Creating a Secure BYOD Policy for Laptops that Employees Will Actually Follow
In today’s rapidly evolving digital landscape, organizations must adapt to new threats and emerging technologies without breaking the bank. ...
Read MoreProduct Management Wisdom – Your Buyer Must Take a Shower with the Problem
Dvir Shapira, Chief Product Officer at Venn Software, appeared as a guest on the “SaaS...
Offshore work in the Philippines is surging. Here’s why it has the potential to disrupt IT
The world of work is changing In my recent blogs, I’ve discussed how remote work...
Why is Zero Trust security so hard to implement?
With Google’s recent announcement of the general availability of BeyondCorp Enterprise, Zero Trust (ZT) security...
Get Our Latest Blogs Straight to Your Inbox
Whac-A-Mole – Why this timeless classic never gets old
While online gaming has seen record growth during the pandemic, there’s no substitute for a...
Data privacy at work – following Apple’s lead
Earlier this year, Apple upped the ante in the area of corporate social responsibility for...
Cybersecurity as a business focus: It must move to the top of the list
There are some certainties in our current world. One of them is that cybersecurity is...
Many financial firms got a pass on regulation during COVID. No more. The regulators are coming.
When COVID hit, survival mode kicked in – for everyone. Offices vacated and workers retreated...
Virtual Desktops: they don’t have to be a cringeworthy experience
It’s a “cringe on the face.” That’s how Morley Ivers, OS33 President, describes the scenario...
An MSP vs an MSSP: they are not created equal
It’s well-documented and well-discussed: the future of work is hybrid. While the picture of our...