2 min read
4 BYOD security risks you should prepare for
Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us....
2 min read
Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us....
2 min read
We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced...
1 min read
The internet is indispensable for improving business productivity, but it’s also an outlet for procrastination. With unfettered access to the...
2 min read
It’s easy to see why Office 365 is an attractive solution for small and medium-sized businesses already familiar with the Office interface. More and...
1 min read
Security experts are constantly discovering new potential threats, and quite recently, they’ve found a new type of Spectre-style attack more...
4 min read
In my previous blog, I shared some thoughts about why a strong CFO-CIO collaboration is the key to success in the digital world. With five new types...
1 min read
While digital technology is opening entirely new ways of doing business, some organizations fall short of their ambitions and instead settle on...
2 min read
The relationship between computer hardware and software can be frustrating. Both require the other to function properly, but both also require...
3 min read
The term “next-generation” is used quite frequently across the tech industry – it’s not limited to security. Since we see the term so often, it’s...
2 min read
As SD-WAN adoption matures and moves from “peak of inflated expectation” to “slope of enlightenment”, a question that I hear and many technologist...