Author user photo

Mobile

The Battle over Encryption is Only Starting

The Apple/FBI battle has ended, but not the battle over encryption. How will this play out as computing power steadily moves toward the day when technology can decrypt even the best encryption?

Author user photo

Mobile

The Battle over Encryption is Only Starting

The Apple/FBI battle has ended, but not the battle over encryption. How will this play out as computing power steadily moves toward the day when technology can decrypt even the best encryption?

Author user photo

SaaS

The Challenges of Becoming a Software Company

Enterprises seeking to recast themselves as software providers must understand what’s involved in a software business and go-to-market issues. Here is advice on issues before making the leap.

Author user photo

Cybersecurity

The Frightening Trend Known as Ransomware

Part of the frightening aspect of ransomware is that it works much differently than other types of cyberattacks. How does it work? Why is the trend growing? And how can you fight back?

Author user photo

Mobile

How BYO Messaging Impacts Enterprise Security

Here are four key considerations business owners should take to safely take advantage of mobile messaging technology to have safe, meaningful conversations with users and employees.

More Articles