Posts tagged Next

Keynote-level Presentations. Solutions. Networking. Join Us Next Week at MarTech

Join the pioneering community at the intersection of marketing and technology. MarTech: The Marketing Tech Conference starts next Tuesday, March 31. Secure your spot at the largest vendor-independent event for marketing technologists, and the only USA edition of MarTech this year. Attend for:…



Please visit Search Engine Land for the full article.

View full post on Search Engine Land: News & Info About SEO, PPC, SEM, Search Engines & Search Marketing

Google Glass: What Went Wrong and What’s Next?

Recently, Google announced that it is going to stop the sale of Google Glass, so, what went wrong and what’s next?

The post Google Glass: What Went Wrong and What’s Next? appeared first on Search Engine Journal.

View full post on Search Engine Journal

The Next Generation Of Structured Data: Taking Markup To The Next Level

Contributor Janet Driscoll Miller recaps an SMX West 2015 covering the latest in structured data.

The post The Next Generation Of Structured Data: Taking Markup To The Next Level appeared first on Search Engine Land.



Please visit Search Engine Land for the full article.

View full post on Search Engine Land: News & Info About SEO, PPC, SEM, Search Engines & Search Marketing

SMX West Starts Next Tuesday; All Access Conference and Free Expo+ Passes Still Available

Search Engine Land’s SMX West conference begins next Tuesday in San Jose. Register now to reserve your spot! The search marketing landscape changes almost daily, but your goals don’t. You strive to increase traffic, engage with your audience, improve conversions and maximize your ROI. Invest…



Please visit Search Engine Land for the full article.

View full post on Search Engine Land: News & Info About SEO, PPC, SEM, Search Engines & Search Marketing

7 SEO strategies to implement in 2015 – The Next Web


The Next Web
7 SEO strategies to implement in 2015
The Next Web
Search Engine Optimization (SEO) sounds a bit like rocket science. With the right combo of this widget and that module, add in time, subtract theory and maybe the equation will produce a solution better than the last. Like most technology, what was
The Future of SEO is Not SEOCMSWire
Google SEO: Should Titles & H1 Tags Be Exactly The Same?Search Engine Roundtable
SEO and AdWords SpecialistBizcommunity.com
Digital Journal
all 6 news articles »

View full post on SEO – Google News

Online to Offline: The Next Generation of Search

Mobile phones are increasingly the bridge between search and in-store or over-the-phone purchases, but campaign analysis tools have not closed the loop.

View full post on Home – SearchEngineWatch

Next #SEJThinkTank Webinar: Site Audit #2 by @dantosz

After analyzing four audience-submitted websites from our last webinar, we’ve decided to make site audits a regular part of our #SEJThinkTank schedule.

The post Next #SEJThinkTank Webinar: Site Audit #2 by @dantosz appeared first on Search Engine Journal.

View full post on Search Engine Journal

Search Engine Land’s SMX West Is Next Week – Here’s How to Attend

Search Engine Land’s SMX West conference kicks off next Tuesday. With over 60 educational sessions and keynotes, networking activities and presentations from leading providers, you’ll get the SEO, SEM and conversion-driving tactics and solutions you need to exceed your goals. SMX West offers…



Please visit Search Engine Land for the full article.

View full post on Search Engine Land: News & Info About SEO, PPC, SEM, Search Engines & Search Marketing

Why An Open-Source Pro Sees His Next Act In Security

Security is boring—at least until you don’t have it anymore. Then it becomes exciting for all the wrong reasons. 

In our increasingly interconnected world, it’s also painfully difficult. How do you secure connections to internal devices and external services that you do not and, indeed, cannot own? For enterprises trying to lock down sensitive corporate data in a world awash in personal devices and cloud computing, it’s an exercise in futility. 

Maybe. Maybe not.

Zack Urlocker

Zack Urlocker was just named COO of Duo Security, a Benchmark and Google Ventures-backed security company that aims to make two-factor authentication omnipresent and painless. Is this Urlocker’s next unicorn? After all, as SVP of products and marketing at MySQL, he helped to drive a $1 billion sale by Sun. Later, he went on to run operations at pre-IPO Zendesk (now worth $2 billion). 

Urlocker clearly knows how to build unicorns, but is security ripe for a unicorn-sized exit? 

To better understand the allure of security to Urlocker, I caught up with him to discuss the shift from databases and help desk software to security.

Security Is Big For All The Wrong Reasons

Security has been a big market for a long time, but for all the wrong reasons. And while we like to think of security as someone else’s problem (at least, until our own data is pilfered), a Ponemon study shows that we all bear the costs:

Source: Ponemon

And while malicious criminal attacks account for 42% of data breaches, human error comes in second place (30%). Lost devices or other errors in human judgment open up corporations to all sorts of security problems. 

Making It Easy

The problem for most people, however, is that securing their devices and, hence, their data, can be a pain. Often we won’t bother until we’re forced to do so.

I remember when I first implemented two-factor authentication. My IT team had been pushing me to do it for nearly a year, and I kept resisting because I didn’t want the bother. It didn’t help that some things (like calendars) were shared with other family members on their devices. The thought of having to constantly update the passwords on their devices, and not merely mine, seemed to not be worth the effort.

That is, until my daughter’s Gmail account was hacked.

In this case, the hacker goaded me as I madly tried to get ahead of him to change her passwords. He used the Gmail account to get into her Facebook and other accounts, and used all of them to send vile messages to her and her friends. As I tried to stop him, he IM’d me to laugh at my efforts. It was frightening.

It was the wake-up call I needed, and I implemented two-factor authentication for myself and my family immediately afterward. We haven’t had a problem since (though I wish I could keep my credit card numbers from getting stolen every few months.) 

Since that time, two-factor authentication has become increasingly easy, thanks to companies like Duo Security, which Facebook, Box, Palantir, Yelp, Whatsapp, Etsy, and over 5,000 other companies use to provide simple security to hundreds of millions of users. In fact, Duo has developed solutions that secure 80% of the ISPs globally. 

As Urlocker told me, 

Duo makes strong security easy to buy, easy to use and easy to roll into production. Usually security means making things hard for people. With a SaaS solution, it’s easy to deploy. You can get Duo Security up in running in 15 minutes or a few days for major rollouts compared to weeks or months with traditional solutions. And it works, too! 

That ease of use is essential. I’m a reasonably savvy technologist. No one in my family is. For them to be comfortable with two-factor authentication, it has to be as simple as typing in a password. (Or, in this case, a code sent to them via SMS.)

Learning From Open Source

So how did Urlocker get here from open source land? Duo, so far as I know, isn’t offering its software free over the Internet and charging for support. What can open source teach us about security?

Security, it turns out, has an equally open community, sharing both code and insights into how to secure code. 

Importantly, as he told me, it’s critical to “know how bad guys operate and where the vulnerabilities hide,” not to mention “how customers behave.” The best open source software makes difficult processes easy for developers. Duo is trying to accomplish the same thing for security. 

Which means not foisting silly security policies on users (i.e., forcing them to change passwords every 90 days to equally obscure and hard-to-remember passwords). Duo provides multiple ways for users to authenticate, but the one I like best involves sending push notifications and allowing me to simply to respond.

As the thinking goes, anyone can get my password. But getting my password and my mobile device? That’s hard.

Not surprisingly, then, Urlocker find that certain SaaS categories, like Zendesk, Box, New Relic, HubSpot and Duo Security, “definitely operate at a similar scale” to open-source software, “but with much better conversion rates than we ever had in open source!”

That’s good for Duo, of course, but also for corporate security. Which makes it easier to sleep at night, even if the hackers never do.

Photo by Tim RT

View full post on ReadWrite

Next #SEJThinkTank Webinar With @LorenBaker – “Understanding Dynamic Google SEO: Local, Device, Social, & News” by @dantosz

. Loren will show you how to track these different ratings and share methods you can use to create a integrated digital strategy

The post Next #SEJThinkTank Webinar With @LorenBaker – “Understanding Dynamic Google SEO: Local, Device, Social, & News” by @dantosz appeared first on Search Engine Journal.

View full post on Search Engine Journal

Go to Top
Copyright © 1992-2015, DC2NET All rights reserved