Female Equity Analysts and Corporate Environmental and Social Performance

Female Equity Analysts and Corporate Environmental and Social Performance Summary This paper by Kai Li et al. (forthcoming in Management Science) examines whether female sell-side equity analysts monitor corporate environmental and social (E&S) performance differently from male analysts, and whether that monitoring influences firm outcomes. The authors hand-collect analyst gender from bios, use analyst reports […]

Read More →

What Is a Contact Center? Types, Software & KPIs for 2025

What Is a Contact Center? Types, Software & KPIs for 2025 Summary The article defines the modern contact centre as an omnichannel hub that unifies voice, chat, messaging, email and video to deliver seamless, context-rich customer support. It contrasts legacy call centres (voice-only) with 2025 contact centres that combine generative AI, real-time analytics, knowledge management […]

Read More →

45 New Domains Linked to Salt Typhoon, UNC4841

45 New Domains Linked to Salt Typhoon, UNC4841 Summary Researchers at Silent Push uncovered 45 previously unreported domains tied to China‑backed threat actors Salt Typhoon and UNC4841. The domains, some registered as far back as 2020, were created using fake personas, addresses and ProtonMail accounts and were used to enable long‑term, stealthy access for cyber‑espionage […]

Read More →

The Critical Failure in Vulnerability Management

The Critical Failure in Vulnerability Management Summary The article argues that vulnerability management (VM) is failing to deliver true security because the market focused on finding issues rather than fixing them. Vendors grew by scaling detection and reporting, creating scan fatigue and a backlog of unresolved risks. Cloud-focused shifts help in controlled environments but leave […]

Read More →

Salesloft Breached via GitHub Account Compromise

Salesloft Breached via GitHub Account Compromise Summary A threat actor tracked as UNC6395 compromised Salesloft’s GitHub account earlier this year, exfiltrated repository data and used information gathered to move into Drift’s AWS environment. The attacker stole OAuth tokens tied to Drift integrations and abused them to access hundreds of customers’ Salesforce instances and other integrated […]

Read More →