How to bring digital retail experiences to your brick-and-mortar store

Despite the growing popularity of online retail, good old-fashioned brick-and-mortar retail stores are here to stay. What's changing is customer expectations about the retail experience.

In short, online retail and physical retail each have upsides and downsides. Consumers have come to expect all the upsides (like digital retail technology in stores and easily navigable store flow) and as few of the downsides (long lines and poor customer experiences, for instance) as possible. Many stores are accomplishing this balance by establishing digital experiences and technology in retail stores.

Feeling vulnerable? Here’s how to build a cybersecurity vulnerability management program!

As businesses grow, so does their attack surface. More network-connected devices drive innovation and efficiency. But with more devices comes more cyber risk.  Protecting the ever-expanding attack surface is more important than ever, with high-profile vulnerabilities being exploited more frequently—and with more impact. 

One of the most effective ways to mitigate cyber risk is by creating and maintaining a robust vulnerability management program.

How to do hyper personalization right

Personalization is good. It makes people feel good about brands that offer it. Good old-fashioned personalization typically uses data points such as name, title, purchase history, zip code and behavioral data to present relevant information.

The most common example of personalization is mass marketing emails that address each customer by name. Another is when a consumer is browsing for a brown jacket and are then shown online ads for brown jackets on other sites.

Hyper personalization takes it up a notch with artificial intelligence and near-real-time data to provide extremely relevant and timely content to customers. 

Using AI, customer behavior and preferences can be finely captured, and that data can be turned into specific messaging delivered at the right time and place for maximum effect.

Here's how to do hyper personalization right.

How the rise in cyberattacks Is changing consumer behavior

If a store you visit often suffers a cyberattack, you might feel like someone went through your wallet. This kind of attack or data breach, and this kind of feeling, isn’t new. The growing frequency, cost and impact of cyberattacks are new — and consumers notice. Consumers are more aware of attacks than ever before. After all, they affect the public directly more often now, such as when attackers steal their personal information from a large company.

Here's how consumer awareness is changing as the result of the rise in cyberattacks. 

Thanksgiving wine!

Every year we drink for Thanksgiving this stunning amber wine called Veto — both made by our wonderful friend, Sara Meneguz, whose winery is in the Prosecco Hills district of Veneto (just north of Venice). The color of Veto is mind-blowing. The taste is indescribable, unlike any other wine I have ever tasted. And it’s the only wine I know of that pairs with all our Thanksgiving foods. I always try, but fail, to capture the color in photographs. But I love the way this Italian wine sparkles in the California sunshine. I’ll keep trying. 

Thanksgiving apple pie!

Fermented whole spelt, white spelt and emmer flour crust. “Nutty bottom” is pecans with kefir drizzle. Apple coated with cinnamon, brown sugar, home-made chai spice mix and corn starch and topped with butter. Egg wash for the top of the crust. 

I miss the goats in Morocco

If you drive around the parts of Morocco where they grow argan trees for argon oil, you'll always find herds of goats that love to climb the trees. They're cute and I miss them. But the good news is that we'll be going back to Morocco in February! 

Why every region of the world has its own cybersecurity problems

Cybersecurity threats, risks and challenges vary a lot from one region to the next and one nation to the next. Targets vary based on local resources to exploit. Cyber criminals and nation-state attackers zero in on specific nations, companies and organizations for varying incentives. 

Of course, the COVID-19 pandemic exacerbated cybersecurity threats. Attackers might launch remote work-enabled attacks or social engineering attacks using COVID-19 fears as the content. The pandemic caused supply chain and economic woes, too. 

Here are the top cybersecurity issues in each corner of the globe today.