In today’s tech-driven economy, a CEO depends a lot on their chief information officer.
Category: IT Governance
Take Control Of User Identities
Regardless of AI advances, user identities are still crucial in any business. Why not rely on free services like logging in with social media. Find out more!
Podcast: Using Open Source Linux-based Software for Identity Management
Usernames and Passwords are the cornerstones of identity management. What is the future for schools and workplaces? Find out!
Podcast: Protecting Your ML From Phishing And HackersPodcast:
ChatGPT and Pattern recognition pose new challenges to cybersecurity, passwords, and IT governance. Learn more in this week’s Adventures in Machine Learning!
Expert Panel: 15 Ways To Leverage Lessons Learned From ‘Innovation Powerhouses’
There are companies big and small that are well-known for never resting on their laurels, but always innovating and improving. Some companies, such as Apple and Google, are viewed as leaders in their respective spaces because they are consistently at the forefront of many of the world’s most important technological advancements, always impressing consumers with…
Podcast: Data Privacy Detective – Identity Management
Digital identities can be managed to increase security and minimize data breach risk. I had the pleasure of speaking to the Data Privacy Detective in his latest Podcast. Join me as we explore the questions: What is identity management? How can an automated approach help increase cyber security? What should consumers demand from companies and…
Flow And Automation Against The Glut Of IT
Today, the average business has over 187 applications, requiring users to switch context 1,200 times. How can CIOs and IT departments quickly take back control?
Expert Panel: 16 Tech-Related Risk Factors Company Executives Often OverlookExpert Pannel:
Technology is interwoven with the majority of business processes these days, and while that comes with big benefits, it also adds big risks. My answer and the contribution of 15 other members of the Forbes Technology Council: Now on Forbes!
NACD: Three Action Items to Get Started with Better Cybersecurity Oversight
Boards often delegate oversight of the cybersecurity strategy to executives, outside consultants, or at most one board member. It is possible to take your oversight to the next level with a few simple changes.
Free Software to run your Business or Home
Running your personal cloud can be easy. A short presentation on why and what software to use to quickly build a Home or SMB Server with UCS.