-
Unriveted: Tales of Digital Transformation and Cyber Security
Join me on this week’s Unriveted Podcast, where hosts Martin Miller and John Sukup ask the hard questions: “What is your credit card number?”
-
Top Table: Why Companies Need to Elevate the Role of Their CIO and CISO
In many organizations CIO and CISO play in the second line. There are at least five reasons why they belong…
-
Passkey Is A Game-Changer—If Three Cybersecurity Problems Are Solved
Human psychology and memory are insufficient to generate and remember good passwords. Will passkeys really be a game-changer? Find Out!
-
What Does Amazon Do With Your Data?
In the utopia of data privacy, we all would see that our data has value, What Amazon does with our…
-
Expert Panel: 20 Tech Vulnerabilities Business And Industry Need To Address Now
Data Portability is a hidden vulnerability that must be part of every risk management. The Forbes Technology Council is featuring…
-
Emotional Rescue: Using Human Nature to Enhance Cybersecurity
Verizon’s Data Breach Investigation Report shows, every year, almost all successful attacks comprise some form of a human component
-
Podcast: MSP INITIATIVE LIVE WITH KEVIN DOMINIK KORTE FROM UNIVENTION
MSPs are important partners for us at Univention. Today, I enjoyed discussing Identity Management with George Bardissi of the MSP…
-
Expert Panel: 19 Threats To Customers’ Personal Info Companies Shouldn’t Ignore
Access management goes beyond users. Services, Servers, and even workstations should all be part of an Identity management strategy to…
-
Podcast: A Geek Leader 311: Identity Management
Leadership is often defined as inspiring people to do the right thing. Listening, to people is as important for inspiration…
-
Painful Common Password Attacks Vectors
Attacks utilizing user passwords represent 95% of all cyber security incidents. You cannot protect yourself against something you don’t know.…
