Karen A. Frenkel

What’s Worse Than Stolen Data? Altered Data

By: Karen A. Frenkel

2 min read

2016 Security Forecast: Decoding the Adversary

By: Karen A. Frenkel

3 min read

Nine Tips for Agile DDoS Protection

By: Karen A. Frenkel

3 min read

Shifting to Hybrid IT Is No Simple Task

By: Karen A. Frenkel

3 min read

The Rise of No-Code Citizen Developers

By: Karen A. Frenkel

2 min read

Why Cloud-based Security Services Are on the Rise

By: Karen A. Frenkel

2 min read

11 Ways to Protect Data in the Cloud

By: Karen A. Frenkel

3 min read

10 Tips for Taking Back Control of Your Data

By: Karen A. Frenkel

3 min read

Cloud Apps Rise Despite Cloud Security Concerns

By: Karen A. Frenkel

2 min read

The Five Cloud Concerns Faced by All Industries

By: Karen A. Frenkel

2 min read

Using Knowledge to Fix Customer Service Centers

By: Karen A. Frenkel

2 min read

How to Implement a Cloud Privacy by Design System

By: Karen A. Frenkel

2 min read

10 Ways to Take Control of SaaS Apps and Shadow IT

By: Karen A. Frenkel

3 min read

CIOs Are Concerned Over Employees’ Cloud Misuse

By: Karen A. Frenkel

2 min read

Why a Total Communications Strategy Makes Sense

By: Karen A. Frenkel

2 min read

How Empowering Business Users Helps IT

By: Karen A. Frenkel

2 min read

More Companies Choose Hybrid Cloud Solutions

By: Karen A. Frenkel

2 min read

Managing the Complexity of Machine Data Storage

By: Karen A. Frenkel

3 min read

The World According to DBAs

By: Karen A. Frenkel

2 min read

Big Data Helping Enterprise Decision-Making

By: Karen A. Frenkel

2 min read

1
...
4 5 6 7 8
...
15