Tune in now to “In Systems We Trust” to get a unique take on identity management and why the human component can’t be seen as separate from the IT-System.
Category: IT Governance
Expert Panel: 20 Common Pieces Of Tech Leadership Advice It May Be Time To Retire
There’s an enormous amount of published leadership advice targeted at tech leaders, with certain tips garnering widespread sharing and acceptance. Not all good!
Unriveted: Tales of Digital Transformation and Cyber Security
Join me on this week’s Unriveted Podcast, where hosts Martin Miller and John Sukup ask the hard questions: “What is your credit card number?”
Top Table: Why Companies Need to Elevate the Role of Their CIO and CISO
In many organizations CIO and CISO play in the second line. There are at least five reasons why they belong at the top table.
Expert Panel: 14 Essential Factors Of Smart Tech Team Vacation Planning
Getting rid of the small, repetitive tasks so you never have to hand them over or touch them again. Thus, it helps reduce the stress around the vacation time.
Passkey Is A Game-Changer—If Three Cybersecurity Problems Are Solved
Human psychology and memory are insufficient to generate and remember good passwords. Will passkeys really be a game-changer? Find Out!
Expert Panel: 20 Tech Vulnerabilities Business And Industry Need To Address Now
Data Portability is a hidden vulnerability that must be part of every risk management. The Forbes Technology Council is featuring 20 tips now on Forbes!
Emotional Rescue: Using Human Nature to Enhance Cybersecurity
Verizon’s Data Breach Investigation Report shows, every year, almost all successful attacks comprise some form of a human component
Expert Panel: 19 Pieces Of Expert Advice For Organizations Launching DevOps ProgramsExpert Panel:
The underlying goal behind embracing DevOps is to streamline and improve the software delivery process by bringing an organization’s teams together.
Expert Panel: 19 Threats To Customers’ Personal Info Companies Shouldn’t Ignore
Access management goes beyond users. Services, Servers, and even workstations should all be part of an Identity management strategy to protect Data and System