Balancing the Opportunities and Risks of Machine Learning
Machine learning-based systems bring the potential for business growth, but also carry some challenges and risks. Being aware of the latter is the first step.
How to Protect Employee Privacy and Ensure Data Security With a Remote Workforce
Now that remote work is mainstream, companies and employees alike need to review their approach to employee privacy and data security.
How Security Concerns Are Holding Back the Industrial Internet of Things
The IIoT has the potential to create competitive advantage for organizations, but its development is hindered by a number of issues, particularly security.
Why You Need to Protect Enterprise Social Networks From Attack
Collaboration platforms are enabling organizations to work remotely. But they also offer attackers new ways into the enterprise network. Here's what to do.
If You Want Your Software to Succeed, Don't Build Sports Cars Without the Roads
Companies often treat non-functional requirements and system design as an afterthought, overlooking essentials like security, monitoring and scaling.
So Many Breaches, So Little Proactive Action
Companies cannot rely on quickly aging security tactics to keep sensitive information protected. A proactive approach is the way forward.
Zoom's New Research on Remote Work, Box Cozies Up to Microsoft Teams & More News
In this newsbyte, Zoom eyes the return to the physical workplace, Box and Microsoft deepen their partnership for Teams, Fuze protects Teams data and more.
Microsoft Exchange Attack Underlines How Vulnerable Your Organizational Data Is
The attack on Microsoft Exchange has had global repercussions, although the full extent of the damage is still unclear.
Box Makes Cloud Content Migration Faster, DOJ Questions Salesforce’s Slack Buy & More News
Box makes migration easier, the Slack acquisition is under scrutiny, Microsoft unveils a new Office & Trend Micro identifies a file sharing flaw.
What the SolarWinds Hack Tells Us About the State of Cybersecurity
It may take years before the full damage from the SolarWinds hack is known, but it's shown that cybersecurity is a big issue in the business community.
How to Ensure Data Privacy in the Digital Workplace
Data privacy day is a good time to reexamine your data practices to ensure sensitive and personal information is secure. These best practices can help.
Why You Need a Plan for Content Security in Microsoft 365
Microsoft 365 has a ton of great applications, all with their own security implications.
Take Your Cloud Strategy Into the Future
Organizations that have not already developed a cloud strategy will have to do so this year in order to remain competitive. Here's why.
5 Digital Transformation Lessons to Take Into 2021
The digital workplace changed dramatically in 2020. Here are some lessons learned that enterprise leaders should take into 2021.
Hacker Takes Over Twitter Security, Zoom Adds a Big Name to Board and More People on the Move
Twitter taps a hacker to lead security, former Arizona governor joins Zoom, Limeade names a new CTO and McDonald's overhauls HR.
Now Is the Time to Replace VPN With Zero Trust
Virtual private networks are inadequate for the security needs of the modern connected enterprise. Here's why Zero Trust is in organizations' best interest.
Should You Allow Shadow IT and BYOD in Your Company?
Remote work made 'bring your own device' an everyday reality. As that happens, companies need to keep an eye on shadow IT to mitigate the associated risks.
Looking Beyond Digital Transformation
While many companies are still coming to terms with COVID's impact on the workplace, others are looking beyond digital transformation at what's next.
Collaboration & Productivity
Is Your Business Data Safe in Slack and Microsoft Teams?
With communication and collaboration platforms now a mainstay, enterprise leaders are asking whether their company data is safe in these platforms. Here's why.
Collaboration & Productivity
Striking the Security and Enterprise Collaboration Balancing Act
Organizations need solutions, processes and cultures that foster an ongoing dedication to information security without getting in the way of productivity.