Evelyn de Souza
Part 2: Strategies for Securing Mobile Devices With workplace mobility now a way of life and companies investing in cloud-based apps more than ever, security is moving beyond the four walls. Just a few years ago, you could rely on
Cloud Apps Security Today, more than ever before, employees are working while on-the-go. The ease with which a worker can enjoy a coffee-café latte in one hand and click “send” with the other is made possible by the explosion of
Cyber Crime Business Insider You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others.
Predictions in 2020 The year 2020 promises to usher in significant new developments in collaboration and communication. It’s part of an unending climb, moving higher on a logarithmic curve of progress. New technologies continue to demonstrate better ways of getting
Become A More Effective CIO The Big Pivot podcast, put together by IDG and Informatica, looks at how CIOs are leading data transformation. Covering everything from the essentials of data management and security to the less obvious value of controlling
IRM Cloud-Based File Collaboration Data breaches and data loss due to insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks that keep managers up at night, according to new research by Ernst & Young. How
Are you a CxO or Thought leader working with a reputable company and looking for free profile exposure? If so, get in touch!