Breaking the kill chain: Protecting against the known and the unknown
Data theft is big business. More than 1.3 billion records have been exposed in the last two years. The threat…
Blogs on tech trends, products, services and technologies, including cloud computing, security, artificial intelligence and more
Data theft is big business. More than 1.3 billion records have been exposed in the last two years. The threat…
New off-grid solar television owners are feeling more politically engaged in the 2017 elections and their opinions on politics have…
Microsoft Office may be the de facto productivity tool for millions of workers worldwide, but it’s no monolith. Rather than…
Wannacry and NotPetya are two recent security events that also became top news stories. I would say that these serve…
The Petya ransomware attack that hit computers around the world recently, the second in two months, is yet another reminder…
Uber has announced the release of their updated Community guidelines in East Africa, the guidelines aim to provide guidance on…
Project managers’ impressive capabilities can be significantly bolstered with top-notch project management tools. Within today’s realm of project management responsibilities…
Google has had voice search features in Android for years, but when Google Assistant rolled out on the Pixel in…
As companies become increasingly complex, finding an enterprise resource planning (ERP) solution that meets all needs may be as likely…
Nobody likes an audit. Even in the best of outcomes, audits take up valuable time that can be used to…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.