Blog

[vc_row][vc_column][vc_column_text]Enterprises are starting to adopt business chat apps, as they incorporate more robust features. The line is blurring between these apps and more established UC platforms. Read more on SearchUnifiedCommunications.com[/vc_column_text][/vc_column][/vc_row]...

"Immersive group collaboration" brings interactive team meetings into the digital age. Maybe this sounds familiar: You walk into your spiffy new conference room. On one end are two large screens for video conferencing and content projection. If you are lucky, perhaps there's an automatic pan-tilt-zoom camera...

In our 2016/2017 Security and Risk Management Benchmark and Maturity Model, we highlighted a set of "bellwether technologies": Technologies that, we believed, would characterize the most sophisticated security organiztions. By and large, the technologies we selected were, in fact, considerably more likely to be deployed...

I covered VDI closely for many years, several of which were dubbed "The Year of VDI" even though that never quite seemed to gel. Our 2014-2015 Enterprise Technology Benchmark showed VDI adoption by nearly 70% of enterprises, and more importantly VDI use spreading inside those companies to steadily...

Unless you've been living under a rock for the past 8 years, you've been exposed to the concept of IoT. For enterprise organizations, it's a key component of Digital Transformation (DT), primarily because it enables companies to capture huge amounts of data. And "data has value" is one...

If you're active in the cybersecurity field, chances are you've seen, heard, talked about or experienced the paucity in trained cybersecurity professionals. Predictions vary, but Cisco estimates there will be a global skills shortfall of around 2 million by 2019; other estimates are even highter...

Vidyo's announcement yesterday of a Video Platform-as-a-Service offering reflects a growing change in how enterprises and service providers can deliver communications services like voice and video. Gone are the days when using UC services required dedicated desktop and mobile applications. Now, thanks to APIs, and...

My morning cybersecurity alert scan uncovered this gem by CPA Joel Lanz on how to budget for cybersecurity. He makes a lot of excellent points. My favorite is being able to document that you've deployed, used, and benefitted from your previous investments in cybersecurity technology. Many...

I recently read an extremely provocative article on the topic of what information major providers--including Microsoft, McAfee, and others--are routinely capturing from their customers. Some of it may appear benign, and the article is focused on consumers, who bear the brunt of the information exposures. The companies...

Earlier this week I wrote about steps that infosec managers can take to protect enterprise organizations against ransomware. Today, I'd like to focus on the third of those steps: Employee education. A reminder: Ransomware isn't a trivial problem. A study by Kaspersky Labs found that 42% of...

There's a great recent piece in BankInfo Security on "the top four questions the board should ask the CISO". I like it because not only is it insightful, but it also serves as a fantastic advertisement for Nemertes' services. Lest anyone forget, we are in the business...