-
Why should we care about digital identities?
In a world where our digital accounts, our digital identities, get stolen by the second, we should protect them from…
-
Great Expectations: Solving The Pain Points Of Managing User Identities
When it comes to managing user identities and logging into IT systems, different stakeholders have different expectations. For starters, employees…
-
NACD: Three Action Items to Get Started with Better Cybersecurity Oversight
Boards often delegate oversight of the cybersecurity strategy to executives, outside consultants, or at most one board member. It is…
-
Grit, Vision, Refocus in Life, IT, and the Boardroom
5000..2500..1000..50..10..5..4..3..2..1 Running my first 5k race has been a challenging experience. There were numerous moments when giving up felt like…
-
Free Software to run your Business or Home
Running your personal cloud can be easy. A short presentation on why and what software to use to quickly build…
-
Expert Panel: 16 Issues C-Suite Tech Leaders Must Be Ready To Address With Their Company Boards
When meeting with a C-suite tech leader, an organization’s board is going to want detailed information on how technology initiatives…
-
No More Connection Errors: How To Strengthen Engagement With IT
Many senior executives outside the IT department still see IT as a service provider and not necessarily an integral part…
-
Expert Panel: The Most Dangerous Cybersecurity Threats Revealed By 40 IT Experts
Due to the pandemic, many traditional brick-and-mortar businesses have been forced to digitalize despite not being prepared for it. This…
-
The Hidden Costs of Logging In
My workday probably starts the same way as most people’s. Yet, logging in over and over comes with a hefty…
-
Know Your Part: Why Open Source Should Push For Software Bills Of Materials
Between government mandates and unclear returns on investment, software bills of materials (SBOM) are getting a bad reputation. Yet they…
