Building a Capital-Efficient SaaS Stack
Here, we share questions to ask and strategies to employ to build and maintain a capital efficient SaaS stack that can scale with your organization’s evolving needs – without blowing the IT budget.
The Security Threat Even a Drone Can’t Spot
Skydio's drones are used to catch physical security threats, but even the best drones can’t spot weaknesses in a company’s IT security.
The IT security problem lurking beneath the job market boom (and bust)
Both onboarding and offboarding scenarios leave opportunities for dangerous IT security problems in tech companies.
Designing a Program that Mitigates the Risks and Costs Associated with Shadow IT
Data breaches, security vulnerabilities, and compliance issues are just some of the problems associated with shadow IT, as well as the potential to violate regulatory requirements and risk being out of compliance.