Protecting Corporate Data: Password Strategies

By: Clay Miller, CTO, SyncDog With each passing headline that screams of yet another company hacked, municipality breached, and healthcare system network rendered inoperable, it has become evident to executive leaders that organizations’ data security is a...

Enterprise Data: How Vulnerable Is It?

Posted by Clay Miller, CTO, SyncDog There is an old adage that says “when the tide goes out, you find out who’s swimming naked.” As it turns out, enterprise mobile security has been a party at a nude beach and no one even read the sign. Unfortunately, a recent report...

Here We Go Again – Is Apple Down for the Count?

Post by Clay Miller, CTO, SyncDog Apple’s reputation as a device that is naturally more secure than others has been taking a beating recently and may have just received a knockout blow with the revelation an unpatchable exploit named Checkm8. This exploit is a...

A Holistic Approach to Mobile Threat Defense

Mobile computing has become such an integral part of the work/life environment that people no longer even think about it. Communicating with colleagues, tapping into business applications, and accessing networks from handheld devices is part of everyday life for most...

ET Exchange Summit, June 17-19

SyncDog to the Rockies! Enterprise Transformation Exchange is a hosted summit focused exclusively on bringing enterprise IT decision-makers together with industry experts and solution providers for 2.5 days of peer-to-peer networking and information sharing. For the...