ha subito tentativi di attacco ai backup dei dati, con successo almeno parziale nel 73% dei casi.

Il 72% delle organizzazioni ha pagato il riscatto dopo un attacco ransomware. Solo il 16% delle organizzazioni ha recuperato tutti i propri dati attraverso gli strumenti di decriptazione degli aggressori, con l’Italia in fondo alla classifica con solo l’8% di successo.

Nuovi problemi

Il 47% dei responsabili IT e della sicurezza ritiene che il budget stanziato per la cybersecurity per il 2023 non sia sufficiente; il 27% prevede addirittura che i budget per l’IT e la cybersecurity diminuiranno quest’anno. Solo il 4% ritiene che non ci siano fattori che limitano l’allineamento tra IT e sicurezza.

Steven Stone, responsabile di Rubrik Zero Labs

Steven Stone, responsabile di Rubrik Zero Labs, ha commentato: “È chiaro che le organizzazioni comprendono la gravità e l’impatto degli incidenti informatici, ma vediamo anche una serie di ostacoli che derivano dalla mancanza di preparazione, dal disallineamento tra i team IT e di sicurezza e dalla tendenza eccessiva a ricorrere a soluzioni di backup e ripristino non più sufficienti”.

“Nell’attuale era della cybersecurity, il risultato migliore è garantire la resilienza informatica. Gli incidenti sono inevitabili, ed è fondamentale ridurre il rischio prima che sia necessaria una risposta, proteggendo a tutti i costi il vero patrimonio di ogni organizzazione: i dati”.

Condividi l’articolo



Articoli correlati

Altro in questa categoria


https://www.securityinfo.it/2023/04/21/quasi-tre-quarti-delle-vittime-di-ransomware-ha-pagato-il-riscatto/?utm_source=rss&utm_medium=rss&utm_campaign=quasi-tre-quarti-delle-vittime-di-ransomware-ha-pagato-il-riscatto