-
How To Win In The Ongoing Quest For Better IT Compliance
We will see more regulation if companies and leaders don’t change how they handle cybersecurity and data protection.
-
Expert Panel: 15 Intriguing (And Concerning) Facts About Voice-Activated TechExpert Panel:
Voice-activated technology has become prevalent, with devices such as smart speakers and virtual assistants quickly gaining popularity among users.
-
Dapper Data – The Role of Data Analytics in Identity Management
What is the connection between data, identity management, and log files? Find out more with me on the Dapper Data…
-
Identity Management in the Music Industry
The Music industry has strict requirements on cybersecurity. Here is how UCS can help fulfill them and reduce workload with…
-
A Sophisticated Guessing Game
ChatGPT has been the vogue in IT for the last couple of weeks, yet some misuse has slipped through. Find…
-
Podcast: Cybersecurity Hot Takes: LastPass Isn’t the Problem
In a world where password management systems aren’t secure, what should we do about logging in? Explore Single Sign On,…
-
Podcast: The Open Source Advantage – Univention on Building a Company Around Open Source
Building out technology infrastructure for many companies is a huge challenge. Take a dive into it with the FUTR podcast.
-
Take Control Of User Identities
Regardless of AI advances, user identities are still crucial in any business. Why not rely on free services like logging…
-
Podcast: Using Open Source Linux-based Software for Identity Management
Usernames and Passwords are the cornerstones of identity management. What is the future for schools and workplaces? Find out!
-
Podcast: Protecting Your ML From Phishing And HackersPodcast:
ChatGPT and Pattern recognition pose new challenges to cybersecurity, passwords, and IT governance. Learn more in this week’s Adventures in…
