Introducing Zero-Trust Access

Introducing Zero-Trust Access

Introducing Zero-Trust Access   Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...

A Lesson to Learn – If it is Connected It can Be Hacked

A Lesson to Learn – If it is Connected It can Be Hacked I remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product...