SECURITY
XAM
Can VDI secure BYOD?
In 2006, Joanna Rutkowska stepped on stage at the Black Hat Conference and demonstrated a hack she …
Continue readingIn 2006, Joanna Rutkowska stepped on stage at the Black Hat Conference and demonstrated a hack she …
Continue readingFew ad campaigns have ever had such a long-lasting impact as the iconic ‘I’m a …
Continue readingWith remote work, bring-your-own-device, and shadow IT apps becoming commonplace, the number of …
Continue readingThe thing about nostalgia is that it conveniently omits all the past’s imperfections.
Continue readingWhen you tell people you’re writing a piece on cybersecurity insurance, they tend to look at …
Continue readingIn life, we’ve all encountered the gaps between the idealized world and the world as it is.
Continue reading