K2’s clients have been featured in publications across the globe.TechCrunchRead the roomCyber Sls & MktingVentureBeatThe top 20 zero-trust startups to watch in 2023Enterprise SecurityThe Global Marketing ShowBible of Messages Meets the PESO Model™ - Show #108MarketingMultichannel MerchantCall Center Security Equals Customer SatisfactionEnterprise SecurityDevOps.comDatabase Virtualization – Driving the Next Big TransformationDevOpsVentureBeatHow zero-trust architectures can prevent supply chain attacksEnterprise SecurityConnect WorldThe Cellular-IoT Landscape, 5G Penetration, and What’s in BetweenIoT/Mobile SecurityInfoWorld7 Ways to Reduce Costs with Agile and DevOps DevOpsEnterprise Security TechCEO of Zero-Trust Browser Surf Shares How They’re Working to Secure the New Digital WorkforceEnterprise SecurityT&D WorldTransmit and Distribute Securely: Using IoT to Drive SuccessIoT/Mobile SecurityCybernewsBest IoT security solutions: our top picksIoT/Mobile SecurityYahoo NewsTear-Jerking Video Shows Graduate Break Down After Receiving Portrait Of Her Late FathereCommerceWater OnlineIoT Cellular Connectivity for Optimizing Water Utilities ManagementIoT/Mobile SecurityInfoWorldHow to Minimize New Technical DebtDevOpsInfoQThe Role of DevOps in Cloud Security ManagementDevOpsAxiosAxios Pro RataAg/BiotechForbesMainframes: The Missing Link To Artificial Intelligence?Enterprise TechTDWINew Model9 Report Reveals Disconnect Between Mainframe Modernization Goals and Hybrid Cloud StrategiesCloud/LegacyInfoWorldSoftware Development Coaching Dos and Don’tsDevOpsFood Ingredients 1stWeekly RoundupAg/BiotechSD TimesGet More Value from DevOps - Take the Customer's PerspectiveDevOpsDataBreach TodayKafdrop Flaw Puts Data of 'Major Global Players' at RiskDevSecOpsSC MagazineHow to Stay Safe from the Chinese JavaScript Tetris Surveillance KitCybersecurityNetwork World9 Enterprise Storage Startups to WatchStorageReadWriteIoT - It Just Isn't Safe - But it Can BeIoT/Mobile Sec.Iot for AllComing Soon - IoT in 2022 - and the Year in ReviewIoT/Mobile Sec.SearchAppArchitectureThe Role of DevOps Practices in Application DesignDevOpsThreatpostProtecting Phones from Pegasus-like Spyware AttacksMobile SecurityDevOpsSurvey Finds Widespread Adoption of DevOps in Mainframe SitesCloud/LegacyCleanTechnicaEV Drivers Getting Boost from MOL DriivzAutomotive/EVsComputer WeeklyContainerisation in the EnterpriseDevOpsGestalt ITExecution with Excellence - Accelario on Data Management and Startup GoalsDataOpsAutomotive WorldeMobility and Energy Management Go Hand in HandAutomotive/EVsSearchConvergedInfrastructureEnterprise Technology Trends for 2021 Shaped by COVID-19Cloud/LegacyIoT for AllKnock Out the Six Biggest Threats to Your Cellular IoT DevicesIoT/CybersecurityTravel Ins. Rev.Finding a Doctor AbroadInsurance/TravelAnalytics InsightFive Reasons Why ELT is the Best Way to Move Mainframe Data to the CloudCloud/LegacyNetwork World9 Enterprise Storage Startups to WatchStorageDataversityThe Data-Centric Zero-Trust ParadigmCyber/SoftwareDevElec. Hybrid VehicleThe Future of Powering the EV InfrastructureAutomotive/EVsTechRepublicDigitizing coronavirus contact tracing is essential for reopening the countrySecurity/HealthcareTech Crunch DailyAir Doctor scores $7.8M to connect travellers with local doctorsTravel/HealthcareReutersIsrael's OpenLegacy gets $20 mln investment from Japan's SBISoftwareDevIoT for AllBack in the D.D.o.S.! How Not to Become a Russian Cyberattack ToolIoTUSA Today How to avoid 'Fortnite' V-bucks scams and cyber-criminal schemes CybersecurityFortuneTerm Sheet – Friday, June 1, Venture DealsCybersecurityDevOpsHow to Gain Greater Value from DevOpsDevOpsIndustry WeekRansomware Attacks Hit Manufacturing – Are You Vulnerable?ManufacturingIoT Today Generic Attacks Raise Profile of Industrial Cybersecurity IoTThe New StackHow to Bring Legacy Systems to DevOps SpeedSoftware Channel E2E5 Channel Partner Updates: Friday 01 March 2019ChannelComputer WeeklyWhy Data Sharing is Key to AI in Industry 4.0ManufacturingMSSP AlertManaged Security Services Provider (MSSP) News 05 February 2019CybersecurityInside Big DataThe Secret of Artificial Intelligence RevealedBig DataReutersGloomy Forecast for DavosManufacturingHelpNet SecurityCybersecurity 2019: Predictions you can’t ignoreCybersecurityChannel Partners Online CaaB Takes Its White-Label Cloud Global ChannelIoT AgendaNo Smart Security without IoT ProtocolsIoTIndustrial IoT NewsService Providers: Four Ways to Boost Revenue in the IoT SpaceIoTForbesWith Fake News And Femmes Fatales, Iran's Spies Learn To Love FacebookCybersecurityReutersIsrael's NRGene maps genome for three types of potatoesBiotechNew York Business JournalLeadspace CEO talks up Series C, AI in 2018, and East Coast expansionMarketingInternational Business TimesCopyKittens: Iran-linked cyber espionage group lacks sophistication, but is still successfulCybersecurityBloombergIsraeli Technology Helps Giants Like Monsanto Feed the WorldAg/BiotechLeMagITProtection des postes de travail : l’essentiel sur HysolateCybersecurityBusiness JournalsBiotech Startup Partners with BridgestoneBiotechBroadband TV NewsPixellot and Red Bull Media House stream Beach Volleyball Major SeriesBroadcastingTech AddictsEssence IoT Compatible with Google AssistantIoTVideopopularLa Federación Española de Deportes de Hielo utiliza Pixellot TechBroadcastingEpoch TimesGoogle Pushes Its Intelligent Assistant at CESIoTIFSEC GlobalHow Home Security is Transitioning from a Traditional ‘Passive’ Model to an Interactive ParadigmIoTDark ReadingIranian Cyber Espionage Group CopyKittens Successful, But Not SkilledCybersecurityDrug Development & DeliveryNRGene & Tel Aviv Sourasky Medical Center Collaborate on Parkinson’s GenomesBiotechIoT NowFocusCura adds Essence Care@Home™ solutions to its healthcare offeringsSenior CareReutersBRIEF-Illumina, NRGene collaborate to accelerate development of new molecular breeding tools for cattle to support global food productionAg/BiotechVenture CanvasIsraeli Startup Maps Genome of Cotton, Sweet Potato for Better CropsAg/BiotechBakery and SnacksCereal breakthrough: Scientists unveil wild wheat genome sequence capable of boosting future food productionAg/BiotechCEPro.comInfographic: Millennials, GenX Biggest Adopters of Smart Home DevicesIoTAging in Place Technology WatchEssence New Care@Home Active™ Solution for Comprehensive Mobile Senior CareSenior CareGenomewebIn Brief This Week: Genomic Health, NRGene, Viatar CTC Solutions, and MoreAg/BiotechSeed QuestWild Wheat Genome Sequencing Provides 'Time Tunnel' Capable of Boosting Future Food Production and SafetyAg/BiotechFinancial ITThe Digital Banking (Threat) OpportunitySoftware Dark ReadingThe ROI of Infosec: 11 Dos and Don'ts for Management Buy InCybersecurityRetail Info SystemsData-driven Communications Become Even More CriticalMarketingAgWebBetter Seeds, Faster DeliveryAg/BiotechCSO OnlineHow to Create a Data-centric Security InfrastructureCybersecurityWall Street JournalSmart Home Sensors Keep an Eye on ElderlyIoTForbesHere Are 4 Industries about to be Completely Disrupted by the Smart HomeIoTBBCCould Roaming Rates Be About to Fall?TelecomBaselineA Real-time Analytics Tool Keeps Business RunningBig dataDisruptive ViewsStatus Report: Connected Home Market, WorldwideIoTPointofSaleEpipoli and Sagarmatha Customer-insight Services Strengthen Relationship MarketingMarketingIoT NowWho Are the Smart Home Early Adopters? IoTDataversityCovertix Announces New Crowd-sourced Classification Engine CybersecurityVanilla+Hidden Expenses of Uncontrolled Controlled Customer Roaming Costs Operators MillionsTelecomWirelessStarhome Mach Unveils HD-IoT Platform for Mobile Operators TelecomAsia BiotechBGI Partners with NRGene to Provide Broadest Genomic Analysis AvailableAg/BiotechChannelLifeWebSecure Technologies is Now Official Hexatier ResellerCybersecurityIoT NowCSPs Must Tailor Solutions to Maximize and Monetize IoT ValueTelecomConsumer Goods TechnologyThink People, Not ProductMarketingThe Green SheetMobilize Teams with Sagarmatha to Optimize Shopper ExperienceMarketingAg ProScientists Work Together to Reveal the Genetic Secrets of Durum WheatAg/BiotechInfoSecurity MagazineHow to Run Effective Phishing AssessmentCybersecurityBBCCould Roaming Rates Be About to Fall?TelecomeWeekEnterprise Data Mobility Initiatives: 10 Tips for a Successful RolloutEnterprise MobilitySC MagazineDon't Dismiss Internal Data Breaches as MinorCybersecurityIT WorldBuilding a Developer Ecosystem: What Vendors Do to Attract You to Their PlatformsApp DevSecurityWeekSQL Injection Named Top Database Concern for SMBs in Recent SurveyCybersecurityWiredWhy isn't CRM delivering on its promise?MarketingeWeekNew Big Data and Hadoop Projects: 10 Tips for Keeping on TrackBig DataForbesMating Grid And Cloud Software With HardwareSoftwarePC MagazineAT&T Billing Scam Exploits AngerCybersecurityScientific ComputingIncrediBuild-XGEApp DevInfosecuritySQL Injection Tops SMB Database Security ConcernsCybersecurityDZone Additional Considerations Regarding Application and Data Integration SoftwareNetworkWorldIntegration projects that went terribly wrongSoftwareComputer WeeklyWhat happens inside an API lifecycle?SoftwareElectric VehiclessChile’s Copec Voltex Chooses Driivz to Power EV Charging InfrastructureElectric VehiclesCRNThe 2015 Tech Innovator AwardsChannel