Three Steps to Protect Your Business In the Age of GDPR
Understanding your legal responsibilities when managing consumer identities may be awfully difficult at the moment, what with the United States taking a deregulated approach and the European Union...
View ArticleProgressive Identity: The Secret to Winning at The “Chutes and Ladders” of...
The popular children’s board game Chutes and Ladders™ (known in the UK as “Snakes and Ladders”) is meant to teach a basic lesson about morality. Chutes are vices that set you back, and ladders are...
View ArticleAirlines Take Flight with Customer Identity
Customer identity is nothing new to airlines. Since the beginning, airlines have harnessed customer data to drive their frequent flyer or membership programs, engaging users to retain their loyalty and...
View ArticleResearch Analysts Now See CIAM as a Mainstream Customer Experience Tool
For the first time ever, top research analysts are now recognizing the business-critical importance of customer identity and access management (CIAM). The Forrester Research Wave, the Gartner Critical...
View ArticleTwo Quick Tips for Protecting Consumer Privacy in the “Space Age”
Pop culture and the media have been propagating consumer interest in the “space age” for years. Take, for example, the Jetsons – one of television history’s most beloved shows, where George Jetson and...
View ArticleLive Webinar: Balancing Privacy and Personalization with Identity 3.0
The results of Gigya’s 2015 State of Consumer Privacy & Personalization report reveal that, while social login usage continues to skyrocket, consumers are also showing a marked interest in...
View ArticleLive Webinar: The Hidden Costs of Third-Party Data
According to Experian, “dirty data” directly impacts the bottom line of 88% of companies, with the average company losing 12% of revenue. 44% of businesses say that missing or incomplete data is the...
View ArticleThe Best Place to Manage Customer Identity Data? The Cloud
As the amount of data generated by always-connected consumers continues to increase, IT departments are scrambling to deploy technologies that are able to put said data to use. Understanding how to...
View ArticleMending the Gap between Marketing & IT: Customer Identity Management as an...
CMO technology budgets are expected to increase 10x over the next 10 years (CMO Club & IBM) – proof that marketers are controlling a growing volume of IT budget as personalized, data-driven user...
View ArticleLive Webinar: Bridging the Gap between Marketing & IT with CIAM
As customer data and digital experiences become the linchpins of business success, there is an unprecedented need for marketing and IT to come together. Bridging this age-old gap requires a solution...
View ArticleThe Cost of Non-Compliance: Putting a Price on Privacy
With the invalidation of the EU-US Safe Harbor agreement in October 2015, privacy compliance has been top of mind for businesses and consumers alike. Focus on privacy can only be expected to intensify...
View Article2016 Consumer Identity Predictions: Part 2
2016 promises to be a year of enhanced development in the customer identity and access management (CIAM) space, with customer experience, data privacy and personalization proving to be increasingly...
View ArticleSupporting Data Localization and Consumer Privacy: Gigya’s New Russian Data...
The Russian Federation’s Personal Data Protection Act went into effect on September 1, 2015, mandating that companies that maintain online properties that serve Russian citizens store and manage those...
View ArticleConsumer Brands Must Ditch Passwords; Find Future in Biometrics
Originally featured on MarTech Advisor, http://www.martechadvisor.com/ Jason Rose, SVP of Marketing, Gigya guides marketers to implement easy to use, secure and permission-based password and...
View ArticleNintendo and Niantic Change the Game
In its boldest move in over a decade, Nintendo—partnering with Alphabet (Google, Inc.) developer Niantic—finally entered the mobile gaming market on July 6 with the augmented reality game Pokémon Go,...
View ArticleSocial Login Solutions: Addressing Vulnerabilities in Customer Identity...
Organizations readily acknowledge that they must protect the valuable information of their employees and their organization as a whole. However, it must also be acknowledged that organizations have a...
View ArticleExploring the Future of Identity
On November 10th, I had the privilege of joining a panel discussion on the future of identity during the Digital Marketing Summit West at the Rosewood Sand Hill Hotel in Menlo Park, California,...
View ArticleMy Personal Invitation to IDENTIFIED. The Customer Identity Conference
Take a look! We are excited to announce that Gigya is launching IDENTIFIED. The Customer Identity Conference, on Tuesday 6th June, 2017, in London. We’re bringing together top industry experts,...
View ArticleWhy You Should Pay Attention to Marketing Technology
Earlier this week I appeared on The First Ever List of Female Marketing Technologists. I’m honored to stand among the smartest and brightest leaders in the industry. I think back to the early days of...
View ArticleCommonly Asked Questions about the GDPR from Our Recent IAPP Webinar
During the recent webinar hosted by the International Association of Privacy Professionals (IAPP) and sponsored by Gigya, the engaging presentations and discussion made the hour fly by. As a result, we...
View Article