Karen A. Frenkel

Hackers Target Middle Managers and Corporate Emails

By: Karen A. Frenkel

3 min read

Disaster Recovery Plans and Testing Are Lacking

By: Karen A. Frenkel

2 min read

Top Tips to Secure the Data Center

By: Karen A. Frenkel

3 min read

12 Tips for Implementing IoT Security

By: Karen A. Frenkel

3 min read

Why Security Metrics Miss the Mark

By: Karen A. Frenkel

2 min read

Why Security Execs Lack Confidence in Security

By: Karen A. Frenkel

2 min read

Do You Know Where Your Critical Data Lives?

By: Karen A. Frenkel

3 min read

How to Prevent Website Downtime

By: Karen A. Frenkel

2 min read

The Dangers of Running an OS Beyond End of Life

By: Karen A. Frenkel

3 min read

9 Tips for Choosing a Legacy Modernization Partner

By: Karen A. Frenkel

3 min read

Why Being Compliant Does Not Mean Being Secure

By: Karen A. Frenkel

3 min read

Ten Tips to Secure the Data Center

By: Karen A. Frenkel

3 min read

Patent Filings Reveal a Growing Interest in IoT

By: Karen A. Frenkel

3 min read

When Security Breaches Come From Within

By: Karen A. Frenkel

3 min read

Web Apps Are the Most Vulnerable to Breaches

By: Karen A. Frenkel

3 min read

Wringing Productivity From Mobile Apps

By: Karen A. Frenkel

2 min read

Employees Are Unhappy With Enterprise Mobile Apps

By: Karen A. Frenkel

2 min read

Eight Steps to Securing IP in the IoT Era

By: Karen A. Frenkel

2 min read

How to Embrace Rogue IT

By: Karen A. Frenkel

2 min read

App Fatigue and Other Growing User Issues

By: Karen A. Frenkel

2 min read

1 2 3 4 5 6
...
15