-
Podcast: The Open Source Advantage – Univention on Building a Company Around Open Source
Building out technology infrastructure for many companies is a huge challenge. Take a dive into it with the FUTR podcast.
-
Take Control Of User Identities
Regardless of AI advances, user identities are still crucial in any business. Why not rely on free services like logging…
-
Podcast: Using Open Source Linux-based Software for Identity Management
Usernames and Passwords are the cornerstones of identity management. What is the future for schools and workplaces? Find out!
-
Podcast: Protecting Your ML From Phishing And HackersPodcast:
ChatGPT and Pattern recognition pose new challenges to cybersecurity, passwords, and IT governance. Learn more in this week’s Adventures in…
-
Expert Panel: Recommended Ways For Consumers To Better Protect Their Privacy Online
Many of us spend hours each day online. Find out how attaching a price to your data can help improve…
-
Expert Panel: 16 Tech-Related Risk Factors Company Executives Often OverlookExpert Pannel:
Technology is interwoven with the majority of business processes these days, and while that comes with big benefits, it also…
-
Be Safe: Take Control of your Digital Identity Now
Data breaches are a Weekly ritual. Here are three easy steps to take care of your digital identity and why…
-
Why should we care about digital identities?
In a world where our digital accounts, our digital identities, get stolen by the second, we should protect them from…
-
Great Expectations: Solving The Pain Points Of Managing User Identities
When it comes to managing user identities and logging into IT systems, different stakeholders have different expectations. For starters, employees…
-
NACD: Three Action Items to Get Started with Better Cybersecurity Oversight
Boards often delegate oversight of the cybersecurity strategy to executives, outside consultants, or at most one board member. It is…
