Karen Avery

How to Improve Your IT Security Policy: A Six Sigma Approach

You have a security policy. But is it effective? For many companies, chances are the answer is no; more likely, it is slowing down service, increasing costs and disrupting...

How to Improve Your IT Security Policy: A Six Sigma Approach – 2

You have a security policy. but is it effective? For many companies, chances are the answer is no; more likely, it is slowing down service, increasing costs and disrupting...

Latest Posts

Cisco’s Strong Demand Faced Headwinds

This week, network vendor and technology leader Cisco announced its Q3 FY22 earnings results. The company posted revenues of $12.8B, missing consensus estimates by...

Late to the Enterprise AI Party? 3 Ways to Get Started

Even as artificial intelligence becomes a cornerstone of current business, many enterprises are still struggling with how to get started. Those looking at what AI-driven...

Sponsored: Helping Organizations Automate Cybersecurity Across Their Digital Terrains

The digital world is changing, and you need cybersecurity solutions that change with it. Forescout Continuum can help.

Snowflake vs. Redshift: 2022 Data Warehouse Comparison

Data analytics and data management have become crucially important as digital transformation makes business ever more competitive. But with the volume of data to...

Visa’s Michael Jabbara on Cybersecurity and Digital Payments

I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...