Karen A. Frenkel

The High Risk of Third-Party Apps

By: Karen A. Frenkel

3 min read

How to Get the Most Out of a UC System

By: Karen A. Frenkel

2 min read

How Idle Servers Cost $30 Billion

By: Karen A. Frenkel

3 min read

When the Firewall Is Not Enough

By: Karen A. Frenkel

3 min read

When DDoS Attacks Threaten Business Opportunities

By: Karen A. Frenkel

2 min read

How Malware Bypasses Detection Tools

By: Karen A. Frenkel

3 min read

Password Cracking Tops IT’s Security Concerns

By: Karen A. Frenkel

2 min read

How Cyber-criminals Infiltrate the Enterprise

By: Karen A. Frenkel

3 min read

The Anatomy of Tech-Support Scams

By: Karen A. Frenkel

3 min read

Demand for Cloud Storage: No End in Sight

By: Karen A. Frenkel

2 min read

Confusion over Security Responsibility in Cloud

By: Karen A. Frenkel

3 min read

Most Databases in the Cloud Are Not Encrypted

By: Karen A. Frenkel

3 min read

Security Pros Worry About Cloud and Mobile Safety

By: Karen A. Frenkel

2 min read

How IT Leaders Can Cope With Network Sprawl

By: Karen A. Frenkel

2 min read

How Hybrid Cloud Security Can Defeat DDoS Attacks

By: Karen A. Frenkel

2 min read

Securing the Cloud Security From the Inside-Out

By: Karen A. Frenkel

2 min read

Security and Privacy Concerns Dog the Cloud

By: Karen A. Frenkel

2 min read

Concerns About Data Security Slow Cloud Adoption

By: Karen A. Frenkel

3 min read

Approaching Cloud Security From the Inside-Out

By: Karen A. Frenkel

2 min read

Outdated Security Creates an IoT Danger

By: Karen A. Frenkel

3 min read

1
...
3 4 5 6 7
...
15