-
Great Expectations: Solving The Pain Points Of Managing User Identities
When it comes to managing user identities and logging into IT systems, different stakeholders have different expectations. For starters, employees…
-
NACD: Three Action Items to Get Started with Better Cybersecurity Oversight
Boards often delegate oversight of the cybersecurity strategy to executives, outside consultants, or at most one board member. It is…
-
The Hidden Costs of Logging In
My workday probably starts the same way as most people’s. Yet, logging in over and over comes with a hefty…
-
Protecting The Moat: Why User IDs Should Be A Top Concern For Management
Identity and intellectual property theft are rising globally, and many companies are taking new steps to mitigate the problem. With…
-
Why You Should Approach IT Like Rocket Science: Five Things To Learn From Satellite Companies
It’s getting crowded in the skies. Companies are busy launching small satellites into low-earth orbit on a weekly schedule. SpaceX…
-
The Cost Of Logging In
My workday probably starts the same way as for most people. I turn on my computer and enter the first…
-
5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity
Over the last few years, we have seen a change in the perception of big tech companies and proprietary software.…
-
Cloud Data With A Chance Of Pitfalls
In the age of cloud computing, IT seems extremely simple. With a few clicks, you acquire a new service for…
-
Staying Out Of Terrestrial Trouble
How Satellite Companies Can Take Effective Steps On The Ground To Improve Their Data Security It was a slightly sensationalist…
