Join me on a webinar about managing secrets such as passwords, encryption keys, API keys, etc. July 17, 2019 – Keeping Secrets, Secret! How to Manage Highly Sensitive Data to Protect Your Organization...
A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how a company looks at staffing and technology investments. There are two basic ways to look at major investments...
In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely impact business operations. Even some technology trade journals seem unable to get through a single issue...
It might seem that way because of how ubiquitous it is, but technology is not really easy. Lots of time has been spent trying to hide the core complexity so that every day users can better experience and manage high-end technology, but at the end of the day, the...
This month in CIO Magazine is a very interesting article on Change Management which points out that truly innovative companies value discipline as much, if not more, than they do freedom and flexibility of execution. And the difference between...