Tune in now to “In Systems We Trust” to get a unique take on identity management and why the human component can’t be seen as separate from the IT-System.
Category: Cybersecurity
Expert Panel: 20 Common Pieces Of Tech Leadership Advice It May Be Time To Retire
There’s an enormous amount of published leadership advice targeted at tech leaders, with certain tips garnering widespread sharing and acceptance. Not all good!
Unriveted: Tales of Digital Transformation and Cyber Security
Join me on this week’s Unriveted Podcast, where hosts Martin Miller and John Sukup ask the hard questions: “What is your credit card number?”
Top Table: Why Companies Need to Elevate the Role of Their CIO and CISO
In many organizations CIO and CISO play in the second line. There are at least five reasons why they belong at the top table.
Passkey Is A Game-Changer—If Three Cybersecurity Problems Are Solved
Human psychology and memory are insufficient to generate and remember good passwords. Will passkeys really be a game-changer? Find Out!
What Does Amazon Do With Your Data?
In the utopia of data privacy, we all would see that our data has value,
What Amazon does with our data? Learn more in my recent interview on the Observer!
Expert Panel: 20 Tech Vulnerabilities Business And Industry Need To Address Now
Data Portability is a hidden vulnerability that must be part of every risk management. The Forbes Technology Council is featuring 20 tips now on Forbes!
Emotional Rescue: Using Human Nature to Enhance Cybersecurity
Verizon’s Data Breach Investigation Report shows, every year, almost all successful attacks comprise some form of a human component
Podcast: MSP INITIATIVE LIVE WITH KEVIN DOMINIK KORTE FROM UNIVENTION
MSPs are important partners for us at Univention. Today, I enjoyed discussing Identity Management with George Bardissi of the MSP Initiative.
Expert Panel: 19 Threats To Customers’ Personal Info Companies Shouldn’t Ignore
Access management goes beyond users. Services, Servers, and even workstations should all be part of an Identity management strategy to protect Data and System