DigitalMarketing

IAB warns of ‘unintended consequences’ as California AG unveils CCPA enforcement regs

No Comments

California Attorney General Xavier Becerra has just published proposed regulations (.pdf) that will fill in many blanks and much of the practical detail for CCPA, which is set to take effect next year in California but will have nationwide impact. The regulations seek to clarify and provide guidance to businesses on how to comply with the law.
Consumer rights under CCPA. CCPA gives consumers a right to know what personal data is being collected about them. It gives them a right to request the information be deleted. It also allows them to opt-out of the sale of that data to third parties. And it protects them against discrimination by platforms and publishers because of the exercise of their CCPA rights. Becerra’s regulations address the practical implementation of these principles.
I previously wrote about CCPA’s potential impact being partly contingent on how easy it is for consumers to understand and exercise their rights in real time. If they’re confronted by a lot of confusing..

Read More
- image1 1 800x508 480x250 - How advertising rates vary by category on Amazon  - image1 1 800x508 480x250 - Blog
DigitalMarketing

How advertising rates vary by category on Amazon

No Comments

It was 10 years ago, Jeff Bezos famously quipped that “advertising is the price you pay for having an unremarkable product.” As it relates to Amazon today, that logic holds as much water as any of these fine-looking sieves found on Amazon itself. In 2019, the retail site is largely a “pay to play” platform when it comes to defending and driving market share growth. This reality necessitates that Amazon sellers commit to advertising spending on the platform, but also do so based on expected conversion rates and search volume in order to preserve profitability while gaining market share.
How we got here Two contributing factors have driven Amazon to its current state for sellers. First, across the most popular search terms on Amazon the share of total conversions for a given keyword, on average, heavily weight towards the first few results on the search page. This fact may have been true in the past, but its significance today becomes crystal clear when looking at Amazon’s own brand ana..

Read More
- accessibility 3570138 1920 1024x638 480x250 - EU Takes Aim at China and Huawei in 5G Cybersecurity Report  - accessibility 3570138 1920 1024x638 480x250 - Blog
CyberSecurity

EU Takes Aim at China and Huawei in 5G Cybersecurity Report

No Comments

A European Union report assessing risks to its planned 5G cybersecurity networks says that foreign states and state-backed actors represent the biggest threat, and it all but named Chinese firm Huawei as one such risk.
Huawei started developing 5G infrastructure a long time ago, along with companies such as Nokia and Ericsson, and it was the first to provide a working foundation. Now that the time to implement 5G technology is here, the EU and other entities have to consider Huawei.
Unfortunately for the Chinese company, its 5G plans are being set back by accusations from Europe and The United States. One of the main fears is that the 5G underlying technology has undisclosed vulnerabilities, which could be shared with the Chinese government. Huawei has repeatedly denied the accusations, including the veiled ones from the recent EU report.
“Threats posed by States or State-backed actors, are perceived to be of highest relevance. They represent indeed the most serious as well as the m..

Read More
- computer 3406108 1920 1024x683 480x250 - US Homeland Security Wants Subpoena Power to Get Data from ISPs about Vulnerable Systems  - computer 3406108 1920 1024x683 480x250 - Blog
CyberSecurity

US Homeland Security Wants Subpoena Power to Get Data from ISPs about Vulnerable Systems

No Comments

The US Cybersecurity and Infrastructure Security Agency (CISA), in charge of leading national cybersecurity and infrastructure resilience programs, wants a change to federal law that would allow it to inspect systems behind ISPs and notify them to fix problems.
The Department of Homeland Security, which oversees CISA, wants to learn about vulnerable systems before they become a security problem. But it still needs to go through the local federal agency to obtain a subpoena that can be used to oblige ISPs to provide data regarding their customers. Federal agencies won’t serve a subpoena unless an investigation is ongoing.
CISA, established a year ago, is obliged by law to warn owners of vulnerable systems, particularly for public utilities and other vital infrastructure. In theory, Homeland Security is only looking to enforce its mandate, but broadening the scope and powers of the agency would raise questions regarding the intrusion of the federal government into the private sector.
..

Read More
- Jorge garcia handout martech east 1920 800x450 480x250 - MarTech Overtime: Why partnerships matter in securing your martech stack  - Jorge garcia handout martech east 1920 800x450 480x250 - Blog
DigitalMarketing

MarTech Overtime: Why partnerships matter in securing your martech stack

No Comments

Jorge Garcia onstage at MarTech East in Boston on Sept. 17. Photo credit: Jesleen Jose Jorge Garcia, Senior marketing manager at Adamai Technologies, shared his company’s journey to protect their data and brand in his MarTech East session, “Securing Your Martech Stack: Partnering with IT and Enterprise Security.”
A lot of questions around the roles of purchasing and managing martech stacks and “owns” the privacy compliance process, were submitted by session attendees, so I wanted to answer some of them.
Q: IT teams often tell marketing that they’ll choose and run your stack. Do you now have a clear agreement about respective roles and what did that take?
Mostly. I say “mostly” because the industry is ever-evolving and each new technology raises questions about roles. What we are clear about is our engagement when these questions come up. We have a regular forum for these discussions and a practiced motion of how to address them. That rhythm took a while to build, but it started with..

Read More
- email 3249062 1280 1024x573 480x250 - Thunderbird Will Start Using OpenPGP Encryption in 2020  - email 3249062 1280 1024x573 480x250 - Blog
CyberSecurity

Thunderbird Will Start Using OpenPGP Encryption in 2020

No Comments

The developers of Thunderbird, one of the most-used free email clients in the world, plan to implement OpenPGP support in 2020.
Thunderbird used to be made by Mozilla, but the company dropped it a few years ago, and the community took over the project. The email client is still using some of Firefox’s infrastructure.
Since Thunderbird is an open-source and cross-platform email client, it would make sense to bundle GnuPG software, but the differences in licenses make that impossible (MPL version 2.0 vs. GPL version 3+). The devs have to look for another solution, and the only to make it work is to add OpenPGP.
Thunderbird users until now only had the option to adopt an add-on called Enigmail, which provides data encryption for both the email client and SeaMonkey. When Thunderbird migrates to a newer code, though, the Enigmail add-on will stop working.
“We intend to identify and use another existing library that provides support for creating and processing OpenPGP messages, and we wi..

Read More
- TripAdvisor FB ad 477x600 477x250 - TripAdvisor advertisers can now run co-branded ads on Facebook, Instagram  - TripAdvisor FB ad 477x600 477x250 - Blog
DigitalMarketing

TripAdvisor advertisers can now run co-branded ads on Facebook, Instagram

No Comments

TripAdvisor launched TripAdvisor Connect this week. The branded content ad product pairs the travel site’s audiences with the ad inventory and targeting capabilities of third-party sites. It is rolling out first on Facebook and Instagram, and the company said it plans to bring the ads to more media channels soon.
The ads will appear as co-branded content posts with TripAdvisor’s logo and company name and the “Paid Partnership” language at the top of the ad:
An example of the co-branding on TripAdvisor Connect ads.Ads can be targeted using Facebook’s targeting features and TripAdvisor’s audience profiles (i.e. outdoor enthusiasts or “beachgoers”). The profiles have been built using TripAdvisor’s Facebook and Instagram followers, in addition to the more than 490 million unique monthly users that visit TripAdvisor’s website.
Why we should careThe TripAdvisor Connect ads will offer brands the scale of Facebook and Instagram with an added layer of data to reach consumers actively searching ..

Read More
- hacking 2964100 1920 1024x683 480x250 - Ransomware Is Still the Leading Online Threat in Europe, According to Europol  - hacking 2964100 1920 1024x683 480x250 - Blog
CyberSecurity

Ransomware Is Still the Leading Online Threat in Europe, According to Europol

No Comments

The volume of ransomware attacks is declining, but law enforcement agencies are observing a more targeted approach from criminals seeking lucrative victims. The latest Europol report shows how companies became more exposed in 2018 and 2019.
Europol (The European Union Agency for Law Enforcement Cooperation) released its Internet Organized Crime Threat Assessment for 2019, underlining all the possible attack vectors and online dangers discovered this year. Similar to last year’s report, the chief concern is ransomware and how it affects the private sector.
In 2018, the volume of ransomware-related incidents decreased considerably, but that doesn’t mean attackers gave up – they just tightened their focus on more lucrative targets, such as companies. It’s a more complex procedure as hackers have to go through a cyber kill-chain, but they would also have a much better understanding of how much ransom a target would be willing to pay.
“The number of victims is still high, and ransomware ..

Read More
- warning 2168379 1280 1024x782 480x250 - Developer Hacks Back Against Ransomware Attackers and Steals Decryption Keys  - warning 2168379 1280 1024x782 480x250 - Blog
CyberSecurity

Developer Hacks Back Against Ransomware Attackers and Steals Decryption Keys

No Comments

A victim of Muhstik ransomware paid the attackers to decrypt his data, and then undertook a different kind of payback – he took revenge by hacking into the server and stealing the decryption keys, only to release them for free to anyone who needed them.
Successful ransomware attacks rarely end on a satisfying note. Even if the victim pays the ransom and receives a key to decrypt the content, money and time are lost. But at least, in this case, the victim managed to disrupt the attacker’s operation.
Software developer Tobias Frömel explained that his QNAP TVS vNAS Server was compromised by Muhstik ransomware. In total, 14 terabytes of data were encrypted, and he chose to pay a €670 ransom to get it back.
“The Muhstik ransomware is reportedly being used to target QNAP NAS devices. Devices using weak SQL server passwords and running phpMyAdmin may be more vulnerable to attacks,” explains the QNAP advisory. “We strongly recommend that users act immediately to protect their data from pos..

Read More
DigitalMarketing

Should we make socially irresponsible brands appealing again?

No Comments

As designers, we dream about the brand challenges we’d love to work on with the criteria often cited as “fame, fortune and fun.” But there’s another consideration that increasingly occupies our thoughts that is more to do with what we’re contributing or detracting from society. We now talk about the “purpose” of brands to underpin strategy and design. If this falls short, we’re suddenly at a loss as to how to start building positive relationships with the consumer. In today’s ever-evolving market, there’s an increasing number of brands whose purpose has become out-dated, irrelevant or in some cases just socially irresponsible. We have to ask hard questions of ourselves before accepting the challenge of making it appealing again.
I struggle to want to apply company skills on Philip Morris brands because we can’t condone the harm that smokers (inadvertently) do to other people and, despite a long career designing single-use plastic bottles, I’d rather be helping Evian find a sustainable ..

Read More
Menu