Creating a Secure BYOD Policy for Laptops that Employees Will Actually Follow
In today’s rapidly evolving digital landscape, organizations must adapt to new threats and emerging technologies without breaking the bank. ...
Read MoreThe 2nd Transformation
“We thought that the Covid remote-work transformation was hard…” An IT leader at a noted...
Is Employee Privacy the Biggest Challenge to BYOD Adoption? Here’s What to Do
While the Covid pandemic has largely subsided, organizations are still experiencing its long-lasting effects on...
Product Management Wisdom – Your Buyer Must Take a Shower with the Problem
Dvir Shapira, Chief Product Officer at Venn Software, appeared as a guest on the “SaaS...
Get Our Latest Blogs Straight to Your Inbox
Offshore work in the Philippines is surging. Here’s why it has the potential to disrupt IT
The world of work is changing In my recent blogs, I’ve discussed how remote work...
Why is Zero Trust security so hard to implement?
With Google’s recent announcement of the general availability of BeyondCorp Enterprise, Zero Trust (ZT) security...
Whac-A-Mole – Why this timeless classic never gets old
While online gaming has seen record growth during the pandemic, there’s no substitute for a...
Data privacy at work – following Apple’s lead
Earlier this year, Apple upped the ante in the area of corporate social responsibility for...
Cybersecurity as a business focus: It must move to the top of the list
There are some certainties in our current world. One of them is that cybersecurity is...
Many financial firms got a pass on regulation during COVID. No more. The regulators are coming.
When COVID hit, survival mode kicked in – for everyone. Offices vacated and workers retreated...