Karen A. Frenkel

Remote Applications Drive Bandwidth Demand

By: Karen A. Frenkel

2 min read

Wanted: Big Data and Big Data Experts

By: Karen A. Frenkel

2 min read

Companies Grow More Vulnerable to Insider Threats

By: Karen A. Frenkel

3 min read

Ex-Employees Still Cause Data Breaches

By: Karen A. Frenkel

2 min read

Digital Transformation Is in Chaos

By: Karen A. Frenkel

2 min read

Prepare for Disruption, Distortion, Deterioration

By: Karen A. Frenkel

2 min read

Do Security Pros Need a Single Unifying Platform?

By: Karen A. Frenkel

3 min read

10 Ways to Harness the Power of Data Analytics

By: Karen A. Frenkel

3 min read

10 Ways to Deal With Hacktivist Attacks

By: Karen A. Frenkel

3 min read

Best Security Approach: Layers and Trained Staff

By: Karen A. Frenkel

2 min read

The Critical Need to Patch Vulnerabilities ASAP

By: Karen A. Frenkel

2 min read

Automation Can Help IT With Security Breaches

By: Karen A. Frenkel

3 min read

Secure Your Data, Not Just the Perimeter

By: Karen A. Frenkel

2 min read

Safeguard Email From Internal and External Threats

By: Karen A. Frenkel

2 min read

Security or Agility? An Unnecessary Choice

By: Karen A. Frenkel

2 min read

Managing Third-Party Risks and Internet of Things

By: Karen A. Frenkel

3 min read

Companies Expect Cyber-Attacks but Aren’t Prepared

By: Karen A. Frenkel

2 min read

Security Programs Aren’t as Efficient as IT Thinks

By: Karen A. Frenkel

2 min read

Phishing Attacks Shift to Email Addresses

By: Karen A. Frenkel

3 min read

Many Security Operations Centers Are Falling Short

By: Karen A. Frenkel

2 min read

1
...
8 9 10 11 12
...
15