Get latest articles directly in your inbox, stay up to date

Avoiding Pitfalls in AI Adoption

Effective Prioritization Methods for Digital Product Development

Banking with Cloud Technology: A Strategic Perspective

Generative AI's Impact on Business

4 Key Ways to Modernize Your Contact Center

Online's Top 5 Blogs of 2023

User Stories & Design Decisions

Disk Level Encryption: The 3.2.1 Magic Bullet has been Left Behind

The Ultimate Guide to Salesforce Optimization & How to Align Your Business Process with Salesforce

Hands on with the Distributed Application Runtime (Dapr)

8 Key Takeaways from Salesforce's Dreamforce 2023

The Risks of Biometric Authentication in the Age of Deep Fakes

Cybersecurity for FQHCs: A Tale of Two Approaches

Leveraging Design Systems for Scalability, Revenue & Market Advantage

Take a Pit Stop – 5 Point Inspection Questions to Consider NOW before the 4.0 Last Lap

Don't Model Your Business After Apple

Leverage Servitization to Enhance Your CX

Developing a B2B eCommerce Strategy

SWIFT CSP: Internal vs. External Assessments

Compliance Unfiltered - A PCI 4.0 Podcast

Navigating ChatGPT's Blindspots

The Future of NLP in Data Analysis & Reporting

Generative AI for Enterprise – When to Apply & What to Consider

Cloud has Changed Teams, Security Should Change Teams, Too

Online's Top 5 Blogs of 2022

Generate Quotes 3x Faster With Salesforce CPQ

Cybersecurity Awareness for Holiday Shoppers

5 Essential Digital Transformation Levers

Health Cybersecurity: Tabletop Exercises

Gaining Market Share in the Modern Marketplace

IVA’s | Your Virtual Sidekicks

How to Optimize Your B2B eCommerce Website

There is Trouble Brewing: In Place with Remediation

Quote Better Using These 3 Hidden Features

Making Sense of the Metaverse

Why Aren't you Red Teaming?

Using Salesforce for Projects: 4 Steps to Success

How Will Changes the SEC Made Impact you?

On Location in the Metaverse...

Meet Your New Frontline

Are You Confident You Can Quickly Recover From a Data Disaster?

Authenticated Vulnerability Scanning

PCI v4.0 - Requirement 7:  All Things Accounts and Access Reviews

Initiatives to Deliver a B2B Customer Experience

4 Things You Must Know About PCI's New Anti-Malware Requirements

Learn How to Improve B2B Customer Experience Using This Strategy

Targeted Risk Assessments | Know Thy Risks

Roles and Responsibilities | Who's Driving What?

The Customized Approach | Part 1

The Customized Approach | Part 2

The Customized Approach | Part 3

Critical Considerations for Global Cyber Awareness

Tim's Top Trends of 2022

The Impact of the Metaverse

Are We There Yet?

Log4Shell: You Can't Protect What You Don't Know About

Bridging The Unified Communication Gap

PCI DSS 4.0 - Don't let Questions get in Your Way

3 Software Architecture Patterns to Elevate Your Cloud Solutions

Online's Top 5 Blogs of 2021

Happy Holidays From Online!

Log4Shell – Fukushima or Tip of the Iceberg? 

How Wholesale Distributors can Maximize their eCommerce Investment

6 Best Practices for Modern Application Development

Information System Activity Review

Cybersecurity Awareness Month Recap

Long Term Flexibility for eCommerce Architecture

Is It Time to Modernize Your Service Desk?

B2B & Customer Experience

10 Steps to Ransomware Preparedness

Is It Time to Re-Platform your B2B eCommerce System?

Don't Trust Until You Verify

Building the Right Product. Building the Product Right.

The Value of Data-Driven Organizations

Mobile Apps Are Not Dead

Ransomware on the Rise. How iSecOps Can Help.

Intelligent Virtual Agent Task Library

Back to the Fundamentals

The Privacy Pendulum

Minimum Viable Process

Why Upgrading Your ERP Isn't the Answer

What Can We Do About Bias in ML/AI Systems?

How Bias Gets Into ML and AI Systems

Online's Innovation Lab

Machine Learning Bias

5 Essential Digital Transformation Levers

The Value of an Online Consultant

Get Smarter About Your Customers With Salesforce Einstein

Through the Lens of a Pen Tester

35 Years At a Glance

Working From Home AGAIN With Kids? Read This

Can you Afford to Take Chances With Your Patients' Valuable Data?

The Real Impact of B2B eCommerce on Your Sales Team

Salesforce Security & Your Organization

5 Ways to Engage Employees

Building a Web API Project with GoLang

Compete With Online Marketplaces - Deepen Customer Relationships

10 Things you Didn’t Know About SecMonOps

Build Your Best Brand Advocates by Connecting Employee and Customer Experiences

Defining and Driving the Return on Experience (ROX): Impact to Your Brand

Which Era of Service are Your Customers Receiving?

Why Employee Experience is Pivotal to Your Growth

An Update From our Innovation Lab

What is Happening With the new PCI 4.0 Standard?

5 Keys to Making SecOps Work in the Real World

The Problem With the SIEM

Our Top 5 Blogs of 2020

Happy Holidays From all of us at Online!

Five Principles of Interaction Design v2.0

Where Will NLP Lead you? - The Rise of AI-Enabled Voice Applications

Durable Entities: A Serverless Notification Solution 

Who Benefits the Most From Virtual Agents?

Customer-Centric B2B and Using JTBD

You've. Been. Hacked. Now What?

Where is my ROC?

Don't be a bad Rabbit

Successful Security Monitoring Operations Implementation

Left, Right, or Straight?

"Should I Scrum or Stay SAFe®?"

US-Based Tech Company Hires vCISO: A Case Study

Innovation and the Platform Network Effect - Part 3

Cybersecurity Is About Attitude, Culture... Not Strictly Compliance

Product Innovation Part 2: JBTD & ODI

Secure POS Implementations Gone Wrong

Top 5 Signs you Need a Virtual CISO

Getting Back to Normal

The Art of the Possible - Enabling a New Front-end Framework

The New Paradigm - A Rapid Shift for Business

Innovation Growth Strategy- Part 1 of a 3-Part Series

A QSA Reflects on the COVID-Affected Security Landscape

What are you Waiting for?

9 COVID Security Scams Unmasked

The Conversation Shouldn’t Change - Even if the Channel Does

A Note From our Founder: Chuck Loewen

How Resiliency Kills Strategies

Working From Home, With Children? Agile can Help!

Salesforce Care Packages: How Online & Salesforce can Help During COVID-19

Are you Agile or FrAgile?

Social Distancing is Network Segmentation

Healthcare & Security: In Changing Times

Business Resumption: Contact Centers

Remote PCI Assessments: We're Adapting With You

When Life Gives you Limes.....

A Security and Compliance Guide to HIMSS20: A candid approach from RSP Director Adam Kehler

When to get a Threat-Based Risk Assessment

Are you Ready to Have This Conversation?

Highlights From The PCI Dream Team Session 8

Creating an Engaged Customer Experience

Online's Top 10 Blogs of 2019

Enterprise Performance Management - The Strategy to Execution Journey

Do you Have These Misconceptions on Agile Retrospectives?

20/20 Vision Requires a 360° View

Baking Cybersecurity into Your Digital Transformation

Notes from the 2019 PCI Community Meeting

Governance in Digital Transformation

Tribe of Hackers - Red Teams & More

You've. Been. Hacked.

Why Work With Our Digital Studio?

How to Avoid Risky Business

Are you Using These Three Methods to Detect Anomalies?

5 Ways a BA can Prevent the Agile Product Owner Blues

There's Nothing Like a Good Story

The Cybersecurity Marathon

Tanking at Transformation:  Four Steps to Digital Failure

The Higher Learning Curve

An Introduction to Design Systems

So Much Has Changed

Give Your Patients' Data a Clean Bill of Health

How to be a Great Place to Work

The Gift (card) That Keeps on Taking

Competencies to Succeed in an AI Workforce

Does Your Digital Brand Deliver Your Promise?

The Evolution of Genesys- An Onliner's Perspective

RSA 2019 Recap

Identifying High Impact Processes for RPA

Update From the Innovation Lab: Machine Learning

Lessons Learned From Sports: Part Two

Can our Scrum Master be our Agile Coach?

Health Information Security - Five Tips to Consider for 2019

You Should Become Pals With Privacy

Enterprise Security Risk Management 101

Lessons Learned from Sports: Part One

Digital Transformation: Know Where You’re Starting From

PCI DSS: When to Test Controls & Functions

Four Steps to Implementing Robotic Process Automation (RPA)

Our Top 10 Favourite Blog Topics From 2018

2018 Technology Trends: Blockchain

3 Ways to Protect Your Data From Hackers

When a Design Sprint Isn't a Sprint - Part Two

Who Thinks of HP for End-Point Security?

3 Reasons Why Agile Adoption Should not be Your Goal

Turn Down That Noise! Tuning into Cybersecurity for the Financial Sector

When a Design Sprint isn’t a Sprint: Lessons Learned from Doing a Design Sprint in Slow-Motion

The Foundation Beneath Digital Transformation

4 Ways an Agile Coach Can Boost Your Agile Adoption

HP Continues to Demonstrate its Commitment to Printer Security

Password123! - Why Does Authentication Have to Be So Hard?

The Name of the Game is Privacy, Especially in California: Part Three

Innovation Lab Update

Technology Trends to Look Out for in 2018: The Internet of Things

Submit a Comment

Get latest articles directly in your inbox, stay up to date