Joshua Weinberger

Assistant Editor[email protected]After being on staff at The New Yorker for five years, Josh later traveled the world, hitting all seven continents in a single year. At Yale University, he majored in American Studies, English, and Theatre Studies.

Five Steps to a Solid Security Foundation

Managing enterprise security is one of the most complex and time-consuming jobs imaginable. However, applying the simplest and most basic security measures will protect companies from close to 90...

Do You Feel Secure?

Security, unlike beauty, is not in the eye of the beholder. Difficult as it is to measure, security is best described as an absence of vulnerability—and your organization is almost...

Tool: Benefits of Managing Invoices Internally

Forget paper cuts. Reducing the manual printing, mailing and processing of invoices with an electronic invoice presentation and payment (EIPP) system may help your company stanch some financial bleeding.This...

Numbers Never Lie, Unless You Ask

Im a statistician by training, so numbers arent abstractions to me. Theyre more than just digits—they represent real things.In a training program at Ford in the late 60s, I...

Is Your RFP a Recipe For Problems?

There are many ways to gauge the success of a project. But how do you measure the success of the request for proposal (RFP) that outlines the project? .If...

Latest Posts

Top Cloud Service Providers & Companies

Cloud computing providers play a foundational role for businesses. Virtually every enterprise uses cloud computing in some manner, whether it’s to deliver key infrastructure...

The Role of Data Governance in Effective Data Management

I spoke with four industry experts about the growing challenges in data governance, spotlighting which issues need to be resolved for better data management. The...

Edge Data Fabric: What It Is, Why It Matters

To generate richer and more timely insights, enterprises are using increasing amounts of data. Expect that trend to continue. An IDC model projects that...

How to Encourage a New Generation of Leaders in the Remote Workplace

Companies are starting to finalize their long-term work plans, with many choosing to stay remote for the foreseeable future. The flexible, remote work option will...

F5 Acquires Threat Stack, Continuing Its Transition to a Security Company

F5 has announced an agreement to acquire Boston-based Threat Stack for $68M. The purchase of Threat Stack is F5’s fourth acquisition in the past...