home.aspx
   
 
EVENTS

SiriusDecisions 2019 Technology Exchange
SIRIUSDECISIONS 2019 TECHNOLOGY EXCHANGE
December 09-11, 2019
The drive for growth never ceases for b-to-b organizations, and more than ever technology is at the centre of enabling that progress. Gone are the days however when a disparate, disconnected set of platforms strewn across sales, marketing an product can serve the organization effectively. An aligned...

SiriusDecisions Roadshow New York
SIRIUSDECISIONS ROADSHOW NEW YORK
September 10-10, 2019
The future of the b-to-b buyer experience: Account-based, digital and human. Marketing and sales have a new challenge in b-to-b: How to transform the power of technology into a compelling experience that’s online and automated but also personal and meaningful. Learn what high performing compan...

SiriusDecisions

SiriusDecisions® is the leading global b-to-b research and advisory firm. We deliver actionable intelligence, strategic and operational frameworks, and personal guidance from experienced practitioners. Sales, marketing and product executives rely on SiriusDecisions® to contextualize problems and bring to light opportunities to drive sustainable growth. Our holistic solutions are founded on proprietary research, a deep understanding of b-to-b complexities, and the tenet that organizational alignment brings better outcomes.

RELATED NEWS


A new report reveals how CISOs are shifting priorities and security strategies to manage increasingly advanced threats with limited resources. The Forbes Insight report found that 84 percent of CISOs believe the risks of cyber attacks will increase and almost a quarter believe the capabilities of attackers are outpacing their ability to defend their organization. This issue is compounded with limited resources, it said, including lack of sufficient budget and skilled professionals as well as a t...
SECURITY MAGAZINE
READ MORE

Hackers are always using inventive ways to implant malware on people’s computers, including the cloning of a popular VPN website to spread a banking trojan. Researchers at Doctor Web’s virus lab discovered that criminals created a website that was a copy of the one belonging to virtual private network service NordVPN. This nord-vpn[.]club website, which is currently inaccessible, was almost identical to the official nordvpn.com site. To make this cloned website appear more legitimate...
TECHSPOT
READ MORE

Some of the biggest names in the cloud and hardware ecosystem have agreed to join a new industry group focused on promoting safe computing practices. Founding members include Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat, Swisscom, and Tencent. Named the Confidential Computing Consortium, this industry group's goals will be to come up with strategies and tools to accelerate the adoption of "confidential computing." By confidential computing, the group is referri...
ZDNET
READ MORE

Lionbridge, the world's most trusted global communications platform, is pleased to announce that it has won the Technology division award for Employee Engagement in the Conference Board's Excellence in Marketing & Communications Awards Program. This prestigious program honors organizations for their innovative use of communications technologies. Last year, Lionbridge developed a new intranet known as The Bridge to help its more than 6,000 employees around the world live out its missi...
SOURCE
READ MORE

Lionbridge Technologies is proud to announce it has again been named one of America's Best Employers by Forbes, which also recognized Lionbridge as a Best Employer for Women in 2018. The 2019 list recognizes organizations across a variety of industries that employ more than 1,000 people in the U.S. Working with Statista, Forbes deployed an independent survey to a representative sample of the US workforce and reached more than 50,000 employees overall. The rankings were mainly assessed based ...
SOURCE
READ MORE

Cybersecurity investments in smart cities are “severely lagging” and are “seeding the future vulnerabilities of the IoT ecosystem,” according to new analysis from ABI Research. ABI finds that the financial; information and communication technologies (ICT); and defence industries will account for 56 per cent of the $135 billion projected total cybersecurity spend related to critical infrastructure in 2024. The remaining 44 per cent of the 2024 spend will be split between t...
SMART CITIES WORLD
READ MORE

Digital platforms, whether due to an error in their code or the ability of hackers, are vulnerable to cyber attacks, making the security of their users compromised. Social network applications are no stranger to these attacks. An Israeli electronic security company called Check Point Research reversed the WhastApp encryption algorithm and discovered new vulnerabilities in this Facebook-owned messaging service. These small security gaps could allow hackers to intercept and manipulate messages sen...
KAGAYA
READ MORE

The 111 tech companies that signed on to the Cybersecurity Tech Accord compete against each other every day, but they all agree on the big picture: protecting their customers and users and improving cybersecurity globally. Since Microsoft President Brad Smith launched the initiative in April 2018 with 32 companies including Facebook, Cisco, Dell Technologies, and Nokia, it has grown into what its members say is the largest industry led cybersecurity pact. It has also worked with other industry g...
SDXCENTRAL
READ MORE

Hackers can figure out a person’s password by simply listening to them type on a keyboard, cyber security according to a new study. Using the microphone found on a smartphone, the new method is so effective that it can be carried out in a noisy public space where multiple people are typing, researchers at Southern Methodist University in Texas found. They discovered the technique by analysing the different sound waves produced when a key on a keyboard is struck. After processing the acoust...
THE INDEPENDENT
READ MORE

The Global Cyber Alliance (GCA) has launched a first-of-its-kind cybersecurity development platform for IoT products, called the Automated IoT Defence Ecosystem (AIDE), which allows small businesses, manufacturers, service providers and individuals to detect vulnerabilities, reduces risks and secure IoT devices against the increasing number of threats in today’s interconnected environment. GCA ProxyPot, which is a complementary resource to the AIDE platform, is a custom IoT honeypot soluti...
ENTERPRISE CIO
READ MORE

EVENTS

SiriusDecisions 2019 Technology Exchange
SIRIUSDECISIONS 2019 TECHNOLOGY EXCHANGE
December 09-11, 2019
The drive for growth never ceases for b-to-b organizations, and more than ever technology is at the centre of enabling that progress. Gone are the days however when a disparate, disconnected set of platforms strewn across sales, marketing an product can serve the organization effectively. An aligned...

SiriusDecisions Roadshow New York
SIRIUSDECISIONS ROADSHOW NEW YORK
September 10-10, 2019
The future of the b-to-b buyer experience: Account-based, digital and human. Marketing and sales have a new challenge in b-to-b: How to transform the power of technology into a compelling experience that’s online and automated but also personal and meaningful. Learn what high performing compan...