Imagine you’re going about your day when a friend or co-worker with limited experience with cybersecurity asks you about what you do or what you think of the latest security technology. How can you engage with an answer that isn’t terse, overly technical or judgmental? How can we translate cybersecurity…
Read More
Business begins at the endpoint. Cheap puns aside, nearly all business processes, from employee collaboration to customer interaction, require the use of endpoints, whether they be smartphones, tablets, kiosks or virtual reality (VR) headsets. In this increasingly connected world, each of these endpoints align with complex use cases that have…
Read More
Airlines have long been a symbolic target for nation-state actors due to their close identification with their host countries, but that threat landscape has since widened considerably to include financially motivated attackers who are after customer data. The airline industry is facing an era of growth, which brings an increase…
Read More
Technology enables employees to work from the office, from home, during their daily commute and pretty much everywhere in between. Companies, however, have little control over security between the home and the office. Employees may choose to work from unsecured Wi-Fi networks in public places or when working remotely, for…
Read More