Category Archives: Technology

Re-Defining Security – It’s More Than Just Compliance

Re-Defining Security – It’s More Than Just Compliance

Re-Defining Security Risk management is messy. The internet has known vulnerabilities, and regulatory issues seem to change faster than you can say “Privacy Shield.” So why can’t security and compliance teams see eye to eye? Sixty-four percent of IT executives feel confident that compliance will protect their company against breaches, according to Vormetric’s 2016 Data…

Microsoft Powers Up With Purchase Of Xamarin

Microsoft Powers Up With Purchase Of Xamarin

Microsoft’s Recent Acquisition  To many tech commentators, the emerging cloud economy looked like it would be dominated by two familiar giants: Google and Amazon. Google recently announced that Spotify would be using its cloud architecture for its backend, while AWS continues to expand and draw players large and small into its vast orbit like a…

2016 Mobile Marketing Tips For Cloud Services

2016 Mobile Marketing Tips For Cloud Services

Mobile Marketing Tips Mobile marketing is continually evolving and at such a fast pace, if you are not currently using mobile marketing in your advertising strategies, then you have already been left behind. Why? Because 70 percent of all Smartphone users consider SMS marketing to be the best way to grab their attention. And, 50%…

2016 Connected Enterprises Report

2016 Connected Enterprises Report

Connected Enterprises Report Dimension Data’s 2016 Connected Enterprise Report is out, discussing collaboration trends, insights, and strategies in the digital age. With the promise of lower costs coupled with greater productivity, increased agility and better customer engagement, collaboration technologies are providing tools for real-time communication, file sharing, project management, and social networking which benefit product…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Will GPS, The Cloud, And The IoT Enable A New Level Of Mass-surveillance?

Will GPS, The Cloud, And The IoT Enable A New Level Of Mass-surveillance?

New Levels of Mass-surveillance? There’s a dark cloud hanging over the cloud. Recently, US security chief James Clapper blithely revealed that the government “could” use the Internet of Things for civilian surveillance. Given the heightened alarm caused by domestic terrorism, I take it the word ‘will’ is more applicable than ‘could’ in this case. If…