01.24.19 * 11 mins read
Originally published October, 2014, updated January 2019 When someone leaves the company, the human resources(HR) department is quick to grab...By W. Curtis Preston, Chief Technologist in – 01.24.19
08.31.16 * 8 mins read
With technology budgets increasingly managed outside of IT, it’s not unusual for enterprise business units to champion new cloud...By Jennifer Deming Burnham in – 08.31.16
03.07.16 * 6 mins readRansomware attacks are in the rise, impacting not just Windows systems but Android and Macs as well. These…By Jennifer Deming Burnham in – 03.07.16
03.02.16 * 6 mins read
To say that we live in a data-rich world is an understatement. Every day, we create and store 2.5 quintillion...By Jaspreet Singh, Founder and CEO in – 03.02.16
Dave Packer in
02.25.16 * 5 mins read
Recent data breaches, including 2015’s infamous Ashley Madison hack, have shown the world two valuable lessons: in the age...By Dave Packer in – 02.25.16
08.26.15 * 4 mins read
IT teams have often been clueless about how to facilitate eDiscovery requests on their organization’s’ mobile devices. This demand...
08.11.15 * 7 mins read
At Opposite Ends of the Internet Consolidation Tightrope: Accountability, Security, Privacy, and the Future of the Internet
The Internet, like other computing resources, operates on a pendulum swing: from centralized to decentralized, from rampant innovation to...
08.04.15 * 6 mins read
Everyone in IT wants employees to be educated about security — if for no other reason than it’s a...
07.28.15 * 6 mins read
In my 30+ years in the computer industry, I’ve attended hundreds of tech conferences. Somehow, though, I’ve never made...