<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Deliver Intelligence &#8211; Dibiz JSC</title>
	<atom:link href="https://dibiz.vn/en/feed/" rel="self" type="application/rss+xml" />
	<link>https://dibiz.vn/en/</link>
	<description></description>
	<lastBuildDate>Thu, 16 Oct 2025 02:15:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://dibiz.vn/wp-content/uploads/2025/06/cropped-cropped-cropped-cropped-3-1-32x32.png</url>
	<title>Deliver Intelligence &#8211; Dibiz JSC</title>
	<link>https://dibiz.vn/en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DIBIZ Partners with VTV: Advancing Digital Transformation at Technology Exhibition &#038; Seminar</title>
		<link>https://dibiz.vn/en/dibiz-partners-with-vtv-advancing-digital-transformation-at-technology-exhibition-seminar/</link>
		
		<dc:creator><![CDATA[tiếp thị]]></dc:creator>
		<pubDate>Tue, 14 Oct 2025 03:28:35 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[Vicarius]]></category>
		<guid isPermaLink="false">https://dibiz.vn/dibiz-partners-with-vtv-advancing-digital-transformation-at-technology-exhibition-seminar/</guid>

					<description><![CDATA[<p>DIBIZ and VTV: A Milestone in Digital Transformation – A Look Back at the Impressive Technology Exhibition &#38; Seminar &#160; &#160; In the dynamic landscape of the Fourth Industrial Revolution, where audience information consumption habits are constantly evolving, the television industry faces both a significant challenge and a unique opportunity to innovate. &#160; As the...</p>
<p>The post <a href="https://dibiz.vn/en/dibiz-partners-with-vtv-advancing-digital-transformation-at-technology-exhibition-seminar/">DIBIZ Partners with VTV: Advancing Digital Transformation at Technology Exhibition &amp; Seminar</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vgblk-rw-wrapper limit-wrapper">
<h2><strong><span class="notion-enable-hover" data-token-index="0"><a href="https://dibiz.vn/">DIBIZ </a>and VTV: A Milestone in Digital Transformation – A Look Back at the Impressive Technology Exhibition &amp; Seminar</span></strong><!-- notionvc: fd54ea9e-8d87-4bc6-953d-ae1ebadf4244 --></h2>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>In the dynamic landscape of the Fourth Industrial Revolution, where audience information consumption habits are constantly evolving, the television industry faces both a significant challenge and a unique opportunity to innovate.</p>
<p>&nbsp;</p>
<p>As the national broadcaster, Vietnam Television (VTV) has not only recognized this shift but has also taken decisive action. This commitment was clearly demonstrated by the two-day Exhibition and Seminar, &#8220;Technology Applications in Digital Transformation at Vietnam Television,&#8221; held on October 9-10, 2025.</p>
<p>&nbsp;</p>
<p><!-- notionvc: 80f40e37-5eaf-467b-a5d0-9a3fa982f0b1 --></p>
<h3><strong>The Technology Exhibition Space</strong></h3>
<p>&nbsp;</p>
<p>The event featured leading names in the technology sector, including Logico, Savis, VNPT (IT), GEETEK, Vietcom, Fortinet, EVS, EDS, NetaGroup, and ourselves—DIBIZ. We presented a comprehensive perspective built on two key pillars: proactive cybersecurity and the detection of disinformation and fake news in cyberspace.</p>
<p>&nbsp;</p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-996696" src="https://dibiz.vn/wp-content/uploads/2025/10/0910-trien-lam-cong-nghe-2-300x200.jpeg" alt="" width="656" height="437" srcset="https://dibiz.vn/wp-content/uploads/2025/10/0910-trien-lam-cong-nghe-2-300x200.jpeg 300w, https://dibiz.vn/wp-content/uploads/2025/10/0910-trien-lam-cong-nghe-2-1024x683.jpeg 1024w, https://dibiz.vn/wp-content/uploads/2025/10/0910-trien-lam-cong-nghe-2-768x512.jpeg 768w, https://dibiz.vn/wp-content/uploads/2025/10/0910-trien-lam-cong-nghe-2-1536x1024.jpeg 1536w, https://dibiz.vn/wp-content/uploads/2025/10/0910-trien-lam-cong-nghe-2.jpeg 1902w" sizes="(max-width: 656px) 100vw, 656px" /></p>
<p>&nbsp;</p>
<p>DIBIZ showcased Vicarius, an AI-powered solution for continuous vulnerability management and remediation. In an environment where television broadcasters are prime targets for cybercriminals, a passive defense is no longer sufficient. The key advantage of Vicarius is its ability to automatically &#8220;patch&#8221; vulnerabilities, helping to shift the paradigm from a reactive &#8220;respond-after-attack&#8221; approach to a proactive, early defense strategy. The integration of AI enhances the system&#8217;s intelligence, enabling it to predict potential threats and take action before hackers have an opportunity to exploit them. Additionally, DIBIZ also presented other cybersecurity solutions, including <a href="https://cyabra.vn/">Cyabra</a>, Commvault, and Exagrid.</p>
<p>&nbsp;</p>
<p><img decoding="async" class="alignnone wp-image-996689" src="https://dibiz.vn/wp-content/uploads/2025/10/IMG_4231-300x225.jpg" alt="" width="643" height="482" srcset="https://dibiz.vn/wp-content/uploads/2025/10/IMG_4231-300x225.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/10/IMG_4231-1024x768.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/10/IMG_4231-768x576.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/10/IMG_4231-1536x1152.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/10/IMG_4231.jpg 1600w" sizes="(max-width: 643px) 100vw, 643px" /></p>
<p>&nbsp;</p>
<h2><strong>In-depth Seminar: Technology Applications in Digital Transformation at Vietnam Television</strong></h2>
<p>&nbsp;</p>
<p><img decoding="async" class="alignnone wp-image-996698" src="https://dibiz.vn/wp-content/uploads/2025/10/pat09247-17094923062550002866990-46211138352879812435026-300x188.webp" alt="" width="645" height="404" srcset="https://dibiz.vn/wp-content/uploads/2025/10/pat09247-17094923062550002866990-46211138352879812435026-300x188.webp 300w, https://dibiz.vn/wp-content/uploads/2025/10/pat09247-17094923062550002866990-46211138352879812435026-1024x640.webp 1024w, https://dibiz.vn/wp-content/uploads/2025/10/pat09247-17094923062550002866990-46211138352879812435026-768x480.webp 768w, https://dibiz.vn/wp-content/uploads/2025/10/pat09247-17094923062550002866990-46211138352879812435026.webp 1200w" sizes="(max-width: 645px) 100vw, 645px" /></p>
<p>&nbsp;</p>
<p>During the seminar, Mr. Dinh Dac Vinh, Deputy General Director of Vietnam Television, affirmed that VTV is strongly committed to implementing new technologies, especially artificial intelligence (AI), across all operations, from production and content moderation to operational management.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996700" src="https://dibiz.vn/wp-content/uploads/2025/10/pat09226-31215959405782823799814-300x200.jpg" alt="" width="641" height="427" srcset="https://dibiz.vn/wp-content/uploads/2025/10/pat09226-31215959405782823799814-300x200.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/10/pat09226-31215959405782823799814-1024x683.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/10/pat09226-31215959405782823799814-768x512.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/10/pat09226-31215959405782823799814-1536x1024.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/10/pat09226-31215959405782823799814-2048x1365.jpg 2048w" sizes="(max-width: 641px) 100vw, 641px" /></p>
<p>&nbsp;</p>
<p>He stated that in 2025, VTV successfully implemented cloud-based remote production and virtual studio technology, which helped optimize costs and increase production efficiency. &#8220;Our next strategic objective is to build the VTV Big Data platform,&#8221; Mr. Vinh emphasized, describing it as the &#8220;brain&#8221; that will drive the station&#8217;s future development.</p>
<p>&nbsp;</p>
<h2><strong>Exclusive Interview with the Vice President of DIBIZ</strong></h2>
<p>&nbsp;</p>
<p>On the sidelines of the event, Ms. Tran Thu Ha, Vice President of DIBIZ, shared her insights on the issue of fake news in an interview with Vietnam Today.<br />
<!-- notionvc: 3ca67058-b253-4377-bf40-267d4d64e7c0 --></p>
<p>&nbsp;</p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-996705-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://dibiz.vn/wp-content/uploads/2025/10/Vietnam-Today-phong-van-1.mp4?_=1" /><a href="https://dibiz.vn/wp-content/uploads/2025/10/Vietnam-Today-phong-van-1.mp4">https://dibiz.vn/wp-content/uploads/2025/10/Vietnam-Today-phong-van-1.mp4</a></video></div>
<p>&nbsp;</p>
<p>Speaking about Cyabra, the &#8220;Disinformation Defense&#8221; solution DIBIZ presented at the exhibition, she explained: <em><span class="notion-enable-hover" data-token-index="1">&#8220;With every breaking news story that emerges, it can be difficult to verify its authenticity. We use AI to audit AI, helping you determine whether the news is genuine or a product of AI-driven manipulation.” </span></em><!-- notionvc: a2496bea-6c18-49f8-a1f3-3f059572406a --></p>
<p>&nbsp;</p>
<h2><strong>Conclusion<span class="notion-enable-hover" data-token-index="0">: </span>DIBIZ is Ready for the Digital Future<!-- notionvc: 1840bba7-47e1-4d25-8301-89435846cff7 --></strong></h2>
<p>&nbsp;</p>
<p>Following the event, DIBIZ reaffirms its role as more than just a technology provider; we are a strategic partner on the digital transformation journey. By offering a comprehensive digital ecosystem and advanced AI solutions, we are committed to our mission to &#8220;Deliver Intelligence&#8221;—empowering businesses with the insights and tools to excel in the new technological era.</p>
<p>&nbsp;</p>
<p>The path forward for VTV and other Vietnamese enterprises will be more secure and robust with DIBIZ as a partner, as we work together to shape a digital future that is safe, efficient, and distinctive.</p>
<p>&nbsp;</p>
<blockquote><p>To receive materials from the seminar or for an in-depth consultation on our Vicarius, Cyabra, Commvault and Exagrid solutions, please contact: <strong><br />
<em>Ms. Ha </em></strong>&#8211; Phone: 0326291803. Email: <a href="mailto:hatt@dibiz.vn">hatt@dibiz.vn</a></p></blockquote>
<p><!-- notionvc: 774b65db-e638-4614-8ebf-11a7305e43f6 --></div>
<p><!-- .vgblk-rw-wrapper --></p>
<p>The post <a href="https://dibiz.vn/en/dibiz-partners-with-vtv-advancing-digital-transformation-at-technology-exhibition-seminar/">DIBIZ Partners with VTV: Advancing Digital Transformation at Technology Exhibition &amp; Seminar</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Future-Proofing Your Data: Post-Quantum Cryptography and Beyond Bảo Mật Dữ Liệu Lượng Tử: Mật Mã Hậu Lượng Tử &#038; Tương Lai</title>
		<link>https://dibiz.vn/en/future-proofing-your-data-post-quantum-cryptography-and-beyond-bao-mat-du-lieu-luong-tu-mat-ma-hau-luong-tu-tuong-lai/</link>
		
		<dc:creator><![CDATA[tiếp thị]]></dc:creator>
		<pubDate>Tue, 07 Oct 2025 03:00:12 +0000</pubDate>
				<category><![CDATA[Commvault]]></category>
		<guid isPermaLink="false">https://dibiz.vn/?p=996684</guid>

					<description><![CDATA[<p>Enter the looming threat of quantum computing. These powerful machines harness the power of quantum mechanics to solve problems more quickly than traditional computers. This includes cracking the key and encryption standards that safeguard our world of data. &#160; This is where post-quantum cryptography (PQC) comes in, and why Commvault has chosen to implement it...</p>
<p>The post <a href="https://dibiz.vn/en/future-proofing-your-data-post-quantum-cryptography-and-beyond-bao-mat-du-lieu-luong-tu-mat-ma-hau-luong-tu-tuong-lai/">Future-Proofing Your Data: Post-Quantum Cryptography and Beyond Bảo Mật Dữ Liệu Lượng Tử: Mật Mã Hậu Lượng Tử &amp; Tương Lai</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vgblk-rw-wrapper limit-wrapper">Enter the looming threat of quantum computing. These powerful machines harness the power of quantum mechanics to solve problems more quickly than traditional computers. This includes cracking the key and encryption standards that safeguard our world of data.  </p>
<p>&nbsp;</p>
<p>This is where post-quantum cryptography (PQC) comes in, and why <a href="https://dibiz.vn/commvault/">Commvault</a> has chosen to implement it to safeguard your data.    </p>
<p>&nbsp;</p>
<h2><strong>Why We Need PQC</strong></h2>
<p>&nbsp;</p>
<p>Many of the asymmetric and symmetric cryptography algorithms we use to protect data from prying eyes rely on mathematical problems factoring in large numbers</p>
<p>&nbsp;</p>
<ul>
<li><strong>While these are difficult for classical computers to crack, quantum computers solve these mathematical problems significantly faster, making what was once thought impossible very much possible.</strong></li>
<li>This could leave any sensitive information that is normally encrypted, such as credentials, emails, financial data, and medical records, exposed.</li>
</ul>
<p>&nbsp;</p>
<p>You might think the threat of quantum computing is five to ten years away, but anyone who recently attended the keynote at Ignite/Reinvent/Next would know that quantum computing resources are already available and the technology is rapidly advancing. And now it’s available to anyone, including malicious actors. The question is, how do you shield your organization? </p>
<p>&nbsp;</p>
<p>.    </p>
<p>&nbsp;</p>
<h2><strong>A Multi-Faceted Approach: Bigger Keys, Better Locks, and PQC</strong></h2>
<p>&nbsp;</p>
<p>Although full-fledged PQC algorithms are still on the way to being standardized, there are steps we can take now to bolster our defenses. One approach is to increase cryptography key lengths on symmetric algorithms, so it takes a longer time to crack encryption with brute-force attacks. This is very similar in principle to increasing the number of pins in a tumbler lock. The more pins the lock utilizes, the more difficult and time consuming it is to crack. The larger and more complex the key is, the harder and longer it takes to replicate or guess.     </p>
<p>&nbsp;</p>
<h2><strong>Secure Post-Quantum Data Encryption</strong></h2>
<p>&nbsp;</p>
<p>AES encryption has long been the industry standard algorithm for secure symmetric encryption, and in the near term it will continue to be relatively sufficient in securing against quantum brute-force attacks, as long as high key sizes are utilized. Commvault already has standardized data encryption on AES-256, which is the highest supported key length for AES. </p>
<p>&nbsp;</p>
<p>To put things into perspective, we can look at <a href="https://www.geeksforgeeks.org/dsa/introduction-to-grovers-algorithm/">Grover’s algorithm</a> to demonstrate the potential threat of brute-force attacks. Grover’s algorithm is a commonly known algorithm used to solve complicated mathematical problems. It also can be used to speed up password brute-force attacks, especially when executed on quantum computers.  </p>
<p>&nbsp;</p>
<p>With Grover’s algorithm, the time to crack AES-256 encryption still would be impractical due to the key size (it effectively halves the key size) and because the current generation of quantum computers is not quite powerful enough. So, AES-256 is still a viable encryption algorithm in the foreseeable future. </p>
<p>&nbsp;</p>
<h2><strong>Secure Post-Quantum Communication</strong></h2>
<p>&nbsp;</p>
<p>When it comes to the asymmetric encryption algorithms (public-key cryptography) that are used for secure communication and digital signatures, things look bleak. This is one of the cryptographic areas at highest risk of impact by quantum computing since RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography) algorithms are severely weakened by quantum computers.  </p>
<p>&nbsp;</p>
<p>Following public calls to action to develop PQC standards, the National Institute of Standards and Technology (NIST) coordinated the solicitation, evaluation, and selection of candidate algorithms for PQC starting in 2016. As of December 2023, the final post-quantum algorithms have been selected, and NIST has begun drafting the <a href="https://csrc.nist.gov/Projects/post-quantum-cryptography/publications">standard guidance and publications </a>around them. </p>
<p>&nbsp;</p>
<p>Commvault has taken the first steps in incorporating some of the upcoming PQC standards to improve secure communication. Two key components needed to be updated to provide quantum protection: </p>
<p>&nbsp;</p>
<ul>
<li>Key exchange and encapsulation: Establishes a symmetric encryption key during TLS setup.</li>
<li>Signature generation and verification: Creates a chain of certificates and authenticates parties involved in the TLS setup, preventing man-in-the-middle attacks.</li>
</ul>
<p>&nbsp;</p>
<p>The traditional key exchange algorithm, ECDH (Elliptic-curve Diffie-Hellman), is susceptible to attacks with the advent of quantum computers. CRYSTALS-Kyber, a NIST-approved post-quantum algorithm, serves as a replacement for ECDH. </p>
<p>&nbsp;</p>
<p>However, a secure TLS connection requires more than just key exchange. Both ECDH and Kyber are vulnerable to man-in-the-middle attacks. This necessitates the use of a certificate chain and signed/verified messages during TLS setup. Conventional cryptography relies on RSA with large private/public key sizes (2048, 3072, etc.) for this purpose. NIST has recommended post-quantum alternatives for RSA, which includes:    </p>
<p>&nbsp;</p>
<ul>
<li>CRYSTALS-Dilithium3</li>
<li>Falcon</li>
<li>Sphincs+</li>
</ul>
<p>&nbsp;</p>
<h2><strong>Today’s Best Combo</strong></h2>
<p>&nbsp;</p>
<p>Customers immediately can begin securing their environment against quantum-based attacks starting in the most recent software release, Commvault Cloud CPR 2024, which leverages <strong>CRYSTALS-Kyber</strong> for key encapsulation, and CRYSTALS-Dilithium3 or FALCON for digital signature schemes, to provide secure communication within the Commvault® Cloud platform. </p>
<p>&nbsp;</p>
<p>Once enabled, data communication within Commvault will be resistant to quantum attacks, while your data is encrypted at its source with AES-256 algorithm, keeping your data safe from modern and future quantum threats. Given that the quantum space is under rapid development, along with additional scrutiny of these algorithms, Commvault Cloud has implemented a flexible framework that allows selection of other algorithms and key lengths, for both key exchange/encapsulation and signature generation/verification, providing a futureproof way to remain vigilant in this ever-changing space. </p>
<p>&nbsp;</p>
<h2><strong>The Road Ahead</strong></h2>
<p>&nbsp;</p>
<p>As with all security measures, PQC is yet another layer to implement on top of other security controls to keep you cyber resilient. We recommend using Security IQ to gain insights into your own security posture and implement controls to keep your data safe from quantum and other attack vectors. </p>
<p>&nbsp;</p>
<p>Similar to how trust is a continuous process, Commvault’s continual investment in cyber resilience and quantum protection will keep your data safe against ever-evolving threats. You can learn more about Security IQ here.  </p>
<p>&nbsp;</p>
<p><em>Lưu ý: Để duy trì hiệu quả của các biện pháp bảo mật, hãy xem xét và cập nhật thông tin định kỳ (ví dụ: 6 tháng/1 năm) để đảm bảo tính chính xác, đầy đủ và phù hợp theo thời gian, đặc biệt với các chủ đề thay đổi nhanh hoặc nội dung &#8220;evergreen&#8221;.</em></p>
<p>&nbsp;</p>
<h2><strong>Câu Hỏi Thường Gặp (FAQs) về Mật Mã Hậu Lượng Tử</strong></h2>
<p>&nbsp;</p>
<h3><strong>1. Mật mã hậu lượng tử (PQC) là gì?</strong></h3>
<p><strong>Mật mã hậu lượng tử</strong> là một lĩnh vực nghiên cứu trong mật mã học tập trung vào việc phát triển các thuật toán có khả năng chống lại các cuộc tấn công từ máy tính lượng tử hiện tại và tương lai. Mục tiêu là đảm bảo mã hóa an toàn trong kỷ nguyên lượng tử. </p>
<p>&nbsp;</p>
<h3><strong>2. Tại sao máy tính lượng tử lại là mối đe dọa đối với mật mã hiện tại?</strong></h3>
<p><strong>Máy tính lượng tử</strong> có khả năng phá vỡ các thuật toán mật mã khóa công khai phổ biến như RSA và ECC, vốn là nền tảng của <strong>mã hóa an toàn</strong> trên Internet hiện nay. Chúng có thể giải quyết các bài toán toán học phức tạp mà mật mã hiện tại dựa vào một cách nhanh chóng hơn nhiều. </p>
<p>&nbsp;</p>
<h3><strong>3. Các tiêu chuẩn PQC được phát triển như thế nào?</strong></h3>
<p>Các <strong>Tiêu chuẩn PQC</strong> được phát triển thông qua các quy trình toàn cầu, nổi bật là chương trình của NIST (Viện Tiêu chuẩn và Công nghệ Quốc gia Hoa Kỳ). NIST đã tổ chức các cuộc thi để lựa chọn các thuật toán hậu lượng tử mạnh mẽ nhất, sau đó sẽ ban hành các hướng dẫn tiêu chuẩn cho việc triển khai chúng nhằm đảm bảo <strong>bảo mật dữ liệu lượng tử</strong>. </p>
<p>&nbsp;</p>
<h3><strong>4. Mã hóa AES-256 có đủ mạnh để chống lại các cuộc tấn công lượng tử không?</strong></h3>
<p>Mã hóa <strong>Mã hóa AES-256</strong> được coi là tương đối an toàn trước các cuộc tấn công vét cạn lượng tử trong tương lai gần, chủ yếu nhờ vào kích thước khóa lớn. Tuy nhiên, nó vẫn cần được sử dụng trong một chiến lược bảo mật toàn diện bao gồm cả các giải pháp <strong>Mật mã hậu lượng tử</strong> cho các thành phần khác. </p>
<p>&nbsp;</p>
<h3><strong>5. Làm thế nào để doanh nghiệp chuẩn bị cho kỷ nguyên hậu lượng tử?</strong></h3>
<p>Để <strong>bảo vệ dữ liệu tương lai</strong>, các doanh nghiệp nên bắt đầu đánh giá các hệ thống mật mã hiện có, theo dõi sự phát triển của Tiêu chuẩn PQC và xem xét các giải pháp kết hợp như việc Commvault đã triển khai CRYSTALS-Kyber và Dilithium3. Việc này là một phần quan trọng của khả năng phục hồi không gian mạng dài hạn. </p>
<p>&nbsp;</p>
<p>Đừng để dữ liệu của bạn dễ bị tổn thương trước các mối đe dọa lượng tử trong tương lai. Tìm hiểu thêm về các giải pháp <strong>Mật mã hậu lượng tử</strong> của Commvault và cách chúng tôi giúp bạn xây dựng <strong>khả năng phục hồi không gian mạng</strong> vững chắc. <strong><br />
  <a href="https://dibiz.vn/contact/">Liên hệ với chúng tôi ngay hôm nay để được tư vấn và bảo vệ tương lai dữ liệu của bạn</a><br />
</strong>! </p>
<p><!-- notionvc: 03f8a348-b0e3-47e0-aeaf-cc53fec9c645 --></div>
<p><!-- .vgblk-rw-wrapper --></p>
<p>The post <a href="https://dibiz.vn/en/future-proofing-your-data-post-quantum-cryptography-and-beyond-bao-mat-du-lieu-luong-tu-mat-ma-hau-luong-tu-tuong-lai/">Future-Proofing Your Data: Post-Quantum Cryptography and Beyond Bảo Mật Dữ Liệu Lượng Tử: Mật Mã Hậu Lượng Tử &amp; Tương Lai</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Seminar on Cyber Resilience: Building a Proactive and Sustainable Defense Strategy</title>
		<link>https://dibiz.vn/en/seminar-on-cyber-resilience-building-a-proactive-and-sustainable-defense-strategy/</link>
		
		<dc:creator><![CDATA[tiếp thị]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 10:25:44 +0000</pubDate>
				<category><![CDATA[Commvault]]></category>
		<category><![CDATA[Events]]></category>
		<guid isPermaLink="false">https://dibiz.vn/seminar-on-cyber-resilience-building-a-proactive-and-sustainable-defense-strategy/</guid>

					<description><![CDATA[<p>In the face of cybersecurity threats that are growing in both scale and sophistication, establishing a proactive and sustainable defense strategy has become a paramount priority for all enterprises. Recognizing this critical need, the seminar &#8220;Best Practices &#38; Solution Architecture toward Cyber Resilience&#8221; was recently held successfully, bringing together leading experts from DIBIZ, UNITAS VIETNAM,...</p>
<p>The post <a href="https://dibiz.vn/en/seminar-on-cyber-resilience-building-a-proactive-and-sustainable-defense-strategy/">Seminar on Cyber Resilience: Building a Proactive and Sustainable Defense Strategy</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vgblk-rw-wrapper limit-wrapper"><strong>In the face of cybersecurity threats that are growing in both scale and sophistication, establishing a proactive and sustainable defense strategy has become a paramount priority for all enterprises. Recognizing this critical need, the seminar &#8220;Best Practices &amp; Solution Architecture toward Cyber Resilience&#8221; was recently held successfully, bringing together leading experts from DIBIZ, UNITAS VIETNAM, Commvault, VNPT SI, and VNPT Cyber. </strong></p>
<p>&nbsp;</p>
<p>The event served not only as a platform to share the latest technological trends but also as a forum for leaders and IT professionals to discuss and seek solutions to the complex challenges of data protection and recovery in the digital age.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996656" src="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-300x199.jpg" alt="" width="650" height="431" srcset="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-300x199.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-1024x678.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-768x509.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-1536x1017.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-2048x1356.jpg 2048w" sizes="(max-width: 650px) 100vw, 650px" /></p>
<p>&nbsp;</p>
<p>In the opening remarks, representatives from Commvault emphasized the critical importance of shifting the mindset from passive defense to building a robust, self-recovering system architecture. The seminar&#8217;s objective was not merely to introduce products, but to collaboratively shape a comprehensive, effective, and practical cybersecurity strategy tailored to the specific context of Vietnam. </p>
<p>&nbsp;</p>
<h2><strong>In-Depth Sessions: From Global Perspectives to Localized Solutions</strong></h2>
<p>&nbsp;</p>
<h3><strong>1. Commvault: Building a Solid Architecture for Cyber Resilience</strong></h3>
<p>&nbsp;</p>
<p>Kicking off the in-depth presentations, Mr. Chee Peng Mak, Senior Solutions Specialist from Commvault, introduced a progressive concept: &#8220;Uninterrupted Business Operations.&#8221; The core of this vision is to achieve &#8220;Minimum Viable Operations&#8221;—a critical milestone that defines the minimum set of systems, data, and processes that must be restored for a business to resume operations immediately after a disruption. </p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996658" src="https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-300x192.jpg" alt="" width="655" height="419" srcset="https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-300x192.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-1024x655.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-768x491.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-1536x982.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-2048x1310.jpg 2048w" sizes="(max-width: 655px) 100vw, 655px" /></p>
<p>&nbsp;</p>
<p>The session highlighted alarming statistics: 99% of ransomware attacks attempt to destroy backups, and the average time to recover from a cyber incident is 24 days. This underscores that &#8220;Cyber Recovery&#8221; is significantly more challenging than traditional &#8220;Disaster Recovery.&#8221; To address this, Commvault presented a comprehensive workflow, from threat remediation and infrastructure rebuilding to restoring access (Active Directory) and recovering data safely through advanced technologies like Cleanroom Recovery and Air Gap Protect. As a 14-time consecutive leader in the Gartner® Magic Quadrant<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, Commvault continues to affirm its outstanding capabilities in this field.   </p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996660" src="https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-300x169.png" alt="" width="650" height="366" srcset="https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-300x169.png 300w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-1024x576.png 1024w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-768x432.png 768w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-1536x864.png 1536w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-2048x1152.png 2048w" sizes="(max-width: 650px) 100vw, 650px" /></p>
<p>&nbsp;</p>
<h3><strong>2. VNPT SI and VNPT Cyber: The Integrated Strength of Vietnam&#8217;s Technology Ecosystem</strong></h3>
<p>&nbsp;</p>
<p>Following Commvault, Mr. Tran Manh Tuan, Product Director of Corporate Governance Services <span class="discussion-id-26ce8e41-5bae-8095-9dbc-001c41080ff1 notion-enable-hover" data-token-index="1">at</span> <!-- notionvc: e8b520a2-c94d-4672-bf74-0b63c31027e1 -->VNPT SI, offered a practical perspective on Vietnam&#8217;s digital transformation landscape and how VNPT supports businesses on this journey. His presentation analyzed two major challenges commonly faced by enterprises: </p>
<p>&nbsp;</p>
<ul>
<li>For Small and Medium-sized Enterprises (SMEs): They often start with standalone software, leading to fragmented applications, inconsistent data, and a lack of dedicated IT personnel.</li>
<li>For Large Enterprises/Corporations: While having invested in large-scale systems (ERP, CRM), they face challenges with data scattered across different &#8220;silos,&#8221; being trapped in legacy systems, and difficulties in consolidating management reports.</li>
</ul>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996662" src="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-300x199.jpg" alt="" width="650" height="431" srcset="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-300x199.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-1024x678.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-768x509.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-1536x1017.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-2048x1356.jpg 2048w" sizes="(max-width: 650px) 100vw, 650px" /></p>
<p>&nbsp;</p>
<p>VNPT demonstrated its leading position with a dominant market share in foundational services such as digital signatures (26.5%) and e-invoices (25%). Building on this strong foundation, VNPT provides comprehensive integrated solutions: an &#8220;All-in-one&#8221; platform for SMEs to unify all operations within a single workplace, and the implementation of data integration layers (Data Lake, AI/BI) for large enterprises to consolidate, standardize, and intelligently leverage their data. </p>
<p>&nbsp;</p>
<h3><strong>3. Ransomware in Practice – Techniques and Lessons Learned from VNPT Cyber Immunity</strong></h3>
<p>&nbsp;</p>
<p><span class="discussion-level-1 discussion-id-26ce8e41-5bae-8010-897a-001cd0b6c3f7 notion-enable-hover" data-token-index="0">To provide a hands-on, practical perspective, Mr. Nguyen Doanh Thinh, a Security Analyst from VNPT Cyber Immunity, delved into today&#8217;s most pressing topic: Ransomware. </span><!-- notionvc: cf11c51e-8e27-494a-a795-05efd0aaf131 --></p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996670" src="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-300x195.jpg" alt="" width="651" height="423" srcset="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-300x195.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-1024x666.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-768x499.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-1536x999.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-2048x1331.jpg 2048w" sizes="(max-width: 651px) 100vw, 651px" /></p>
<p>&nbsp;</p>
<p>A key highlight of the seminar was the discussion on how hackers infiltrate systems—from exploiting common web application vulnerabilities like Telerik, uploading a webshell, and privilege escalation, to deploying data-encrypting malware on a large scale. More importantly, the presentation summarized the core difficulties and limitations organizations often encounter during incident response. These include the lack of clear response procedures, authorization and legal issues, delays in detection and reaction, and especially, weaknesses in Backup and Disaster Recovery strategies. These are invaluable lessons for any organization.  </p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996664" src="https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-300x169.png" alt="" width="645" height="363" srcset="https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-300x169.png 300w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-1024x578.png 1024w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-768x433.png 768w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-1536x867.png 1536w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-2048x1156.png 2048w" sizes="(max-width: 645px) 100vw, 645px" /></p>
<p>&nbsp;</p>
<h2><strong>Lively Interaction and Valuable Connections</strong></h2>
<p>&nbsp;</p>
<p>The concluding Q&amp;A session was exceptionally lively, with a series of insightful questions from attendees. This multi-faceted exchange between experts and participants not only clarified technical concerns but also painted a clear picture of the awareness and urgent need for cybersecurity in Vietnam. This vibrant atmosphere continued during the networking sessions, where conversations went beyond simple introductions and became the starting point for initial collaborative ideas.  </p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996666" src="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-300x199.jpg" alt="" width="660" height="438" srcset="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-300x199.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-1024x678.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-768x509.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-1536x1017.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-2048x1356.jpg 2048w" sizes="(max-width: 660px) 100vw, 660px" /></p>
<p>&nbsp;</p>
<h2><strong>Conclusion</strong></h2>
<p>&nbsp;</p>
<p>The &#8220;Best Practices &amp; Solution Architecture toward Cyber Resilience&#8221; seminar concluded successfully, leaving attendees with valuable knowledge and profound insights. The event once again affirmed that in the relentless fight against cybercrime, thorough preparation, a solid system architecture, and close collaboration among technology partners are the keys to success. </p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996672" src="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-300x197.jpg" alt="" width="653" height="429" srcset="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-300x197.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-1024x672.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-768x504.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-1536x1008.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-2048x1343.jpg 2048w" sizes="(max-width: 653px) 100vw, 653px" /></p>
<p>&nbsp;</p>
<blockquote><p>To receive materials from the seminar or for a more in-depth consultation on the solutions offered by Commvault and VNPT, please contact: <strong><em>Ms. Ha</em> </strong>&#8211; Phone: 0326291803. Email: <a href="mailto:hatt@dibiz.vn">hatt@dibiz.vn</a> </p></blockquote>
<p>&nbsp;</p>
<p><!-- notionvc: 248196d4-b438-44bc-8b25-d4fffac98752 --></div>
<p><!-- .vgblk-rw-wrapper --></p>
<p>The post <a href="https://dibiz.vn/en/seminar-on-cyber-resilience-building-a-proactive-and-sustainable-defense-strategy/">Seminar on Cyber Resilience: Building a Proactive and Sustainable Defense Strategy</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Social Listening Analysis of A80 Event</title>
		<link>https://dibiz.vn/en/a-social-listening-analysis-of-a80-event/</link>
		
		<dc:creator><![CDATA[tiếp thị]]></dc:creator>
		<pubDate>Wed, 27 Aug 2025 09:15:29 +0000</pubDate>
				<category><![CDATA[Cyabra]]></category>
		<guid isPermaLink="false">https://dibiz.vn/a-social-listening-analysis-of-a80-event/</guid>

					<description><![CDATA[<p>When a National Event Becomes a Media Storm &#160; The A80 event—the 80th anniversary of the National Day—was not just a momentous historical occasion; it also created a massive media storm across the digital landscape. Millions of users collectively generated a diverse and multi-dimensional flow of information. &#160; For businesses and communications professionals, passive observation...</p>
<p>The post <a href="https://dibiz.vn/en/a-social-listening-analysis-of-a80-event/">A Social Listening Analysis of A80 Event</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vgblk-rw-wrapper limit-wrapper">
<h2><strong>When a National Event Becomes a Media Storm</strong></h2>
<p>&nbsp;</p>
<p>The A80 event—the 80th anniversary of the National Day—was not just a momentous historical occasion; it also created a massive media storm across the digital landscape. Millions of users collectively generated a diverse and multi-dimensional flow of information. </p>
<p>&nbsp;</p>
<p>For businesses and communications professionals, passive observation is not enough. Understanding how public sentiment is evolving, what people truly care about, and where opportunities lie for authentic connection is the key to building an effective strategy. This article will dissect the full media landscape of the A80 event based on hard data, providing valuable insights for your business.  </p>
<p>&nbsp;</p>
<h2><strong>The Immense Scale of the Conversation: Data That Speaks Volumes</strong></h2>
<p>&nbsp;</p>
<p>To grasp the event&#8217;s true impact, consider the numbers recorded in the period from August 1st to August 24th alone:</p>
<p>&nbsp;</p>
<ul>
<li>~9.4 million interactions across social media platforms.</li>
<li>Nearly 6,000 posts were created.</li>
<li>Facebook was the dominant platform, accounting for ~7.3 million interactions, proving it remains the primary channel for discussion among Vietnamese users.</li>
</ul>
<p>&nbsp;</p>
<p>These figures represent a colossal amount of data. Manual analysis is impossible, demanding powerful social listening tools to capture and decode the conversation. </p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-996620 aligncenter" src="https://dibiz.vn/wp-content/uploads/2025/08/A80-768-x-456-px-1-300x178.png" alt="" width="722" height="428" srcset="https://dibiz.vn/wp-content/uploads/2025/08/A80-768-x-456-px-1-300x178.png 300w, https://dibiz.vn/wp-content/uploads/2025/08/A80-768-x-456-px-1.png 768w" sizes="(max-width: 722px) 100vw, 722px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2><strong>Dissecting Key Discussion Themes: What Does the Public Truly Care About?</strong></h2>
<p>&nbsp;</p>
<p>Within this media storm, the conversations were not chaotic. They converged around several distinct thematic currents, revealing the public&#8217;s core interests:</p>
<p>&nbsp;</p>
<h3><strong>1. The Dominant Emotional Current: Excitement and National Pride</strong></h3>
<p>&nbsp;</p>
<p><span class="ng-star-inserted">Within the storm of 9.4 million interactions, the data shows that public sentiment moved and converged around clear thematic currents. Accounting for over a third of all discussions, the emotional flow of national pride and excitement   </span><span class="ng-star-inserted">was the &#8220;heart&#8221; of the entire conversation.</span><span class="ng-star-inserted"> This went beyond simple congratulations to encompass a complex mix of emotions: admiration for the armed forces, pride in the nation&#8217;s history, and eager anticipation for the grand event. This current confirms that historical events still possess immense power to unite communities.  </span></p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996638" src="https://dibiz.vn/wp-content/uploads/2025/08/A80-768-x-456-px-2-300x178.png" alt="" width="654" height="388" srcset="https://dibiz.vn/wp-content/uploads/2025/08/A80-768-x-456-px-2-300x178.png 300w, https://dibiz.vn/wp-content/uploads/2025/08/A80-768-x-456-px-2.png 768w" sizes="(max-width: 654px) 100vw, 654px" /></p>
<p>&nbsp;</p>
<h3><strong>2. The Practical Information Current: Logistics and Public Experience</strong></h3>
<p>&nbsp;</p>
<p><span class="ng-star-inserted">Alongside the powerful emotional wave was a significant demand for practical information. Representing about 20% of discussions,  </span><span class="ng-star-inserted">themes related to logistics and public experience formed the &#8220;brain&#8221; of the conversation.</span><span class="ng-star-inserted"> The public showed a clear need for information like &#8220;parade schedules,&#8221; &#8220;road closures,&#8221; and &#8220;tips for attendees,&#8221; revealing an &#8220;information gap&#8221; that official channels had not fully filled, leading users to seek advice from the community. </span></p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-996622 aligncenter" src="https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.56.46-pm-300x227.png" alt="" width="686" height="519" srcset="https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.56.46-pm-300x227.png 300w, https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.56.46-pm-1024x776.png 1024w, https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.56.46-pm-768x582.png 768w, https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.56.46-pm.png 1298w" sizes="(max-width: 686px) 100vw, 686px" /></p>
<p>&nbsp;</p>
<h2><strong>3. The Human Interest Current: The Appeal of New Faces and International Forces</strong></h2>
<p>&nbsp;</p>
<p><span class="ng-star-inserted">A particularly noteworthy segment, accounting for 25% of the discussion,</span><span class="ng-star-inserted">stemmed from the appeal of human interest elements and novelty.</span><span class="ng-star-inserted">. On one hand, emerging figures like soldiers Lê Hoàng Hiệp and Anton Mikhailov (Russia) became &#8220;media phenomena&#8221; as the public grew curious about their personal stories. On the other hand, the participation of international delegations, especially the Russian parade contingent, created a unique media highlight that elevated the event&#8217;s stature in the public&#8217;s eyes. </span></p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class=" wp-image-996635 aligncenter" src="https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.58.15-pm-1-300x250.png" alt="" width="595" height="496" srcset="https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.58.15-pm-1-300x250.png 300w, https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.58.15-pm-1-1024x852.png 1024w, https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.58.15-pm-1-768x639.png 768w, https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.58.15-pm-1.png 1332w" sizes="(max-width: 595px) 100vw, 595px" /></p>
<p>&nbsp;</p>
<h3><strong>4. Other Themes</strong></h3>
<p>&nbsp;</p>
<p><span class="ng-star-inserted">The conversational landscape was completed by smaller but significant topics.  </span><span class="ng-star-inserted">Interest in military weapons and hardware</span><span class="ng-star-inserted"> (~7%) demonstrated a niche audience fascinated by the nation&#8217;s military strength.  </span><span class="ng-star-inserted">Side events</span><span class="ng-star-inserted"> like the V Concert and V Fest (~12%) also garnered attention, positioning A80 as a true &#8220;festival season.&#8221; Importantly, although accounting for only ~1%,  </span><span class="ng-star-inserted">negative discussions</span><span class="ng-star-inserted"> about undesirable behaviors still surfaced, serving as a reminder of potential communications risks that require monitoring.</span></p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-996626 aligncenter" src="https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.59.03-pm-300x229.png" alt="" width="692" height="528" srcset="https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.59.03-pm-300x229.png 300w, https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.59.03-pm-768x587.png 768w, https://dibiz.vn/wp-content/uploads/2025/08/Screenshot-2025-08-27-at-3.59.03-pm.png 832w" sizes="(max-width: 692px) 100vw, 692px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2><strong>Sentiment Analysis: Positivity is the Prevailing Current</strong></h2>
<p>&nbsp;</p>
<p>A deeper analysis of over 3,800 users engaged in the discussion reveals a clearly positive picture. Emotions like &#8220;Pride,&#8221; &#8220;Admiration,&#8221; and &#8220;Excitement&#8221; were predominant, reflecting a strong sense of unity and national spirit. </p>
<p>&nbsp;</p>
<p>However, the report also identified a small fraction (~1%) of negative discussions related to inappropriate behavior or grievances. Though small, this data is crucial for organizations and brands to identify potential risks early. </p>
<p>&nbsp;</p>
<h2><strong>Insights for Businesses: Finding Opportunity in the Media Storm</strong></h2>
<p>&nbsp;</p>
<p>From this analysis, marketing and brand managers can derive several strategic lessons:</p>
<p>&nbsp;</p>
<ol>
<li>Understand Emotion to Connect Authentically: Communication campaigns can leverage the current of &#8220;national pride&#8221; in a subtle and sincere way to resonate with customers.</li>
<li>Provide Practical Value: Instead of generic posts, brands (especially in retail, F&amp;B, or transportation) can create useful content related to logistics (e.g., alternative routes, special offers for attendees).</li>
<li>Identify Golden Hours for Engagement: Data shows that discussions often peaked between 7 AM and 9 AM. Capitalizing on this timing can significantly increase a post&#8217;s reach and impact. </li>
<li>Listen Proactively to Identify Risks: Monitoring negative discussions, no matter how small, is critical to protecting brand reputation and having a crisis management plan in place.</li>
</ol>
<p>&nbsp;</p>
<h2><strong>Conclusion</strong></h2>
<p>&nbsp;</p>
<p>The media landscape of the A80 event is more than just a story of national pride; it is a prime case study on the power of public sentiment in the digital age.</p>
<p>&nbsp;</p>
<p>By applying social listening tools and in-depth data analysis, businesses can transform the &#8220;storm&#8221; of information into a source of valuable insights, enabling them to build effective, resonant communication strategies and robustly protect their brand reputation.</p>
<p>&nbsp;</p>
<p><strong>To learn more about how <a href="https://dibiz.vn/">DIBIZ</a> and <a href="https://cyabra.vn/">Cyabra</a> can help you analyze public sentiment and protect your brand, please contact us.</strong></p>
<p><!-- notionvc: 7b84b61c-0486-481a-ba0b-012933ede3b0 --></div>
<p><!-- .vgblk-rw-wrapper --></p>
<p>The post <a href="https://dibiz.vn/en/a-social-listening-analysis-of-a80-event/">A Social Listening Analysis of A80 Event</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>53% of Accounts Discussing VNeID Are Fake, Aiming to Steal Information</title>
		<link>https://dibiz.vn/en/53-of-accounts-discussing-vneid-are-fake-aiming-to-steal-information/</link>
		
		<dc:creator><![CDATA[tiếp thị]]></dc:creator>
		<pubDate>Wed, 09 Jul 2025 04:55:58 +0000</pubDate>
				<category><![CDATA[Cyabra]]></category>
		<guid isPermaLink="false">https://dibiz.vn/53-of-accounts-discussing-vneid-are-fake-aiming-to-steal-information/</guid>

					<description><![CDATA[<p>OVERVIEW   Recent discussions surrounding VNeID, Vietnam’s electronic identification app, on social media have revealed a troubling mix of legitimate updates and misleading content. Notably, many posts include suspicious links with headlines like “view your updated hometown information” following recent administrative mergers—posing phishing and data leakage risks to users. Coordinated Spread of Fake Content  ...</p>
<p>The post <a href="https://dibiz.vn/en/53-of-accounts-discussing-vneid-are-fake-aiming-to-steal-information/">53% of Accounts Discussing VNeID Are Fake, Aiming to Steal Information</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="996553" class="elementor elementor-996553 elementor-996551" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-4a31143d e-flex e-con-boxed e-con e-parent" data-id="4a31143d" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-346c2d07 elementor-widget elementor-widget-text-editor" data-id="346c2d07" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
			<style>/*! elementor - v3.23.0 - 05-08-2024 */
.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}</style>				<h2 data-start="264" data-end="666"><strong>OVERVIEW</strong></h2><div><strong><br></strong></div>
<p></p>
<p data-start="264" data-end="666">Recent discussions surrounding VNeID, Vietnam’s electronic identification app, on social media have revealed a troubling mix of legitimate updates and misleading content. Notably, many posts include suspicious links with headlines like “view your updated hometown information” following recent administrative mergers—posing phishing and data leakage risks to users.</p><p data-start="264" data-end="666"><br></p>
<h2 data-start="673" data-end="728"><strong data-start="677" data-end="728">Coordinated Spread of Fake Content</strong></h2><div><strong data-start="677" data-end="728"><br></strong></div>
<p></p>
<p data-start="730" data-end="1063">A large number of fake accounts are actively urging users to “update VNeID now to see your new address and hometown,” attaching suspicious links that may lead to phishing attacks. Alarmingly, these posts often contain nearly identical wording and appear simultaneously across multiple accounts, indicating a high level of coordination.</p><p data-start="730" data-end="1063"><br></p>
<p data-start="1065" data-end="1342">Other accounts spread misleading claims such as “VNeID is overloaded due to too many people checking their new localities,” paired with dangerous links. These tactics are designed to exploit public curiosity and confusion over administrative changes.</p><p data-start="1065" data-end="1342"><br></p>
<p data-start="1344" data-end="1571">There are also posts disguised as helpful security warnings—such as “be careful sharing your new hometown on VNeID, it may lead to data exposure”—which are, in fact, part of a social engineering tactic to earn user trust and prompt link clicks.</p><p data-start="1344" data-end="1571"><br></p>
<p data-start="1573" data-end="1878">In addition, several posts falsely claim issues like “driver’s licenses disappearing after the app update,” with many accounts sharing nearly identical language: <em data-start="1742" data-end="1878">“After updating VNeID, did anyone lose their license? I asked some friends, and most of them had this problem.”</em></p><p data-start="1573" data-end="1878"><em data-start="1742" data-end="1878"><br></em></p>
<h2><strong>Fake Accounts Are &#8220;Staging a Show&#8221; on Social Media</strong></h2><div><strong><br></strong></div>
<p></p>
<p>These fake accounts aren’t just randomly active—they are operating in coordination. They post similar or identical content in different formats, often using the same phrases and including malicious links. The goal is clear: exploit public anxiety and curiosity around VNeID changes to spread misinformation and lure victims.</p><p><br></p>
<p></p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong> Below are real examples of fake posts identified and analyzed by Cyabra between July 6, 2024, and July 6, 2025:</strong></p>
<p><img loading="lazy" decoding="async" class="wp-image-996540 size-large aligncenter" src="https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-791x1024.png" alt="discussion-about-VNeID" width="791" height="1024" srcset="https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-791x1024.png 791w, https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-232x300.png 232w, https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-768x994.png 768w, https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-1187x1536.png 1187w, https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh.png 1545w" sizes="(max-width: 791px) 100vw, 791px" /> <img loading="lazy" decoding="async" class="wp-image-996538 size-large aligncenter" src="https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-1-791x1024.png" alt="tai-khoan-gia-mao-tren-mang-xa-hoi" width="791" height="1024" srcset="https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-1-791x1024.png 791w, https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-1-232x300.png 232w, https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-1-768x994.png 768w, https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-1-1187x1536.png 1187w, https://dibiz.vn/wp-content/uploads/2025/07/Tieng-Anh-1.png 1545w" sizes="(max-width: 791px) 100vw, 791px" /></p>
<p></p>
<p><br></p><p>Common misleading narratives include:</p><p><br></p>
<ul>
<li>VNeID servers crashing due to high user traffic.</li>
<li>VNeID updates causing loss of driver’s licenses.</li>
<li>Fake links claiming to let users “see their updated hometown.”</li>
<li>Fake security warnings that appear trustworthy but are designed to deceive.</li>
</ul><div><br></div>
<p data-start="1573" data-end="1878"></p>
<h2 data-start="1885" data-end="1950"><strong data-start="1889" data-end="1950">Medium-Level Risk, But Requires High Vigilance</strong></h2><div><strong data-start="1889" data-end="1950"><br></strong></div>
<p></p>
<p data-start="1952" data-end="2193">According to Cyabra’s data, out of 331 accounts involved in the discussion, <strong data-start="2031" data-end="2077">176 (or 53%) were identified as fake</strong>, and <strong data-start="2083" data-end="2111">328 interactions came from bots</strong> — indicating a well-orchestrated disinformation campaign.</p><p data-start="1952" data-end="2193"><br></p>
<p data-start="2195" data-end="2622">Suspicious posts such as “VNeID update” and “system overload” are being actively amplified by high-engagement fake accounts. While the overall risk level is currently assessed <strong data-start="2342" data-end="2360">as medium</strong>, the scale and sophistication of this operation make it a <strong data-start="2424" data-end="2440">serious concern</strong>. Continuous and close monitoring is essential—both by authorities and the online community—to prevent phishing attacks targeting Vietnamese citizens.</p>
<p data-start="2195" data-end="2622"><img loading="lazy" decoding="async" class="alignnone wp-image-996548 size-full" src="https://dibiz.vn/wp-content/uploads/2025/07/Screenshot-2025-07-08-112807-1.png" alt="so-lieu-cyabra-ve-tai-khoan-gia-mao" width="1082" height="539" srcset="https://dibiz.vn/wp-content/uploads/2025/07/Screenshot-2025-07-08-112807-1.png 1082w, https://dibiz.vn/wp-content/uploads/2025/07/Screenshot-2025-07-08-112807-1-300x149.png 300w, https://dibiz.vn/wp-content/uploads/2025/07/Screenshot-2025-07-08-112807-1-1024x510.png 1024w, https://dibiz.vn/wp-content/uploads/2025/07/Screenshot-2025-07-08-112807-1-768x383.png 768w" sizes="(max-width: 1082px) 100vw, 1082px" /></p>
<p data-start="2195" data-end="2622">Contact <a href="https://cyabra.vn/"><strong>Cyabra Vietnam</strong></a> for brand protection solutions against social media threats.</p>
<p data-start="2195" data-end="2622"><a href="https://cyabra.vn/tai-sao-doanh-nghiep-can-cong-cu-bao-ve-thuong-hieu-truc-tuyen/"><strong>Explore more: Why Your Business Needs Online Protection Tools</strong></a></p>						</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://dibiz.vn/en/53-of-accounts-discussing-vneid-are-fake-aiming-to-steal-information/">53% of Accounts Discussing VNeID Are Fake, Aiming to Steal Information</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI in Journalism: Risks and Rewards</title>
		<link>https://dibiz.vn/en/ai-in-journalism-risks-and-rewards/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 26 Jun 2025 01:55:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://dibiz.vn/?p=995955</guid>

					<description><![CDATA[<p>At the National Press Forum 2025, an event marking the 100th anniversary of Vietnamese Revolutionary Journalism Day, the topic of AI and journalism became a focal point of discussion, drawing significant attention from leaders and experts. The dialogue centered on two urgent issues: the implications of AI for information security and the strategic digital transformation...</p>
<p>The post <a href="https://dibiz.vn/en/ai-in-journalism-risks-and-rewards/">AI in Journalism: Risks and Rewards</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>At the National Press Forum 2025, an event marking the 100th anniversary of Vietnamese Revolutionary Journalism Day, the topic of AI and journalism became a focal point of discussion, drawing significant attention from leaders and experts. The dialogue centered on two urgent issues: the implications of AI for information security and the strategic digital transformation for Vietnamese newsrooms.</p>
<p>&nbsp;</p>
<p>Artificial intelligence is no longer a distant concept but a &#8220;double-edged sword.&#8221; While this technology offers immense potential to revolutionize content production and distribution processes, it also poses serious challenges related to disinformation, brand reputation, and the core value of truth.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-995310 alignnone" src="https://dibiz.vn/wp-content/uploads/2025/06/phien-4-300x198.png" alt="Các diễn giả tại phiên thảo luận &quot;Trí tuệ nhân tạo và Chiến lược chuyển đổi số của các toà soạn báo chí Việt Nam&quot;" width="687" height="454" srcset="https://dibiz.vn/wp-content/uploads/2025/06/phien-4-300x198.png 300w, https://dibiz.vn/wp-content/uploads/2025/06/phien-4-768x506.png 768w, https://dibiz.vn/wp-content/uploads/2025/06/phien-4.png 941w" sizes="(max-width: 687px) 100vw, 687px" /></p>
<p>&nbsp;</p>
<h2><strong>AI and Journalism: Confronting the Challenge of Disinformation and the &#8220;Dead Internet&#8221;</strong></h2>
<p>&nbsp;</p>
<p>The severity of disinformation is underscored by Gartner, which listed &#8220;Disinformation Security&#8221; as one of the top 10 strategic technology trends for 2025. The fight against fake news has evolved from a technical task into a strategic security pillar.</p>
<p>&nbsp;</p>
<h3><strong>The Threat of Disinformation and the &#8220;Dead Internet Theory&#8221;</strong></h3>
<p>&nbsp;</p>
<p>The &#8220;<a href="https://www.vice.com/en/article/dead-internet-theory-is-back-thanks-to-all-of-that-ai-slop/">Dead Internet Theory</a>&#8221; paints an alarming picture: an internet dominated by content generated by AI and bots. It is predicted that by 2026, 90% of online content will be automated. This could push users into a chaotic sea of real and fake information, eroding trust in the digital space.</p>
<p>&nbsp;</p>
<p>As AI and journalism intersect, distinguishing between these two concepts is crucial:</p>
<p>&nbsp;</p>
<ul>
<li>Misinformation: False information spread without malicious intent.</li>
<li>Disinformation: Deliberately false information created to manipulate and cause harm to politics, aconomy, and society. This is the direct threat newsrooms must confront.</li>
</ul>
<p>&nbsp;</p>
<p>In Vietnam, sophisticated campaigns involving brand impersonation and fraudulent appeals are on the rise, not only causing economic damage but also threatening the guiding role of mainstream journalism.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-995350 alignnone" src="https://dibiz.vn/wp-content/uploads/2025/06/ong-dinh-toan-thang-300x185.png" alt="" width="686" height="423" srcset="https://dibiz.vn/wp-content/uploads/2025/06/ong-dinh-toan-thang-300x185.png 300w, https://dibiz.vn/wp-content/uploads/2025/06/ong-dinh-toan-thang-768x474.png 768w, https://dibiz.vn/wp-content/uploads/2025/06/ong-dinh-toan-thang.png 829w" sizes="(max-width: 686px) 100vw, 686px" /></p>
<p>&nbsp;</p>
<h3><strong>Technological Solutions Against Disinformation</strong></h3>
<p>&nbsp;</p>
<p>To counter this, technological solutions like <a href="https://dibiz.vn/cyabra-la-gi/">Cyabra</a> are proving highly effective. This tool helps to:</p>
<p>&nbsp;</p>
<ul>
<li>Distinguish between real accounts and bots.</li>
<li>Trace the origins of disinformation campaigns.</li>
<li>Detect AI-manipulated content.</li>
</ul>
<p>&nbsp;</p>
<p>Cyabra&#8217;s success in various countries demonstrates that equipping newsrooms with protective technology is no longer an option, but a necessity.</p>
<p>&nbsp;</p>
<h2><strong>Content Security and Copyright: A Survival Challenge in the Era of AI and Journalism</strong></h2>
<p>&nbsp;</p>
<p>Alongside the fight against disinformation is the challenge of content security and copyright protection. According to MUSO, copyright piracy caused over $28 billion in global losses in 2022 alone. Generative AI further complicates this issue.</p>
<p>&nbsp;</p>
<p>However, a worrying trend is the decline in investment for content security, often due to difficulties in measuring ROI and conflicts of interest. To address this, newsrooms must shift their mindset: viewing investment in content protection not as a cost, but as a long-term value-creation strategy. Technologies like AI-Powered Watermarking and Multi-DRM are essential tools for protecting a newsroom&#8217;s digital assets.</p>
<p>&nbsp;</p>
<h2><strong>The VAICP Framework: A Practical Digital Transformation Roadmap for Vietnamese Journalism</strong></h2>
<p>&nbsp;</p>
<p>To effectively integrate AI and journalism, newsrooms need a clear roadmap. The VAICP framework, proposed by expert Dao Trung Thanh, is considered a highly practical model for the Vietnamese context.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-995457 alignnone" src="https://dibiz.vn/wp-content/uploads/2025/06/khung-vaicp-300x169.png" alt="" width="687" height="387" srcset="https://dibiz.vn/wp-content/uploads/2025/06/khung-vaicp-300x169.png 300w, https://dibiz.vn/wp-content/uploads/2025/06/khung-vaicp-768x432.png 768w, https://dibiz.vn/wp-content/uploads/2025/06/khung-vaicp.png 941w" sizes="(max-width: 687px) 100vw, 687px" /></p>
<p>&nbsp;</p>
<p>The VAICP framework is built on five core pillars:</p>
<p>&nbsp;</p>
<ul>
<li><strong>V</strong>ision &amp; Strategy</li>
<li><strong>A</strong>ssets (People, Culture)</li>
<li><strong>I</strong>mplementation &amp; Governance</li>
<li><strong>C</strong>ore Technology &amp; Security</li>
<li><strong>P</strong>rocess (Production, Moderation)</li>
</ul>
<p>&nbsp;</p>
<p>Evaluating themselves against the VAICP framework allows newsrooms to identify their current standing and build an effective action plan. Organizations can use the VSTAR platform (at <a href="http://vstar.ai.vn">vstar.ai.vn</a>) to assess their AI readiness.</p>
<p>&nbsp;</p>
<h2><strong>From Idea to Action: Organizing the AI Strategy Implementation</strong></h2>
<p>&nbsp;</p>
<p>After establishing a roadmap, professional implementation is key to success. Proven methods like the AI-VIO model (defining roles) and the CRAFT loop (for continuous improvement) help ensure effective coordination and bring the AI and journalism strategy to life.</p>
<p>&nbsp;</p>
<h2><strong>Conclusion and Recommendations for the Future of AI and Journalism</strong></h2>
<p>&nbsp;</p>
<p>The AI era presents both an existential challenge and a historic opportunity for Vietnamese journalism. To survive and thrive, newsrooms must take decisive action.</p>
<p>&nbsp;</p>
<p>Recommended Actions:</p>
<p>&nbsp;</p>
<ol>
<li>Prioritize Technology: Proactively invest in advanced solutions for information and content security.</li>
<li>Shift Investment Mindset: View security and copyright as value-creating assets, not expenses.</li>
<li>Adopt Standardized Models: Implement assessment frameworks like VAICP to build a structured roadmap and foster continuous innovation.</li>
</ol>
<p>&nbsp;</p>
<p>The race in the era of AI and journalism is a marathon, not a sprint. The newsrooms with a smart strategy, a sound roadmap, and the capacity for innovation will successfully uphold their role as a beacon of truth in a volatile digital world.</p>
<p><!-- notionvc: 5596b60d-7aab-4362-88d7-04446df0d784 --></p>
<p>The post <a href="https://dibiz.vn/en/ai-in-journalism-risks-and-rewards/">AI in Journalism: Risks and Rewards</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Disinformation Doesn’t Care About Your Size: Protecting Brand Reputation for SMBs</title>
		<link>https://dibiz.vn/en/disinformation-doesnt-care-about-your-size-protecting-brand-reputation-for-smbs/</link>
		
		<dc:creator><![CDATA[tiếp thị]]></dc:creator>
		<pubDate>Thu, 19 Jun 2025 18:13:28 +0000</pubDate>
				<category><![CDATA[Cyabra]]></category>
		<guid isPermaLink="false">https://dibiz.vn/?p=993514</guid>

					<description><![CDATA[<p>Is your small or medium business (SMB) too small to be a target for disinformation? It’s a common thought, but a dangerous one. The reality is, online attacks can hit businesses of any size, aiming to wreck reputations and erode trust. This guide offers practical tips to fight back without needing big-budget resources. Disinformation attacks...</p>
<p>The post <a href="https://dibiz.vn/en/disinformation-doesnt-care-about-your-size-protecting-brand-reputation-for-smbs/">Disinformation Doesn’t Care About Your Size: Protecting Brand Reputation for SMBs</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Is your small or medium business (SMB) too small to be a target for disinformation? It’s a common thought, but a dangerous one. The reality is, online attacks can hit businesses of any size, aiming to wreck reputations and erode trust. This guide offers practical tips to fight back without needing big-budget resources.</p>
<ul>
<li>Disinformation attacks have become more popular in recent years, assisted by the rise of AI tools, making the creation of coordinated fake campaigns and bot networks accessible to virtually anyone.</li>
<li>While enterprise companies have the budget and human resource to deal with those new threats to brand reputation, small and medium sized businesses are more vulnerable.</li>
<li>Implementing cost-effective monitoring strategies, crisis response playbooks, and employee education can significantly reduce vulnerability without enterprise-level resources</li>
</ul>
<h2 class="wp-block-heading">The Silent Threat That Destroys Brands Overnight</h2>
<p>Imagine arriving at work to find your company trending on social media – but not for the reasons you’d hope. A deepfake video of your CEO making inflammatory statements or false claims about your products is spreading like wildfire. Customer complaints are flooding in, employees are confused, and the local news is calling for comment. For small and medium-sized businesses, this nightmare scenario is becoming increasingly common, and the consequences can be devastating.</p>
<p>The threat landscape has changed dramatically in recent years. A recent GlobalNewsWire publication showed that 49% of Businesses have been hit by deepfake fraud. But while large enterprises can weather the storm with dedicated crisis management teams and resources, SMBs often find themselves fighting an uphill battle with limited ammunition.</p>
<h2 class="wp-block-heading"><span id="the-growing-disinformation-threat-to-smbs" class="ez-toc-section"></span>The Growing Disinformation Threat to SMBs</h2>
<p>The democratization of disinformation tools has created a perfect storm for bad actors targeting smaller organizations. Today, <a href="https://cyabra.com/blog/manipulated-narratives-navigating-the-reputational-maze-of-mis-disinformation/">just $10</a> can purchase 50,000 fake views, 20,000 fake likes, and 500 fake comments, making disinformation campaigns accessible to virtually anyone with an internet connection and a grudge.</p>
<p>Even more concerning is the preparedness gap: while 94% of SMB leaders believe they understand cybersecurity threats, only 11% deploy AI-driven defenses to counter sophisticated disinformation campaigns (Security Magazine). This disparity between perceived and actual readiness creates a vulnerability that disinformation actors are eager to exploit.</p>
<p>According to <a href="https://www.gartner.com/en/articles/disinformation-security" rel="noreferrer noopener">Gartner</a>, adoption of disinformation security measures is projected to grow from under 5% in 2024 to 50% by 2028. But for many SMBs, that protection may come too late if they don’t take action now.</p>
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" class="wp-image-16595" src="https://cyabra.com/wp-content/uploads/2025/06/image-1024x577.png" sizes="(max-width: 1024px) 100vw, 1024px" srcset="https://cyabra.com/wp-content/uploads/2025/06/image-1024x577.png 1024w, https://cyabra.com/wp-content/uploads/2025/06/image-300x169.png 300w, https://cyabra.com/wp-content/uploads/2025/06/image-768x433.png 768w, https://cyabra.com/wp-content/uploads/2025/06/image.png 1360w" alt="" width="1024" height="577" /><figcaption class="wp-element-caption"><a href="https://www.gartner.com/en/articles/disinformation-security">Gartner research</a>: the growing threat of dis/misinformation</figcaption></figure>
<h2 class="wp-block-heading"><span id="why-your-size-makes-you-vulnerable" class="ez-toc-section"></span>Why Your Size Makes You Vulnerable</h2>
<p>SMBs face unique challenges when it comes to disinformation threats, largely stemming from their size and resource constraints:</p>
<ul class="wp-block-list">
<li><strong>Resource constraints create blind spots</strong>. While large corporations can dedicate specialized personnel to monitor and respond to reputation threats, SMB communications teams often juggle multiple responsibilities, making early detection difficult.</li>
<li><strong>Less established online presence creates vulnerability</strong>. When your digital footprint isn’t as robust as larger competitors, false narratives can more easily dominate search results and social media mentions.</li>
<li><strong>Limited visibility means limited defense</strong>. Without dedicated monitoring teams and adequate monitoring tools, disinformation campaigns can gain significant traction before you’re even aware of them.</li>
<li><strong>Disproportionate impact on trust and revenue</strong>. For SMBs, even short-term reputation damage can have long-lasting effects on customer trust and financial stability.</li>
</ul>
<p>The consequences of those attacks can be <a href="https://cyabra.com/blog/rage-farming-reputation-risk-what-brands-organizations-must-know/">severe and measurable</a>. Companies affected by disinformation experience heightened negativity in social media activity and diminished growth compared to unaffected peers (<a href="https://arxiv.org/abs/2401.02191">ArXiv</a>). This impact is often amplified for smaller businesses where reputation and word-of-mouth are critical growth drivers.</p>
<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" class="wp-image-16602" src="https://cyabra.com/wp-content/uploads/2025/06/image-3.png" sizes="auto, (max-width: 564px) 100vw, 564px" srcset="https://cyabra.com/wp-content/uploads/2025/06/image-3.png 564w, https://cyabra.com/wp-content/uploads/2025/06/image-3-300x259.png 300w" alt="" width="564" height="487" /><figcaption class="wp-element-caption"><em>In the picture: the Bud Light crisis – the backlash was first promoted by authentic profiles, but was then picked up by fake accounts attacking the brand.</em></figcaption></figure>
<h2 class="wp-block-heading"><span id="building-your-defense-without-breaking-the-bank" class="ez-toc-section"></span>Building Your Defense Without Breaking the Bank</h2>
<p>Effective disinformation defense doesn’t always require enterprise-level resources. Here are practical strategies SMB communications teams can implement immediately:</p>
<h3 class="wp-block-heading">1. Implement Accessible Monitoring Approaches</h3>
<ul class="wp-block-list">
<li>Set up social listening tools and Google Alerts to track mentions of your brand, your key executives, and your products</li>
<li>Track and analyze unusual spikes in engagement or sentiment shifts</li>
<li>Develop clear indicators that differentiate between organic criticism and <a href="https://cyabra.com/blog/how-to-spot-fake-social-media-profile/">coordinated attacks</a></li>
</ul>
<h3 class="wp-block-heading">2. Develop a Response Playbook That Accounts for Disinformation</h3>
<ul class="wp-block-list">
<li>Create templated responses for common crisis scenarios, including ones where fake profiles dominate the conversation</li>
<li>Establish clear roles and responsibilities within your team for crisis management</li>
<li>Build relationships with third-party services that can help authenticate content</li>
</ul>
<h3 class="wp-block-heading">3. Own Your Search Results and Social Media Presence</h3>
<ul class="wp-block-list">
<li>Maintain an active digital presence with regular, authentic content</li>
<li>Secure profiles on all relevant platforms, even if you don’t actively use them</li>
<li>Create a resource center on your website addressing common misconceptions</li>
</ul>
<h2 class="wp-block-heading"></h2>
<p>It’s important to remember: dealing with disinformation isn’t just the responsibility of your social media team. Especially for SMBs, it takes a village to defend against those evolving online threats. Here’s how every part of your organization fits into the fight:</p>
<ul class="wp-block-list">
<li><strong>Employee Education</strong>: Teach your team to identify the warning signs of disinformation campaigns, such as fake news, hashtag hijacking, manipulated and misleading content, and deepfakes. Set up protocols for reporting suspicious activity. Run simulation exercises to test response protocols, evaluate effectiveness, and adjust strategies.</li>
<li><strong>Collaborate Across Departments</strong>: Partner with IT to implement basic monitoring solutions. Work with customer service to establish early warning protocols and explain when to escalate and when to avoid responding. Engage leadership to understand the business impact of online reputation threats, and supply them with regular reports on the state of your online brand and any rising issues or threats.</li>
</ul>
<h2 class="wp-block-heading"><span id="leveraging-specialized-tools-within-your-budget" class="ez-toc-section"></span>Leveraging Specialized Tools Within Your Budget</h2>
<p>The rise of smarter AI tools has given bad actors new weapons – but it’s also opened up new defenses. While monitoring tools were once reserved for large enterprises, today’s more affordable AI detection solutions are accessible to smaller organizations too.</p>
<p>Cyabra’s AI helps you spot fake profiles and coordinated campaigns targeting your brand, delivering early warnings before potential reputation threats gain traction. <a href="https://cyabra.com/solutions/pr-marketing/">Cyabra is available</a> in flexible delivery options to match the size of your team and company – whether you need full platform access or 24/7 alerts that let you sleep easy and deliver only the essentials, perfect for your two-minute morning email routine.</p>
<p>While SMBs face unique challenges in the fight against disinformation, their size can also be an advantage. Smaller organizations often have more agile decision-making processes, enabling faster response when threats emerge, and tend to have more involved teams. By implementing the strategies outlined above, communications and social media teams can transform their vulnerability into vigilance – creating a protective shield against disinformation that preserves trust, reputation, and ultimately, business success.</p>
<p>The threat of disinformation isn’t going away. In fact, as Cyabra’s research shows, it’s <a href="https://cyabra.com/blog/brand-disinformation-when-bots-attack/">becoming more sophisticated</a> and accessible every day. But with the right approach, even the most resource-constrained communications team can develop effective countermeasures to detect, respond to, and mitigate these evolving threats.</p>
<p>The post <a href="https://dibiz.vn/en/disinformation-doesnt-care-about-your-size-protecting-brand-reputation-for-smbs/">Disinformation Doesn’t Care About Your Size: Protecting Brand Reputation for SMBs</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Introducing Similarweb AI Agents: Turning Digital Data into Strategic Action</title>
		<link>https://dibiz.vn/en/introducing-similarweb-ai-agents-turning-digital-data-into-strategic-action-2/</link>
		
		<dc:creator><![CDATA[tiếp thị]]></dc:creator>
		<pubDate>Thu, 19 Jun 2025 18:07:24 +0000</pubDate>
				<category><![CDATA[Similarweb]]></category>
		<guid isPermaLink="false">https://dibiz.vn/introducing-similarweb-ai-agents-turning-digital-data-into-strategic-action-2/</guid>

					<description><![CDATA[<p>Over the past year, we’ve all felt and witnessed the seismic shift in the way digital businesses operate. Generative AI went from experiment to expectation, from buzzword to boardroom mandate. While this is only the beginning, one truth becomes clear: AI is only as good as the data that powers it. At Similarweb, we’ve always...</p>
<p>The post <a href="https://dibiz.vn/en/introducing-similarweb-ai-agents-turning-digital-data-into-strategic-action-2/">Introducing Similarweb AI Agents: Turning Digital Data into Strategic Action</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Over the past year, we’ve all felt and witnessed the seismic shift in the way digital businesses operate. Generative AI went from experiment to expectation, from buzzword to boardroom mandate. While this is only the beginning, one truth becomes clear: AI is only as good as the data that powers it.</p>
<p>At Similarweb, we’ve always believed that digital data has the power to unlock transformational insights. For years, our platform has helped the world’s leading brands monitor competitors, track trends, and make smarter decisions. But the next frontier isn’t just about seeing the data.</p>
<p>It’s about acting on it.</p>
<p>Today, we’re taking the next step in that journey.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/uoMlTlHQCZw?si=JlO_YvAIMiSSHKGs" width="100%" height="400" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<p>I’m pleased to share the official launch of <a href="https://www.similarweb.com/corp/ai/agents/" data-key="1">Similarweb AI Agents</a> – a new suite of specialized assistants that help our customers move faster from insight to action. Powered by our proprietary dataset and embedded across our platform, these agents are designed to accelerate high-impact workflows in SEO, digital strategy, and go-to-market execution.</p>
<h2>Introducing the First Similarweb AI Agents</h2>
<p>The first generation of Similarweb AI Agents has been built to address mission-critical use cases for marketing, sales, and research teams:</p>
<p>Think of them as a digital workforce purpose-built to accelerate how businesses turn insight into action.</p>
<p>These aren’t generic assistants. They’re AI teammates, trained on the most comprehensive digital data in the world. Over 100 million websites. 5 billion keywords. Over 20 million companies. Real traffic, real search behavior, real competitive movement, refreshed constantly.</p>
<p>Each agent is designed for a business-critical task and trained to think like the experts you wish you could clone.</p>
<h3>AI Trend Analyzer</h3>
<p>The <a href="https://www.similarweb.com/corp/ai/agents/trend-analyzer/" data-key="2">AI Trend Analyzer</a> helps you make sense of what’s trending, and more importantly, why.<br />
Powered by Similarweb’s fresh, granular search behavior data, the agent explains what’s driving demand, where it’s happening, and what to do next. With this agent, marketing, research, and insights teams can identify trends, understand the reason behind spikes in demand, identify and track seasonality, and connect the dots with real-world events and news that impact demand.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/KDehQ5Lof5U?si=N2ALL1eSvX8xw5mW" width="100%" height="400" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<h3>AI SEO Strategy Agent</h3>
<p>The <a href="https://www.similarweb.com/corp/ai/agents/seo-strategist/" data-key="3">AI SEO Strategy Agent</a> is your partner in developing comprehensive, winning SEO strategies at the topic level. Powered by Similarweb’s unparalleled real-user search data, this agent analyzes the competitive landscape in real time to uncover high-impact SEO opportunities and deliver a strategic content roadmap.</p>
<p>In other words, it doesn’t just give you a report, it presents you with an action plan. That plan can be downloaded, shared with your team, or used directly in-platform to execute your strategy faster. Meanwhile, the AI SEO Strategy Agent eliminates hours of manual work, fits seamlessly into SEO workflows, and is continually updated with the latest trends and competitor moves.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/F1TRrEHBpWI?si=2JbYZ9yvyQzRWB6k" width="100%" height="400" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<h3>AI Meeting Prep Agent</h3>
<p>The <a href="https://www.similarweb.com/corp/ai/agents/meeting-prep/" data-key="4">AI Meeting Prep Agent</a> equips your sales team with customized meeting briefs in seconds. These briefs integrate Similarweb’s digital intelligence with live CRM insights, website crawlers, and real-time web signals to deliver actionable context and strategy. Whether prospecting, pitching, or preparing for renewals, your team walks into every meeting fully prepared to win.</p>
<p>It’s not just a research doc, it’s a personalized sales playbook.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/iac7eN6Zk-M?si=E0C09tkmfYS0lOyC" width="100%" height="400" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<h3>AI Outreach Agent</h3>
<p>Lets sales and business development teams automate and optimize outreach to win deals and upsell customers using a level of relevance and timeliness that’s unmatched by any other tool. Released in May 2024 as SAM (the Sales AI Module), the updated <a href="https://www.similarweb.com/corp/ai/agents/sales-outreach/" data-key="5">AI Outreach Agent</a> crafts data-driven sales messages a representative can customize and send by email and other channels, such as LinkedIn messaging.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/2nQ6Xjd1MGU?si=BJhG2nCH5kr7WyWt" width="100%" height="400" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<h2 id="toc_H2_1">Why Similarweb AI Agents Are Uniquely Positioned to Drive Impact</h2>
<p>Amidst a crowded market of generalized chatbots and loosely defined “AI assistants,” Similarweb AI Agents stand apart:</p>
<ul>
<li aria-level="1"><b>Trained on world-class data</b>: Similarweb’s dataset includes monthly, daily, and hourly tracking of over 100 million websites, 4 million apps, 5 billion search keywords, and comprehensive data on companies and ecommerce marketplaces.</li>
<li aria-level="1"><b>Data-first, not guesswork</b>: Our agents deliver recommendations grounded in the depth and breadth of <a href="https://www.similarweb.com/corp/ourdata/" data-key="6">Similarweb Digital Data</a>, not scraped fragments or unverified content.</li>
<li aria-level="1"><b>Built for real-world use cases</b>: The agents are designed to align with the workflows of SEO professionals, sales leaders, and SEO strategists to drive measurable business outcomes.</li>
<li aria-level="1"><b>Smart by design</b>: They analyze traffic patterns, search engine results pages, <a href="https://www.similarweb.com/blog/research/business-benchmarking/competitive-benchmarking/" data-key="7">competitive benchmarks</a>, customer profiles, and provide practical guidance on SEO, sales strategies, and content execution.</li>
<li aria-level="1"><b>Actionable immediately</b>: Similarweb AI Agents provide structured, downloadable action plans ready for immediate use, eliminating the need for prompt engineering or technical expertise.</li>
</ul>
<h2 id="toc_H2_2">The Future of AI-Powered Digital Intelligence</h2>
<p>The common thread across all Similarweb AI Agents is simple: <b>Data is most valuable when transformed into action</b>. While a robust data platform and a comprehensive API remain essential, having a virtual teammate who interprets that data and translates it into practical steps is game-changing.</p>
<p>Today’s launch is just the beginning. Additional agents under development for release in the coming months include <a href="https://www.similarweb.com/corp/shopper/" data-key="8">Shopper Intelligence</a>, <a href="https://www.similarweb.com/corp/stocks/" data-key="9">Stock Intelligence</a>, <a href="https://www.similarweb.com/corp/web/" data-key="10">Web Intelligence</a> (competitive intelligence, share of voice, advertising insights), and <a href="https://www.similarweb.com/corp/sales/" data-key="11">Sales Intelligence</a> (lead generation).</p>
<p>We will continue to offer multiple ways for our customers to access our industry-leading data. But with the introduction of AI Agents, we are redefining how businesses unlock value from digital data.</p>
<p>This marks a significant leap forward in capability and the beginning of a bold new chapter for Similarweb and our customers.</p>
<p>The post <a href="https://dibiz.vn/en/introducing-similarweb-ai-agents-turning-digital-data-into-strategic-action-2/">Introducing Similarweb AI Agents: Turning Digital Data into Strategic Action</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Introducing Similarweb AI Agents: Turning Digital Data into Strategic Action</title>
		<link>https://dibiz.vn/en/introducing-similarweb-ai-agents-turning-digital-data-into-strategic-action/</link>
		
		<dc:creator><![CDATA[tiếp thị]]></dc:creator>
		<pubDate>Thu, 19 Jun 2025 18:07:24 +0000</pubDate>
				<category><![CDATA[Similarweb]]></category>
		<guid isPermaLink="false">https://dibiz.vn/?p=993499</guid>

					<description><![CDATA[<p>Over the past year, we’ve all felt and witnessed the seismic shift in the way digital businesses operate. Generative AI went from experiment to expectation, from buzzword to boardroom mandate. While this is only the beginning, one truth becomes clear: AI is only as good as the data that powers it. At Similarweb, we’ve always...</p>
<p>The post <a href="https://dibiz.vn/en/introducing-similarweb-ai-agents-turning-digital-data-into-strategic-action/">Introducing Similarweb AI Agents: Turning Digital Data into Strategic Action</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Over the past year, we’ve all felt and witnessed the seismic shift in the way digital businesses operate. Generative AI went from experiment to expectation, from buzzword to boardroom mandate. While this is only the beginning, one truth becomes clear: AI is only as good as the data that powers it.</p>
<p>At Similarweb, we’ve always believed that digital data has the power to unlock transformational insights. For years, our platform has helped the world’s leading brands monitor competitors, track trends, and make smarter decisions. But the next frontier isn’t just about seeing the data.</p>
<p>It’s about acting on it.</p>
<p>Today, we’re taking the next step in that journey.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/uoMlTlHQCZw?si=JlO_YvAIMiSSHKGs" width="100%" height="400" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<p>I’m pleased to share the official launch of <a href="https://www.similarweb.com/corp/ai/agents/" data-key="1">Similarweb AI Agents</a> – a new suite of specialized assistants that help our customers move faster from insight to action. Powered by our proprietary dataset and embedded across our platform, these agents are designed to accelerate high-impact workflows in SEO, digital strategy, and go-to-market execution.</p>
<h2>Introducing the First Similarweb AI Agents</h2>
<p>The first generation of Similarweb AI Agents has been built to address mission-critical use cases for marketing, sales, and research teams:</p>
<p>Think of them as a digital workforce purpose-built to accelerate how businesses turn insight into action.</p>
<p>These aren’t generic assistants. They’re AI teammates, trained on the most comprehensive digital data in the world. Over 100 million websites. 5 billion keywords. Over 20 million companies. Real traffic, real search behavior, real competitive movement, refreshed constantly.</p>
<p>Each agent is designed for a business-critical task and trained to think like the experts you wish you could clone.</p>
<h3>AI Trend Analyzer</h3>
<p>The <a href="https://www.similarweb.com/corp/ai/agents/trend-analyzer/" data-key="2">AI Trend Analyzer</a> helps you make sense of what’s trending, and more importantly, why.<br />
Powered by Similarweb’s fresh, granular search behavior data, the agent explains what’s driving demand, where it’s happening, and what to do next. With this agent, marketing, research, and insights teams can identify trends, understand the reason behind spikes in demand, identify and track seasonality, and connect the dots with real-world events and news that impact demand.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/KDehQ5Lof5U?si=N2ALL1eSvX8xw5mW" width="100%" height="400" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<h3>AI SEO Strategy Agent</h3>
<p>The <a href="https://www.similarweb.com/corp/ai/agents/seo-strategist/" data-key="3">AI SEO Strategy Agent</a> is your partner in developing comprehensive, winning SEO strategies at the topic level. Powered by Similarweb’s unparalleled real-user search data, this agent analyzes the competitive landscape in real time to uncover high-impact SEO opportunities and deliver a strategic content roadmap.</p>
<p>In other words, it doesn’t just give you a report, it presents you with an action plan. That plan can be downloaded, shared with your team, or used directly in-platform to execute your strategy faster. Meanwhile, the AI SEO Strategy Agent eliminates hours of manual work, fits seamlessly into SEO workflows, and is continually updated with the latest trends and competitor moves.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/F1TRrEHBpWI?si=2JbYZ9yvyQzRWB6k" width="100%" height="400" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<h3>AI Meeting Prep Agent</h3>
<p>The <a href="https://www.similarweb.com/corp/ai/agents/meeting-prep/" data-key="4">AI Meeting Prep Agent</a> equips your sales team with customized meeting briefs in seconds. These briefs integrate Similarweb’s digital intelligence with live CRM insights, website crawlers, and real-time web signals to deliver actionable context and strategy. Whether prospecting, pitching, or preparing for renewals, your team walks into every meeting fully prepared to win.</p>
<p>It’s not just a research doc, it’s a personalized sales playbook.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/iac7eN6Zk-M?si=E0C09tkmfYS0lOyC" width="100%" height="400" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<h3>AI Outreach Agent</h3>
<p>Lets sales and business development teams automate and optimize outreach to win deals and upsell customers using a level of relevance and timeliness that’s unmatched by any other tool. Released in May 2024 as SAM (the Sales AI Module), the updated <a href="https://www.similarweb.com/corp/ai/agents/sales-outreach/" data-key="5">AI Outreach Agent</a> crafts data-driven sales messages a representative can customize and send by email and other channels, such as LinkedIn messaging.</p>
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/2nQ6Xjd1MGU?si=BJhG2nCH5kr7WyWt" width="100%" height="400" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<h2 id="toc_H2_1">Why Similarweb AI Agents Are Uniquely Positioned to Drive Impact</h2>
<p>Amidst a crowded market of generalized chatbots and loosely defined “AI assistants,” Similarweb AI Agents stand apart:</p>
<ul>
<li aria-level="1"><b>Trained on world-class data</b>: Similarweb’s dataset includes monthly, daily, and hourly tracking of over 100 million websites, 4 million apps, 5 billion search keywords, and comprehensive data on companies and ecommerce marketplaces.</li>
<li aria-level="1"><b>Data-first, not guesswork</b>: Our agents deliver recommendations grounded in the depth and breadth of <a href="https://www.similarweb.com/corp/ourdata/" data-key="6">Similarweb Digital Data</a>, not scraped fragments or unverified content.</li>
<li aria-level="1"><b>Built for real-world use cases</b>: The agents are designed to align with the workflows of SEO professionals, sales leaders, and SEO strategists to drive measurable business outcomes.</li>
<li aria-level="1"><b>Smart by design</b>: They analyze traffic patterns, search engine results pages, <a href="https://www.similarweb.com/blog/research/business-benchmarking/competitive-benchmarking/" data-key="7">competitive benchmarks</a>, customer profiles, and provide practical guidance on SEO, sales strategies, and content execution.</li>
<li aria-level="1"><b>Actionable immediately</b>: Similarweb AI Agents provide structured, downloadable action plans ready for immediate use, eliminating the need for prompt engineering or technical expertise.</li>
</ul>
<h2 id="toc_H2_2">The Future of AI-Powered Digital Intelligence</h2>
<p>The common thread across all Similarweb AI Agents is simple: <b>Data is most valuable when transformed into action</b>. While a robust data platform and a comprehensive API remain essential, having a virtual teammate who interprets that data and translates it into practical steps is game-changing.</p>
<p>Today’s launch is just the beginning. Additional agents under development for release in the coming months include <a href="https://www.similarweb.com/corp/shopper/" data-key="8">Shopper Intelligence</a>, <a href="https://www.similarweb.com/corp/stocks/" data-key="9">Stock Intelligence</a>, <a href="https://www.similarweb.com/corp/web/" data-key="10">Web Intelligence</a> (competitive intelligence, share of voice, advertising insights), and <a href="https://www.similarweb.com/corp/sales/" data-key="11">Sales Intelligence</a> (lead generation).</p>
<p>We will continue to offer multiple ways for our customers to access our industry-leading data. But with the introduction of AI Agents, we are redefining how businesses unlock value from digital data.</p>
<p>This marks a significant leap forward in capability and the beginning of a bold new chapter for Similarweb and our customers.</p>
<p>The post <a href="https://dibiz.vn/en/introducing-similarweb-ai-agents-turning-digital-data-into-strategic-action/">Introducing Similarweb AI Agents: Turning Digital Data into Strategic Action</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Improve enterprise MTTR, visibility, and control</title>
		<link>https://dibiz.vn/en/improve-enterprise-mttr-visibility-and-control/</link>
		
		<dc:creator><![CDATA[Hiền Nguyễn Đức]]></dc:creator>
		<pubDate>Wed, 09 Oct 2024 09:06:08 +0000</pubDate>
				<guid isPermaLink="false">https://dbiz.vn/?p=990029</guid>

					<description><![CDATA[<p>Enterprise hybrid IT environments are complex beasts, plagued by blind spots, siloed data, and slow incident resolution. Enterprise organizations need a comprehensive solution that provides hybrid observability within a single pane of glass to reduce MTTR/MTTI, eliminate those blind spots, correlate insights across their entire IT infrastructure, and achieve more granular control. LogicMonitor goes beyond...</p>
<p>The post <a href="https://dibiz.vn/en/improve-enterprise-mttr-visibility-and-control/">Improve enterprise MTTR, visibility, and control</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Enterprise hybrid IT environments are complex beasts, plagued by blind spots, siloed data, and slow incident resolution. Enterprise organizations need a comprehensive solution that provides hybrid observability within a single pane of glass to reduce MTTR/MTTI, eliminate those blind spots, correlate insights across their entire IT infrastructure, and achieve more granular control.</p>
<p>LogicMonitor goes beyond basic monitoring to deliver exactly that. LogicMonitor’s LM Envision platform delivers AI-powered insights that help IT teams accelerate troubleshooting, improve efficiency, and take a more proactive approach to monitoring.</p>
<p>Our latest innovations further extend this vision:</p>
<ul class="wp-block-list">
<li><strong>Log Analysis</strong>: Empower your team with AI-guided insights for faster incident resolution.</li>
<li><strong><a href="https://www.logicmonitor.com/blog/snmp-traps">SNMP Traps</a> as Logs</strong>: Extend hybrid visibility into legacy network technology to streamline troubleshooting.</li>
<li><strong>Role-based access control (RBAC) for Modules, Security Settings, and Recommendations</strong>: Enhance control and reduce administrative burden.</li>
</ul>
<p>With LM Envision, you’re not just reacting to problems; you’re preventing them.</p>
<h2 id="h-log-analysis-ai-powered-troubleshooting-for-level-1-support" class="wp-block-heading">Log Analysis: AI-powered troubleshooting for Level 1 support</h2>
<p>Log data is a goldmine of insights, but without AI it is nearly impossible to mine all that data and find the insightful gold nuggets. Our new Log Analysis feature harnesses the power of natural language processing (NLP) and other machine learning (ML) techniques to create meaning from the vast troves of unstructured data that can be ingested into <a href="https://www.logicmonitor.com/logs">LM Logs</a>, and expedite troubleshooting across the entire IT stack by surfacing and sorting problematic logs in a simple visual interface.</p>
<p>Log Analysis automatically sorts through thousands of logs and leverages AI to plot error codes, negative phrases, or keywords and extract numeric values from text. In the past, engineers had to manually create queries in a search bar with advanced parsing or regex capabilities.  Log Analysis automates this previously manual and time-consuming process for users of all skill levels.</p>
<figure class="wp-block-image"><img decoding="async" src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeoOG__O76BrFEQ7wX-W608Bti-YxcsK6-70iIz4r51z1NuL9OJDNlGph59m3J_Gy44r5JM71IGsXGyOU9P02AV1arZtejX_aM52R-r6mtivn2IV1-7MRZZcOcV3wmV_ryMWXgXXXeVUqdn564WawIuhBBH?key=ZjhWWw2OVDr_2fab2ecPTw" alt="" /></figure>
<p>Log Analysis uses visual diagrams to quickly surface problematic logs.</p>
<p>Within Log Analysis, logs are now grouped into intuitive visual diagrams based on Sentiment, Level, Keyword, Exception, Class, and Resource. The Sentiment diagram allows you to view logs weighted by severity level on a scale of 1 to 5 (with 5 being the most critical) to help you prioritize and troubleshoot faster. The Keyword diagram groups logs by negative phrases like “error,” “failed,” or “critical” in a single view to help customers quickly identify issues and facilitate faster root cause analysis (RCA).</p>
<p>The intuitive visual interface allows for easy customization of specific log phrases and associated severity, so you can incorporate your own policies, dimensions, or user-defined keywords to tailor the groupings and sentiment scores for your specific environment.</p>
<p>Navigate seamlessly to Log Analysis from the Logs, Alerts, or <a href="https://www.logicmonitor.com/support/resource-explorer">Resource Explorer</a> pages within LM Envision, and effortlessly exclude a term, drill down for details, and view log summaries with timestamps and frequency—all just a few clicks away. Log Analysis also works hand-in-hand with <a href="https://www.logicmonitor.com/support/log-anomaly-detection">Log Anomaly Detection</a>. Once an alert triggers, simply launch a Log Analysis session – without leaving the alert info screen or writing a complex log query – to pinpoint the problematic logs and identify the negative keywords and errors that contributed to the alert. Log Analysis will then apply machine learning and layered intelligence to scan the logs associated with the alert and serve up the most problematic logs in a simple visual diagram.</p>
<h3 id="h-key-benefits-nbsp" class="wp-block-heading">Key benefits:</h3>
<ul class="wp-block-list">
<li><strong>Empower Level 1 support:</strong> Enable less experienced team members to quickly identify and resolve issues with AI-guided troubleshooting, democratizing log insights.</li>
<li><strong>Accelerate root cause analysis:</strong> Pinpoint the source of problems faster with automatic log categorization, severity scoring, and the extraction of numeric values from text.</li>
<li><strong>Reduce Mean Time to Repair (MTTR):</strong> Get systems back up and running faster with actionable insights at your fingertips, presented in visual diagrams and summaries.</li>
<li><strong>Optimize efficiency:</strong> Free up your senior engineers for more strategic work by automating routine log analysis, improving Enterprise efficiency, and lowering administrative costs.</li>
</ul>
<p>To learn more about Log Analysis, watch a quick demo video.</p>
<div id="wistia-responsive-embed-block_29d1e10faa69538de42267f4e97437c0" class="wistia-responsive-embed">
<div class="container wistia-responsive-embed__wrap">
<div class="row wistia-responsive-embed__card">
<div class="col-12">
<div class="wistia-responsive-embed__embed">
<div class="wistia_responsive_padding">
<div class="wistia_responsive_wrapper">
<div class="wistia_video_foam_dummy" data-source-container-id="wistia-v00h5f7bcu-1"></div>
<div id="wistia-v00h5f7bcu-1" class="wistia_embed wistia_async_v00h5f7bcu seo=true videoFoam=true wistia_embed_initialized">
<div id="wistia_chrome_37" class="w-chrome notranslate" tabindex="-1">
<div id="wistia_grid_102_wrapper">
<div id="wistia_grid_102_above"></div>
<div id="wistia_grid_102_main">
<div id="wistia_grid_102_behind"></div>
<div id="wistia_grid_102_center">
<div class="w-video-wrapper w-css-reset"></div>
<div class="w-ui-container">
<div id="w-vulcan-v2-101" class="w-vulcan-v2 w-css-reset">
<div class="w-vulcan--background w-css-reset">
<div class="w-css-reset" data-handle="statusBar"></div>
<div class="w-css-reset" data-handle="backgroundFocus"></div>
<div class="w-css-reset" data-handle="thumbnail">
<div>
<div class="w-css-reset"><img decoding="async" class="w-css-reset" src="https://fast.wistia.com/embed/medias/v00h5f7bcu/swatch" srcset="" alt="Video Thumbnail" aria-hidden="true" /></div>
<div class="w-css-reset"><img decoding="async" class="w-css-reset" src="https://embed-ssl.wistia.com/deliveries/d678644302c3b33786e661e0bd6b32b7b2868b86.webp?image_crop_resized=960x467" srcset="https://embed-ssl.wistia.com/deliveries/d678644302c3b33786e661e0bd6b32b7b2868b86.webp?image_crop_resized=640x311 320w, https://embed-ssl.wistia.com/deliveries/d678644302c3b33786e661e0bd6b32b7b2868b86.webp?image_crop_resized=640x311 640w, https://embed-ssl.wistia.com/deliveries/d678644302c3b33786e661e0bd6b32b7b2868b86.webp?image_crop_resized=960x467 960w, https://embed-ssl.wistia.com/deliveries/d678644302c3b33786e661e0bd6b32b7b2868b86.webp?image_crop_resized=1280x622 1280w, https://embed-ssl.wistia.com/deliveries/d678644302c3b33786e661e0bd6b32b7b2868b86.webp?image_crop_resized=1280x622 1920w, https://embed-ssl.wistia.com/deliveries/d678644302c3b33786e661e0bd6b32b7b2868b86.webp?image_crop_resized=1280x622 3840w" alt="Video Thumbnail" /></div>
</div>
</div>
</div>
<div class="w-vulcan--aria-live w-css-reset" aria-live="polite" aria-atomic="true"></div>
<div class="w-vulcan-overlays-table w-css-reset">
<div class="w-vulcan-overlays--left w-css-reset">
<div class="w-css-reset"></div>
</div>
<div class="w-vulcan-overlays--center w-css-reset">
<div class="w-css-reset">
<div class="w-css-reset" data-handle="bigPlayButton">
<div class="w-bpb-wrapper w-css-reset w-css-reset-tree">
<div></div>
<div></div>
</div>
</div>
<div class="w-css-reset" data-handle="clickForSoundButton"></div>
<div class="w-css-reset" data-handle="playPauseNotifier"></div>
<div class="w-css-reset" data-handle="captions"></div>
<div class="w-css-reset" data-handle="playPauseLoading">
<div class="w-css-reset w-css-reset-tree"></div>
</div>
<div class="w-css-reset" data-handle="transcript">
<div class="w-css-reset"></div>
</div>
</div>
</div>
<div class="w-vulcan-overlays--right w-css-reset">
<div class="w-css-reset"></div>
</div>
</div>
<div class="w-bottom-bar w-css-reset">
<div class="w-bottom-bar-lower w-css-reset">
<div>
<div></div>
</div>
<div class="w-bottom-bar-left w-css-reset">
<div class="w-bottom-bar-left-inner w-css-reset">
<div class="w-css-reset" data-handle="smallPlayButton">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="smallPlayButton_icon_wrapper">
<div>
<div>
<div></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="w-bottom-bar-middle w-css-reset">
<div class="w-bottom-bar-middle-inner w-css-reset">
<div class="w-css-reset" data-handle="playbar">
<div class="w-playbar-wrapper w-css-reset w-css-reset-tree">
<div class="w-playbar__time">5:07</div>
<div>
<div tabindex="0" role="slider" aria-label="Playbar" aria-orientation="horizontal" aria-valuemax="307.015" aria-valuemin="0" aria-valuenow="0" aria-valuetext="0 seconds">
<p>&nbsp;</p>
<div></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="w-bottom-bar-right w-css-reset">
<div class="w-bottom-bar-right-inner-anchor w-css-reset">
<div class="w-bottom-bar-right-inner w-css-reset">
<div class="w-css-reset" data-handle="captionsButton">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="captionsButton_icon_wrapper"></div>
</div>
</div>
<div class="w-css-reset" data-handle="volumeButton">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="volumeButton_icon_wrapper"></div>
</div>
</div>
<div class="w-css-reset" data-handle="settingsButton">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="settingsButton_icon_wrapper"></div>
</div>
</div>
<div class="w-css-reset" data-handle="fullscreenControl">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="fullscreenControl_icon_wrapper"></div>
</div>
</div>
</div>
</div>
<div class="w-wistia-logo w-css-reset">
<div class="w-css-reset" data-handle="wistiaLogo">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="wistiaLogo_icon_wrapper"></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="w-foreground w-css-reset">
<div class="w-css-reset" data-handle="contextMenu"></div>
<div class="w-css-reset" data-handle="loadingHourglass"></div>
<div class="w-css-reset" data-handle="focusOutline"></div>
</div>
</div>
</div>
</div>
<div id="wistia_grid_102_top_inside">
<div id="wistia_grid_102_top"></div>
</div>
<div id="wistia_grid_102_bottom_inside">
<div id="wistia_grid_102_bottom"></div>
</div>
<div id="wistia_grid_102_left_inside">
<div id="wistia_grid_102_left"></div>
</div>
<div id="wistia_grid_102_right_inside">
<div id="wistia_grid_102_right"></div>
</div>
</div>
<div id="wistia_grid_102_below"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p><em>Please note that users must toggle on the latest UI to take advantage of this feature. </em></p>
<h3 id="h-putting-our-own-features-to-the-test-nbsp" class="wp-block-heading">Putting our own features to the test</h3>
<p>At LogicMonitor, we leverage our own products to monitor our infrastructure, applications, and services. So it comes as no surprise that LogicMonitor engineers have been using Log Analysis as part of LogicMonitor’s <a href="https://www.logicmonitor.com/resource/logicmonitor-on-logicmonitor">use and test</a> approach, which allows us to stress test new releases with internal and external early adopters. Internal users have amazing things to say about this new feature. Nick Johnson, Senior Software Engineer, is “loving the tool so far” and has “been using it extensively for Cloud Recommendations.” He is especially excited about the negative phrases panel, which he says “has been huge in seeing where we’re over-logging, double-logging, and finding commonalities.” William Shipman, Site Reliability Engineer, stated that “the ability to extract numeric values from logs is one of the coolest things I’ve seen yet. I really like the negative phrase analysis, but the ability to plot counts over time and extract numeric values from text is game-changing.”</p>
<figure class="wp-block-image"><img decoding="async" src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfIDxf9un1_Kz__DFJ8rWoSNHv-dMKzi0_PwtPLZuYmabB7hmeYtWuJE_8_wKQZ40BnQzM-keNXoUGMs2ABcBdRTyWJZO6oI4-BkbGPNaTCI0YaCGhxhQ7-AvaqMYvgwa1__-_nxSHxtQFzptJem8fDS4ul?key=ZjhWWw2OVDr_2fab2ecPTw" alt="" /></figure>
<h2 id="h-snmp-traps-as-logs-unlocking-comprehensive-network-monitoring" class="wp-block-heading">SNMP Traps as Logs: Unlocking comprehensive Network Monitoring</h2>
<p>We knew the 90s were making a comeback from fashion to TV with “That 90’s Show” – but SNMP traps? They never went away. That’s because SNMP traps are still an essential part of Network Monitoring, and <a href="https://www.gartner.com/en/documents/5043431">the market for network devices</a> continues to grow. Traps measure network performance and health while providing timely information about important events across the vast network devices that keep your organization running.</p>
<p>In the past, NetOps managers and administrators have viewed SNMP monitoring as a necessary evil, requiring specialized (and often outdated) on-premises software that generates more alerts than the engineers could act upon.  LogicMonitor has brought SNMP traps into the modern age by transforming them into Logs. This eliminates monitoring gaps and unlocks instant insights into Network issues in a user-friendly interface. Now, you can easily integrate traps into your overall Network Monitoring strategy in a single SaaS platform to immediately identify and troubleshoot network latency, hardware health, packet loss, or interface flapping issues.</p>
<figure class="wp-block-image"><img decoding="async" src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfg6n7OVczNh9amI-87l2ZNA7NLyJPxS1XZJ9aLzSXgH53O-sJtWNg4ZgXEKEWjKDlbnUXmA9cyiA6Sm2AWC6djqhISGjyTBSZ1nr83tjgB3AsB18yEY0w26FpElZAFmyW3qoVPggUQYnR6zbxg_DaArUyL?key=ZjhWWw2OVDr_2fab2ecPTw" alt="" /></figure>
<p>Search traps, create queries, identify anomalies, and more with SNMP Traps as Logs.</p>
<p>SNMP Traps as Logs are easily ingested via the LM Collector with no configuration required. With LogicMonitor’s flexible retention policies, there’s no need to maintain storage hardware for traps.</p>
<h3 id="h-key-benefits" class="wp-block-heading">Key benefits:</h3>
<ul class="wp-block-list">
<li><strong>Centralized monitoring to reduce tool sprawl and data silos:</strong> Replace your old Enterprise trap management system and centralize your network monitoring approach in LogicMonitor. View SNMP traps alongside logs, metrics, and traces in real time, all in a single platform.</li>
<li><strong>Rich context for fast, proactive troubleshooting:</strong> Leverage logging features like Log Anomaly Detection, Log Analysis, queries, filters, data retention, and more for quicker incident resolution. Search historical traps and identify trends to remediate, predict, or prevent future issues. <a href="https://www.logicmonitor.com/edwin-ai">Edwin AI</a>, LogicMonitor’s new generative AI product, can ingest logs and correlate related issues into a single ITSM ticket with a simple summary and recommendations that fast-track RCA.</li>
<li><strong>Reduced alert fatigue:</strong> With stateful alarm clearing, SNMP Traps as Logs will automatically close alerts when a related “clear” trap comes in, eliminating noisy alerts while retaining a record of duplicate alerts.</li>
<li><strong>3,000+ seamless integrations: </strong>LogicMonitor’s LM Envision platform integrates seamlessly with SNMP Traps (v1, v2, and v3), standard encryption methods, your existing Network Devices, and incident resolution workflows through ServiceNow, Jira, PagerDuty, Slack, and more. For more information, check out our <a href="http://logicmonitor.com/integrations">Integrations</a> page.</li>
<li><strong>Parse and map OIDs and VarBinds:</strong> LogicMonitor pulls in critical information from SNMP Trap OIDs and variable bind values and translates them into user-readable values out of the box. LM Envision supports vendor-proprietary log formats as well as Syslog, providing a holistic log solution for Network Operations and Engineering teams.</li>
<li><strong>Custom MIB support: </strong>Users can upload their own proprietary or custom MIB files within the LM Envision platform, extending translation and visibility into any other product that sends SNMP Traps.</li>
</ul>
<figure class="wp-block-image"><img decoding="async" src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdJGnkFEIsZaIgr33JTYCUPDTs0OSCt9PNLJwltyGfe1ytPCjtgVKikqgArETFmbRZ1rD5tfIuZGch7PrxV4GUMGwGXxJcLHnTlBXooKQq2tE_ROYbPrcNKcwjhmFypTpps_wHJLFwvjMjjV4aBJPdNWQo?key=ZjhWWw2OVDr_2fab2ecPTw" alt="" /></figure>
<p>SNMP Traps as Logs leverages powerful log features like Anomaly Detection to quickly troubleshoot network issues.</p>
<p>SNMP Trap monitoring is a must-have for enterprises. Treating Traps will unlock much more value for our customers through existing log features. Simply send the traps through the LM Envision—no configuration needed—and let LogicMonitor do the heavy lifting for you to surface actionable insights and important alerts like equipment vendor certification changes, notification failures, or repeated login failures.</p>
<p>Watch our short demo video or visit the <a href="https://www.logicmonitor.com/support/snmp-trap-logsource-configuration">documentation</a> site for more information about SNMP Traps as Logs.</p>
<div id="video" class="wistia-responsive-embed">
<div class="container wistia-responsive-embed__wrap">
<div class="row wistia-responsive-embed__card">
<div class="col-12">
<div class="wistia-responsive-embed__embed">
<div class="wistia_responsive_padding">
<div class="wistia_responsive_wrapper">
<div class="wistia_video_foam_dummy" data-source-container-id="wistia-p2685pi4fd-1"></div>
<div id="wistia-p2685pi4fd-1" class="wistia_embed wistia_async_p2685pi4fd seo=true videoFoam=true wistia_embed_initialized">
<div id="wistia_chrome_40" class="w-chrome notranslate" tabindex="-1">
<div id="wistia_grid_125_wrapper">
<div id="wistia_grid_125_above"></div>
<div id="wistia_grid_125_main">
<div id="wistia_grid_125_behind"></div>
<div id="wistia_grid_125_center">
<div class="w-video-wrapper w-css-reset"></div>
<div class="w-ui-container">
<div id="w-vulcan-v2-124" class="w-vulcan-v2 w-css-reset">
<div class="w-vulcan--background w-css-reset">
<div class="w-css-reset" data-handle="statusBar"></div>
<div class="w-css-reset" data-handle="backgroundFocus"></div>
<div class="w-css-reset" data-handle="thumbnail">
<div>
<div class="w-css-reset"><img decoding="async" class="w-css-reset" src="https://fast.wistia.com/embed/medias/p2685pi4fd/swatch" srcset="" alt="Video Thumbnail" aria-hidden="true" /></div>
<div class="w-css-reset"><img decoding="async" class="w-css-reset" src="https://embed-ssl.wistia.com/deliveries/fbd87be5467a36b9aa3a5e52a2d62c99144c9a58.webp?image_crop_resized=960x540" srcset="https://embed-ssl.wistia.com/deliveries/fbd87be5467a36b9aa3a5e52a2d62c99144c9a58.webp?image_crop_resized=640x360 320w, https://embed-ssl.wistia.com/deliveries/fbd87be5467a36b9aa3a5e52a2d62c99144c9a58.webp?image_crop_resized=640x360 640w, https://embed-ssl.wistia.com/deliveries/fbd87be5467a36b9aa3a5e52a2d62c99144c9a58.webp?image_crop_resized=960x540 960w, https://embed-ssl.wistia.com/deliveries/fbd87be5467a36b9aa3a5e52a2d62c99144c9a58.webp?image_crop_resized=1280x720 1280w, https://embed-ssl.wistia.com/deliveries/fbd87be5467a36b9aa3a5e52a2d62c99144c9a58.webp?image_crop_resized=1920x1080 1920w, https://embed-ssl.wistia.com/deliveries/fbd87be5467a36b9aa3a5e52a2d62c99144c9a58.webp?image_crop_resized=1920x1080 3840w" alt="Video Thumbnail" /></div>
</div>
</div>
</div>
<div class="w-vulcan--aria-live w-css-reset" aria-live="polite" aria-atomic="true"></div>
<div class="w-vulcan-overlays-table w-css-reset">
<div class="w-vulcan-overlays--left w-css-reset">
<div class="w-css-reset"></div>
</div>
<div class="w-vulcan-overlays--center w-css-reset">
<div class="w-css-reset">
<div class="w-css-reset" data-handle="bigPlayButton">
<div class="w-bpb-wrapper w-css-reset w-css-reset-tree">
<div></div>
<div></div>
</div>
</div>
<div class="w-css-reset" data-handle="clickForSoundButton"></div>
<div class="w-css-reset" data-handle="playPauseNotifier"></div>
<div class="w-css-reset" data-handle="captions"></div>
<div class="w-css-reset" data-handle="playPauseLoading">
<div class="w-css-reset w-css-reset-tree"></div>
</div>
<div class="w-css-reset" data-handle="transcript">
<div class="w-css-reset"></div>
</div>
</div>
</div>
<div class="w-vulcan-overlays--right w-css-reset">
<div class="w-css-reset"></div>
</div>
</div>
<div class="w-bottom-bar w-css-reset">
<div class="w-bottom-bar-lower w-css-reset">
<div>
<div></div>
</div>
<div class="w-bottom-bar-left w-css-reset">
<div class="w-bottom-bar-left-inner w-css-reset">
<div class="w-css-reset" data-handle="smallPlayButton">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="smallPlayButton_icon_wrapper">
<div>
<div>
<div></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="w-bottom-bar-middle w-css-reset">
<div class="w-bottom-bar-middle-inner w-css-reset">
<div class="w-css-reset" data-handle="playbar">
<div class="w-playbar-wrapper w-css-reset w-css-reset-tree">
<div class="w-playbar__time">6:49</div>
<div>
<div tabindex="0" role="slider" aria-label="Playbar" aria-orientation="horizontal" aria-valuemax="408.918" aria-valuemin="0" aria-valuenow="0" aria-valuetext="0 seconds">
<p>&nbsp;</p>
<div></div>
<div class="w-storyboard-anchor">
<div class="w-storyboard">
<p><img decoding="async" class="w-css-reset-max-width-none-important" src="https://embed-ssl.wistia.com/deliveries/1a8a65a3559a79e464571eb89636a9905b45360f.bin" alt="" /></p>
<div class="w-storyboard-time">5:22</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="w-bottom-bar-right w-css-reset">
<div class="w-bottom-bar-right-inner-anchor w-css-reset">
<div class="w-bottom-bar-right-inner w-css-reset">
<div class="w-css-reset" data-handle="captionsButton">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="captionsButton_icon_wrapper"></div>
</div>
</div>
<div class="w-css-reset" data-handle="volumeButton">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="volumeButton_icon_wrapper"></div>
</div>
</div>
<div class="w-css-reset" data-handle="settingsButton">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="settingsButton_icon_wrapper"></div>
</div>
</div>
<div class="w-css-reset" data-handle="fullscreenControl">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="fullscreenControl_icon_wrapper"></div>
</div>
</div>
</div>
</div>
<div class="w-wistia-logo w-css-reset">
<div class="w-css-reset" data-handle="wistiaLogo">
<div class="w-vulcan-button-wrapper w-css-reset">
<div class="w-vulcan-icon-wrapper" data-handle="wistiaLogo_icon_wrapper"></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="w-foreground w-css-reset">
<div class="w-css-reset" data-handle="contextMenu"></div>
<div class="w-css-reset" data-handle="loadingHourglass"></div>
<div class="w-css-reset" data-handle="focusOutline"></div>
</div>
</div>
</div>
</div>
<div id="wistia_grid_125_top_inside">
<div id="wistia_grid_125_top"></div>
</div>
<div id="wistia_grid_125_bottom_inside">
<div id="wistia_grid_125_bottom"></div>
</div>
<div id="wistia_grid_125_left_inside">
<div id="wistia_grid_125_left"></div>
</div>
<div id="wistia_grid_125_right_inside">
<div id="wistia_grid_125_right"></div>
</div>
</div>
<div id="wistia_grid_125_below"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<h2 id="h-rbac-for-logicmodules-granular-role-based-access-controls-to-minimize-risk-nbsp" class="wp-block-heading">RBAC for LogicModules: Granular role-based access controls to minimize risk</h2>
<p>Large complex organizations like enterprises and MSPs have greater RBAC and security needs. With RBAC for LogicModules, these organizations can now set more granular permissions, ensuring that the right team members have the appropriate access level to view or edit specific LogicModules and the underlying data.</p>
<p>This enhanced granularity strikes an ideal balance between minimizing monitoring and outage risks while giving teams the control to monitor the correct data to maximize performance and visibility. Using the module editor, administrators can assign Access Groups to modules directly within the LM Envision platform. After assigning Access Groups, you can filter and view modules by these groups in ‘My Module Toolbox’.</p>
<figure class="wp-block-image"><img decoding="async" src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfP-gtp9DqQGO8B0RktQcYhtalHMG7PcRw0kCs1X0d8JvrGHDgGj9PoewxxjeFFvBkgp6MoR2EB1ivRF-E7DDtbt2V7T9j53aXNFO1_tS-zE4XsDnVEV5lb0Nx_TKCGvossVJSTf7QsVBbQv5oP4fOLYLs?key=ZjhWWw2OVDr_2fab2ecPTw" alt="" /></figure>
<p>RBAC for LogicModules extends the principle of least privilege to Modules.</p>
<p>The flexibility of Access Groups allows you to tailor permissions to your organization’s structure. You might give a user the ability to update alert thresholds for resource groups, or create “view only” permissions for specific modules. You can also create groups to ensure that:</p>
<ul class="wp-block-list">
<li>The database team can only edit modules related to database monitoring.</li>
<li>The server team can only edit modules related to server monitoring</li>
<li>And so on…</li>
</ul>
<p>This targeted approach prevents teams from accidentally interfering with each other’s monitoring configurations, ensuring comprehensive coverage and reducing the risks of gaps in visibility.</p>
<p>For more information, visit the <a href="https://www.logicmonitor.com/support/access-groups-for-modules">documentation</a> site.</p>
<h2 id="h-security-settings-and-recommendations-protecting-your-portal-with-better-security-visibility-and-control" class="wp-block-heading">Security Settings and Recommendations: Protecting your portal with better security visibility and control</h2>
<p>We are excited to announce Security Settings and Security Recommendations to help our customers get the most value from LogicMonitor and stay current with security best practices.</p>
<p><strong>Security Settings</strong> is your new launchpad for managing security and RBAC within LogicMonitor. This centralized page simplifies the process of reviewing and modifying your environment’s security configuration, providing those with Security permissions with granular control and enhanced visibility over their portal security configuration.</p>
<p>Within Security Settings, you’ll also find <strong>Security Recommendations, </strong>a proactive tool displaying recommended actions to protect your portal better.</p>
<p>These recommendations can include suggested actions like enabling two-factor authentication (2FA), which adds an extra layer of security by requiring users to verify their identity through a third-party application or an authentication token delivered using SMS, voice, or email. You can apply 2FA globally for all portal users or on a per-user basis.</p>
<p><strong>Important Note:</strong> If you’re using Single Sign-On (SSO), 2FA behavior depends on your SSO configuration.</p>
<ul class="wp-block-list">
<li>If SSO is not set to “Restrict Single Sign-On,” users can choose between SSO or 2FA for login.</li>
<li>If SSO is set to strict access, users can only log in using SSO.</li>
<li>To enable 2FA with SSO, you must configure it through your SSO provider.</li>
</ul>
<figure class="wp-block-image"><img decoding="async" src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdKw4g_47MMv00JwVjfGZU-aWQc7koDSQT2wvPvQ1BkySoKa5g6mbhMKvrzMu0u4ifHCM7pM_meNlLHFavjsORKJ8uUE6OU32P5OpMw0DaoBLZlXOUpfVb9oeUyPUVQRiirkHY5IBtj00-e-sTU1CuTrXHl?key=ZjhWWw2OVDr_2fab2ecPTw" alt="" /></figure>
<p>Security Recommendations gives you recommended actions that enhance the security posture of your LogicMonitor portal.</p>
<p>Other recommendations may include:</p>
<ul class="wp-block-list">
<li>Suspending inactive users after a specified period.</li>
<li>Turning off inactive tokens after a specified period.</li>
<li>Configuring an email domain allowlist.</li>
</ul>
<p>By following these recommendations, you can proactively strengthen your LogicMonitor portal’s security and protect your valuable data.</p>
<p>For more in-depth guidance on securing your LogicMonitor portal, refer to <a href="https://www.logicmonitor.com/support/getting-started/advanced-logicmonitor-setup/security-best-practices">LogicMonitor Best Practices</a> or visit the <a href="https://www.logicmonitor.com/support/security-4">Security Settings documentation</a> site.</p>
<h2 id="h-fostering-continuous-innovation" class="wp-block-heading">Fostering continuous innovation</h2>
<p>With the latest enhancements to the LM Envision platform, LogicMonitor is committed to making it easier for customers to identify and troubleshoot issues quickly, monitor their network infrastructure, and ensure the security of their data. We are excited to see how our customers use these new features to improve their operations and achieve their business goals. Stay tuned for more exciting updates as we continue to innovate and provide our customers with the tools and resources they need to succeed.</p>
<p>If you’re a current customer and need help enabling a new feature, please reach out to your Customer Service Representative or engage directly with the product team in the LogicMonitor <a href="https://community.logicmonitor.com/">Community</a>! If you’re new to LogicMonitor, take the next step on your journey toward Hybrid Observability powered by AI today by watching a <a href="http://logicmonitor.com/platform-demo">quick overview</a> of the platform and <a href="https://www.logicmonitor.com/signup">requesting a free trial</a>.</p>
<p>The post <a href="https://dibiz.vn/en/improve-enterprise-mttr-visibility-and-control/">Improve enterprise MTTR, visibility, and control</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
