#education #womenintech #IT
Cloud computing, Information security, Security, Computer security, National security, Leadership

Leadership, Security, Communication: The Three COVID Coping Strategies For Education

On Oct 1, 2020
@YuHelenYu shared
Pleased to share my perspectives on What strategies and tactics #IT leaders in #education should take to cope with the pandemic? TY @CIOonline, @dell and @IDGTechTalk. #womenintech @AudreyDesisto @willkelly @AnnaFrazzetto @JonesBaraza @TriciaKicksSaaS https://t.co/epEiLlGlwQ
Open

The pandemic response will catalyze changes for years to come

www.cio.com
On Oct 1, 2020
@YuHelenYu shared
Pleased to share my perspectives on What strategies and tactics #IT leaders in #education should take to cope with the pandemic? TY @CIOonline, @dell and @IDGTechTalk. #womenintech @AudreyDesisto @willkelly @AnnaFrazzetto @JonesBaraza @TriciaKicksSaaS https://t.co/epEiLlGlwQ
Open

Information Security Strategy: The Top IT Issue of 2020

Information Security Strategy: The Top IT Issue of 2020

Information Security Strategy is top of mind for thousands of companies, large and small, across the globe. In 2020, it'll be the key concern in higher ed.

Trust technologies for security assurance

Trust technologies for security assurance

In this Ericsson Research Blog post, Ben Smeets, presents three powerful trust technologies that facilitate network security assurance.

UES and the Quest for Ubiquitous Security

UES and the Quest for Ubiquitous Security

The expansion of what we consider to be an endpoint has sparked the need to have an umbrella under which to manage our growing list of components in constant motion. Thus, the concept of ...

Modernizing IT for the Mission: Digital Transformation and the Public Sector

Modernizing IT for the Mission: Digital Transformation and the Public Sector

Where are CIOs focused as they look to the future of public sector digital transformation? Hear from IT leaders on cloud, security and emerging technology.

Enhance IT Resiliency and Business Continuity

Enhance IT Resiliency and Business Continuity

IBM Think Digital will take place May 5–6, 2020 with a focus on responding to the impacts of COVID-19. Explore new ways of working, solve the most pressing issues facing business and ...

The EdTech migration caused by remote learning is creating chaos for district IT managers

The EdTech migration caused by remote learning is creating chaos for district IT managers

The EdTech migration caused by remote learning is creating chaos for district IT managers The EdTech migration started before the COVID-19 crisis, but the pandemic forced school districts ...

Digital Transformation: “It Isn’t a Technology Thing”

Digital Transformation: “It Isn’t a Technology Thing”

So what, exactly, are the most important skills and strategies that IT leaders need to tackle digital transformation? That’s the question we posed recently to members of the IDG Influencer ...

How to Seamlessly Evolve DevOps Into DevSecOps

How to Seamlessly Evolve DevOps Into DevSecOps

As DevOps evolved, it became obvious that it was about more than just software development and operations management. With each new story of a massive data breach and its catastrophic ...

The challenges and opportunities of shadow IT

The challenges and opportunities of shadow IT

The shadow IT genie is out of the bottle and offers benefits and threats. Learn some tips from the experts on how to effectively harness shadow IT in your company.

Cloud tops the menu in 2020, with helpings of HCI, security and 5G

Cloud tops the menu in 2020, with helpings of HCI, security and 5G

We ask the channel what technologies and trends they see dominating in 2020 – cloud tops the list, with hyper-convergence, security and 5G also featuring.

Why Campuses Must Secure Their Networks in an Increasingly Cloud-Based World

Why Campuses Must Secure Their Networks in an Increasingly Cloud-Based World

The world is becoming increasingly interconnected and access to information is more readily available, which can put students and institutions at risk.

2019 cyber-security predictions - Pandora's box of ills - but Hope remains

2019 cyber-security predictions - Pandora's box of ills - but Hope remains

From AI-driven chat-bots to Zero-day mining as a service, via Fuzzing and the impact of 5G, the successes and failures of GDPR, loss of faith in the public internet, dire warnings on ...

The 22 Best Endpoint Security Companies for 2020

The 22 Best Endpoint Security Companies for 2020

Who are the 22 Best Endpoint Security Companies for 2020? We highlight some of their key capabilities and their other features.

HECVAT toolkit helps higher education institutions assess cloud adoption risks

HECVAT toolkit helps higher education institutions assess cloud adoption risks

Higher education institutions are increasingly adopting third party and cloud services. HECVAT is a toolkit that can help them assess cloud adoption risks.

Week in Review: IoT, Security, Auto

Week in Review: IoT, Security, Auto

Data breach & cybersecurity updates; mobility report; CrowdStrike IPO; M&A