Karen A. Frenkel

Companies Are Ill-Prepared for Cyber-Attacks

By: Karen A. Frenkel

2 min read

The Disconnect Between Breaches and Solutions

By: Karen A. Frenkel

2 min read

Is the Term ‘IT Department’ on Its Way Out?

By: Karen A. Frenkel

3 min read

How to Create an OSS Policy: 11 Best Practices

By: Karen A. Frenkel

3 min read

Questions That Result in Actionable Cost Analyses

By: Karen A. Frenkel

3 min read

10 Reasons Why Social Media Compliance Is Important

By: Karen A. Frenkel

3 min read

Nine Facts You Might Not Know About Bot Traffic

By: Karen A. Frenkel

2 min read

Data Analytics Spurs Growth and Innovation

By: Karen A. Frenkel

2 min read

11 Reasons to Choose an Automated Security System

By: Karen A. Frenkel

3 min read

Hackers Increasingly Spoof Authentic Identities

By: Karen A. Frenkel

3 min read

The Disaster Recovery Blame Game

By: Karen A. Frenkel

3 min read

Mobile’s Potential to Increase Productivity

By: Karen A. Frenkel

3 min read

Unleashing the Power of Data and Analytics

By: Karen A. Frenkel

2 min read

12 Ways to Shift to a Consumption-Based IT Model

By: Karen A. Frenkel

3 min read

How Outdated Tech Wastes Billions of Dollars

By: Karen A. Frenkel

3 min read

Shedding Light on the Problem of Dark Data

By: Karen A. Frenkel

3 min read

How Repetitive Tasks Waste $1.8 Trillion

By: Karen A. Frenkel

3 min read

Why a Compliance Gap Costs Time and Money

By: Karen A. Frenkel

2 min read

12 Tips for Managing Today’s IT Challenges

By: Karen A. Frenkel

4 min read

How CIOs Should Convey Cyber-Risks to the Board

By: Karen A. Frenkel

3 min read

1
...
9 10 11 12 13
...
15