
Creating a Secure BYOD Policy for Laptops that Employees Will Actually Follow
In todayās rapidly evolving digital landscape, organizations must adapt to new threats and emerging technologies without breaking the bank. ...
Read More
Product Management Wisdom – Your Buyer Must Take a Shower with the Problem
Dvir Shapira, Chief Product Officer at Venn Software, appeared as a guest on the āSaaS...

Offshore work in the Philippines is surging. Hereās why it has the potential to disrupt IT
The world of work is changing In my recent blogs, Iāve discussed how remote work...

Why is Zero Trust security so hard to implement?
With Googleās recent announcement of the general availability of BeyondCorp Enterprise, Zero Trust (ZT) security...
Get Our Latest Blogs Straight to Your Inbox

Whac-A-Mole ā Why this timeless classic never gets old
While online gaming has seen record growth during the pandemic, thereās no substitute for a...

Data privacy at work ā following Appleās lead
Earlier this year, Apple upped the ante in the area of corporate social responsibility for...

Cybersecurity as a business focus: It must move to the top of the list
There are some certainties in our current world. One of them is that cybersecurity is...

Many financial firms got a pass on regulation during COVID. No more. The regulators are coming.
When COVID hit, survival mode kicked in ā for everyone. Offices vacated and workers retreated...

Virtual Desktops: they donāt have to be a cringeworthy experience
Itās a ācringe on the face.ā Thatās how Morley Ivers, OS33 President, describes the scenario...

An MSP vs an MSSP: they are not created equal
Itās well-documented and well-discussed: the future of work is hybrid. While the picture of our...