How You Can Prevent the Next Enterprise Security Breach: Invert the Model

How to Prevent Security Breach

Target, Anthem, JP Morgan, Sony, Home Depot and Ebay – what do they all have in common? All of these companies suffered from a significant data breach, hacking incident or major security compromise.

The biggest victim: you.

The likelihood that you’ve purchased products or used services from any of the above listed companies is relatively high, whether you’ve done so directly or indirectly through corporate partnerships.

Continue reading

Building Strictly for Mobile: The Choice for Startups in Developing Markets

Image courtesy of

With over 2 billion smartphones in use around the world, the growing dominance of mobile technology becomes undebatable.

This is true for consumer use-cases and business use-cases alike. People are increasingly dependent on mobile apps and technology to get things done in a personal and professional context.

For developing economies, this reliance is on an entirely different spectrum. Mobile is everything.

Continue reading

Predicting What’s After the Mobile-App Era

Beyond Mobile Apps

First it was the browser. Now it is mobile apps. What will the next iteration of content consumption look like?

I was recently diving into some interesting statistics that illustrated just how rapid the mobile growth trend is occurring. While doing so, I couldn’t help but think that a new experience will emerge that will change how we receive and take in content.

We all know that eyes and attention are increasingly going to mobile devices, whether it be to phones or tablets. This trend will not change for the foreseeable future.

Continue reading