Creating a Secure BYOD Policy for Laptops that Employees Will Actually Follow
In today’s rapidly evolving digital landscape, organizations must adapt to new threats and emerging technologies without breaking the bank. ...
Read MoreProduct Management Wisdom – Your Buyer Must Take a Shower with the Problem
Dvir Shapira, Chief Product Officer at Venn Software, appeared as a guest on the “SaaS...
Venn Software named as a Sample Vendor for BYOPC Security in two Gartner® Hype Cycles™
Venn Software named as a Sample Vendor for BYOPC Security in the Gartner® Hype Cycle™...
Offshore work in the Philippines is surging. Here’s why it has the potential to disrupt IT
The world of work is changing In my recent blogs, I’ve discussed how remote work...
Get Our Latest Blogs Straight to Your Inbox
Why is Zero Trust security so hard to implement?
With Google’s recent announcement of the general availability of BeyondCorp Enterprise, Zero Trust (ZT) security...
Venn: Security without compromise
The concept of the cloud has been familiar to us all for years. While the...
Whac-A-Mole – Why this timeless classic never gets old
While online gaming has seen record growth during the pandemic, there’s no substitute for a...
Will cybersecurity concerns continue in our post–pandemic world?
2020 was truly a year that tested every individual, every business, and every entity on...
Video conference remotely – just not through your remote desktop
What do a US state, a UK university, and a Fortune 50 bank have in...
Data privacy at work – following Apple’s lead
Earlier this year, Apple upped the ante in the area of corporate social responsibility for...