Security should always be on your mind when online. Whether at a larger organizational level or at an individual level, you should always have at least some way to keep your data safe. And the more data you must protect, the more important the act of data protection becomes. You should be asking yourself how […]
Explore More
The job market for identity and access management professionals remains strong, but to ace the interview and get the job, you must be prepared for some tough IAM interview questions. Some organizations are looking for IAM analysts to oversee day-to-day operations; others are in a building phase and need IAM engineers and IAM architects. But […]
Explore More
It’s important to find the silver lining in any negative situation — and this continues to ring true during a global pandemic. As we approach the always-competitive U.S. election in November, politics aside, there is a silver lining there, too. This year, even with COVID-19 concerns increasing the adoption of mail-in voting and chief election […]
Explore More
The sting of the COVID-19 global pandemic forcing many into remote work — combined with the trend of BYOD in the enterprise — is changing the dynamic of the mobile device convergence. The concept of digital and technological convergence, combining the computing power of a desktop, a smartphone and a tablet into one device, goes […]
Explore More
A security champions program is critical to maintaining an organization’s security culture, but during the COVID-19 shutdown, teams could find themselves working with one hand tied virtually behind their backs. Telework arrangements, online meetings, collaboration software and extensive smartphone use can keep an organization running, but they can’t recreate the casual interactions that are an […]
Explore More
There’s a reason why a computer virus is called a “virus,” as they have many similarities to medical viruses. Notably, as medical viruses can have a severe impact on your personal health, a computer virus can severely impact the health of your business. In today’s digital world, a computer virus, a “wormable” remote code execution […]
Explore More
Having employees connect remotely to your corporate network is not new. Most companies use cloud-based software-as-a-service (SaaS) applications and have some virtual private network (VPN) or remote desktop capabilities to enable field sales staff or roaming users to connect to essential applications and data. However, few — if any — companies were prepared for our […]
Explore More
What do NVIDIA’s Jensen Huang, Salesforce’s Marc Benioff and Microsoft’s Satya Nadella have in common? They were all deemed the greatest business leaders of 2019, according to Harvard Business Review’s “The CEO 100” list. But another commonality they share is that each have had mentors to help guide them through their careers in technology and […]
Explore More
Years ago, when users required access to a specific system, application or other corporate resource, they were provided a username and password tied to the access level they needed. While this was a viable option when the number of IT services was small, it didn’t take long before the number of accounts a user had […]
Explore More
In early May, hackers infiltrated the Baltimore, Md., computer network. The ransomware attack ended normal business operations, interrupted critical city services, cost the city millions and inconvenienced hundreds of thousands of residents. Baltimore joined the list of other cities that have fallen victim to serious ransomware threats that affect business and commerce. While ransomware attacks […]
Explore More