Creating a Secure BYOD Policy for Laptops that Employees Will Actually Follow
In today’s rapidly evolving digital landscape, organizations must adapt to new threats and emerging technologies without breaking the bank. ...
Read MoreVenn Software named as a Sample Vendor for BYOPC Security in two Gartner® Hype Cycles™
Venn Software named as a Sample Vendor for BYOPC Security in the Gartner® Hype Cycle™...
Offshore work in the Philippines is surging. Here’s why it has the potential to disrupt IT
The world of work is changing In my recent blogs, I’ve discussed how remote work...
Why is Zero Trust security so hard to implement?
With Google’s recent announcement of the general availability of BeyondCorp Enterprise, Zero Trust (ZT) security...
Get Our Latest Blogs Straight to Your Inbox
Venn: Security without compromise
The concept of the cloud has been familiar to us all for years. While the...
Whac-A-Mole – Why this timeless classic never gets old
While online gaming has seen record growth during the pandemic, there’s no substitute for a...
Will cybersecurity concerns continue in our post–pandemic world?
2020 was truly a year that tested every individual, every business, and every entity on...
Video conference remotely – just not through your remote desktop
What do a US state, a UK university, and a Fortune 50 bank have in...
Data privacy at work – following Apple’s lead
Earlier this year, Apple upped the ante in the area of corporate social responsibility for...
Cybersecurity as a business focus: It must move to the top of the list
There are some certainties in our current world. One of them is that cybersecurity is...