When thinking about automation in our workplace IT networks, it is easy to get carried away and conjure up sinister Bladerunner-style robots who work in-place of humans, slowly replacing us one by one.
Read Article
Posted: 20 August 2019
Posted: 12 January 2017
Exfiltration is a decidedly unpleasant word, and it’s rarely connected with Google’s benign application suite used freely by millions all over the world — Google Apps. Specifically, how secure is Google Drive?
Read Article
Posted: 13 December 2016
While it’s important to secure data no matter where it lives, data in motion is at its most vulnerable for hackers and needs to be a focus point for your security and compliance efforts.
Read Article
Share via: