-
Podcast: Using Open Source Linux-based Software for Identity Management
Usernames and Passwords are the cornerstones of identity management. What is the future for schools and workplaces? Find out!
-
Podcast: Protecting Your ML From Phishing And HackersPodcast:
ChatGPT and Pattern recognition pose new challenges to cybersecurity, passwords, and IT governance. Learn more in this week’s Adventures in…
-
Expert Panel: 15 Ways To Leverage Lessons Learned From ‘Innovation Powerhouses’
There are companies big and small that are well-known for never resting on their laurels, but always innovating and improving.…
-
Podcast: Data Privacy Detective – Identity Management
Digital identities can be managed to increase security and minimize data breach risk. I had the pleasure of speaking to…
-
Flow And Automation Against The Glut Of IT
Today, the average business has over 187 applications, requiring users to switch context 1,200 times. How can CIOs and IT…
-
Expert Panel: 16 Tech-Related Risk Factors Company Executives Often OverlookExpert Pannel:
Technology is interwoven with the majority of business processes these days, and while that comes with big benefits, it also…
-
Free Software to run your Business or Home
Running your personal cloud can be easy. A short presentation on why and what software to use to quickly build…
-
Expert Panel: 16 Issues C-Suite Tech Leaders Must Be Ready To Address With Their Company Boards
When meeting with a C-suite tech leader, an organization’s board is going to want detailed information on how technology initiatives…
-
No More Connection Errors: How To Strengthen Engagement With IT
Many senior executives outside the IT department still see IT as a service provider and not necessarily an integral part…
-
Expert Panel: The Most Dangerous Cybersecurity Threats Revealed By 40 IT Experts
Due to the pandemic, many traditional brick-and-mortar businesses have been forced to digitalize despite not being prepared for it. This…
