Where Are the Hackers? How Can We Live Without’em?
There are three or more separate steps in getting the technology security right. Owen Davis spoke at my Columbia B-School Lean LaunchPad class, and his words to my students …
There are three or more separate steps in getting the technology security right. Owen Davis spoke at my Columbia B-School Lean LaunchPad class, and his words to my students …
Business and IT executives and employees need to consider privacy and security as part of their daily routine. Small businesses and enterprises need to drive “security first” best practices that …
It’s only when we see anomalous results, or outages, that we notice the presence of security intrusions. The SolarWinds, Colonial Pipeline, and Kaseya security breaches point up the continuing issue …
The COVID-19 black swan turned 2020 into a year of great angst and its effects will continue through most of 2021. The global economic and geopolitical environments will be negative …
As COVID-19 continues to reshape the business landscape, there is a need for a unified security enforcement in WFH and Hybrid WFH situations. If the employees are working from home …
Given that Work-From-Home (WFH) is will not be disappearing any time soon, business executives and IT executives must rethink their networking topologies with consideration towards data management and privacy, identity, …
Now that the work-from-home (WFH) environment is settling in as the “new normal” and will be with us for an extended period of time, a renewed focus needs to be …