Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

ContactCenterWorld.com

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used

Twitter

Facebook

LinkedIn

Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used

LinkedIn

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

OK
BECOME
A MEMBER
TODAY TO:
CLICK HERE
TELL A
FRIEND

TRAINING IN CONTACT CENTERS

Upcoming Events

TRAINING IN CONTACT CENTERS

INCREASE MOTIVATION - WHAT DRIVES YOU CRAZY AT WORK!

LEAD GENERATION PROGRAMS FOR VENDORS

MANAGING A WORK FROM HOME TEAM - FREE ONLINE CONFERENCE STARTS IN

CUSTOMER EXPERIENCE BEST PRACTICES

[HIDE]

Here are some suggested Connections for you! - Log in to start networking.

News : Keyfactor Researchers Identify RSA Certificate Vulnerability

#contactcenterworld, @keyfactor, @mrb_pr

Cleveland, Ohio, December 16, 2019 -- Keyfactor, a provider in securing digital identities, announced research findings identifying a vulnerability across active RSA certificates. RSA certificates and the RSA algorithm are commonly used to securely transmit data to a remote source. Using minimal computing resources, researchers were able to collect and analyze 175 million RSA certificates and keys used to protect real-world Internet traffic.

"The findings are alarming," said Ted Shorter, chief technology officer and co-founder at Keyfactor. "The research finds inordinate rates of compromise impacting IoT devices with design constraints and limited entropy. These devices could include cars, medical implants and other critical devices, that if compromised, could result in life-impacting harm."

The active and publicly available RSA keys (which consist of the product of two large, randomly chosen primes) were mined to identity common factors. Any keys sharing one of their prime factors with another key are compromised by this technique. The analysis found over 435,000 certificates with a shared factor, with researchers able to rederive the private key.

"In a real-world attack scenario, a threat actor with a re-derived private key for an SSL/TLS server certificate could impersonate that server when devices attempt to connect," said JD Kilgallin, senior integration engineer and researcher at Keyfactor. "The connecting user or device cannot distinguish the attacker from the legitimate certificate holder, opening the door to critical device malfunction or exposure of sensitive data."

When these devices include medical implants and cars, the impact of the malfunction can be devastating. The research stresses the importance of security best practices, random number generation for connected systems and use of cryptography to securely install firmware and software updates through the lifecycle of the device.

"Security at design is paramount for device manufacturers," said Shorter. "Current-generation connected devices and systems must be equipped to defend against a new generation of security risks. Cryptography is essential in ensuring new and emerging devices are able to adhere to and scale with security best practices."

#contactcenterworld, @keyfactor, @mrb_pr


About Keyfactor:
Company LogoFounded in 2001, Keyfactor is a market leader in comprehensive digital security management.
Company RSS Feed   Company Facebook   Company Twitter   Company YouTube   Company LinkedIn   Company Profile Page

About MRB PR:
Company LogoMRB PR is a public relations company.
Company RSS Feed   Company Facebook   Company Twitter   Company LinkedIn   Company Profile Page

Today's Tip of the Day - Where Is The Problem?

Read today's tip or listen to it on podcast.

Published: Tuesday, December 17, 2019

Printer Friendly Version Printer friendly version

2021 Buyers Guide Automation

 
1.) 
Agara

Agara is an autonomous virtual voice agent powered by Real-time Voice AI. It is designed to have intelligent conversations with your customers, vendors, and partners without any assistance from human agents. It can handle a wide variety of calls including inbound customer care calls, outbound lead generation calls, appointment scheduling calls, and overdue payment recovery calls.

Agara is available for several industries including banking, insurance, retail, e-commerce, airlines, and telecom. Powered by advanced Real-time Voice AI that understands speech in real-time, automatically determines the right process to follow and guides the caller along in the process with natural conversation.

2.) 
Auraya

EVA Voice Biometrics
Powered by Auraya's patented ArmorVox engine, EVA is a voice biometric extension that provides secure and seamless identification & verification capabilities for Amazon Connect. EVA provides delightful customer experience by removing the friction of providing PINs, passwords or secret information in order to prove caller identity. EVA comes standard with active and passive modes and a simple yet powerful agent interface. This allows for personalised self-service and a more friendly and efficient experience when interacting with an agent.

Outdated security methods such as PINs, passwords and security questions have become insecure and unreliable. Forgetting passwords and security answers o...
(read more)

3.) 
Consilium Software

Consilium UniCloud™
UniCloud™ is an intuitive platform that allows Enterprises to deploy and manage their Unified Communication (UC) and Contact Center (CC) services with ease and entire provisioning can be completed in seconds using this comprehensive tool supporting digital transformation. The latest release 7.0 of UniCloud™ is a multi-tenant platform that transforms the delivery, management, and integration of collaboration and contact center solutions, for both Cloud and On-Premise deployment models.
With its single-pane-of-glass views and quick provisioning tool, UniCloud™ is instrumental in reducing the time to provision an entire multi-cluster Cisco collaboration platform, including contact centers (C...
(read more)

4.) 
Emmersion

Automated Language Testing
Emmersion offers automated assessments to quickly and accurately test speaking, writing, and grammar fluency in 9 languages and counting. We help contact centers improve CSAT scores by screening for top talent and retaining top performers.

5.) 
OpsTel Services

SPEED & PLUS
The SPEED solution solves for service level issues while cost optimizing the environment with automation.

Provides an enhanced way to speed up & optimize invoking temporary agent skills configuration changes into the contact center environment.

Speed allows you to schedule both future changes & temporary changes that auto-revert back to the original state when scheduled time expires.

Speed features:

*Automated / Scheduled Temporary Agent Skills Configuration Management
*Immediate Temporary or Reoccurring Schedule Skills Configuration Changes
*Easy to Use/Operations Administration Focused
*Descriptive Monitoring Activity Dashboard
*Detailed “End to End’ Audit Trail and Perfor...
(read more)
 

New 2021 Membership

About us - in 60 seconds!

Submit Event

Upcoming Events

The place where the world's best meet and share their best practices!

A place for professionals to learn the latest and greatest strategies and ideas and to connect with the elite in the industry. 

This is the highest rated industry event with ... Read More...
 133 

Latest Americas Newsletter
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
CMS =
session cookie set = True
session page-view-total =
session page-view-total =
applicaiton blnAwardsClosed = True
session blnCompletedAwardInterestPopup = False
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =