Articles
Box makes migration easier, the Slack acquisition is under scrutiny, Microsoft unveils a new Office & Trend Micro identifies a file sharing flaw.
Continue reading...
It may take years before the full damage from the SolarWinds hack is known, but it's shown that cybersecurity is a big issue in the business community.
Continue reading...
Data privacy day is a good time to reexamine your data practices to ensure sensitive and personal information is secure. These best practices can help.
Continue reading...
Microsoft 365 has a ton of great applications, all with their own security implications.
Continue reading...
Blockchain was supposed to revolutionize the internet. So where are we at with that?
Continue reading...
Organizations that have not already developed a cloud strategy will have to do so this year in order to remain competitive. Here's why.
Continue reading...
The digital workplace changed dramatically in 2020. Here are some lessons learned that enterprise leaders should take into 2021.
Continue reading...
Gartner predicted that application security spending would reach $3.2 billion in 2020, a 6% increase from 2019 and with it comes the need for API security.
Continue reading...
Security experts chime in to help understand how DDoS attacks occur and whether the type of CMS a company uses has any impact on its security.
Continue reading...
Privacy is a growing concern for customers and employees. A chief privacy officer can help a company stay on the right side of the issue.
Continue reading...
With data security expectations rising, California passed another consumer data privacy law. What does this mean for modern marketers?
Continue reading...
Virtual private networks are inadequate for the security needs of the modern connected enterprise. Here's why Zero Trust is in organizations' best interest.
Continue reading...
As privacy expectations grow, Google has introduced a tag management innovation, Consent Mode, meant to address the need to stay data compliant.
Continue reading...
Remote work made 'bring your own device' an everyday reality. As that happens, companies need to keep an eye on shadow IT to mitigate the associated risks.
Continue reading...