ITSR Featured Interview
The Compensation Conundrum: How to use data to hire and keep staff
We recently chatted with Raleen Gagnon, VP and general manager of Total Talent Intelligence at Magnit, about the challenge of finding skilled candidates to fill open positions. Can you compete…
Read MoreThe Compensation Conundrum: How to keep your hiring competitive in today’s tight job market
Last week, we chatted with Raleen Gagnon, VP and general manager of Total Talent Intelligence at Magnit, about the challenge of finding skilled candidates to fill open positions. Can…
Read MoreCybersecurity leaders: Communication with stakeholders is key
Cybersecurity leaders need to understand complex cybersecurity principles. They should have a knowledge of risks, attacks, and how to mitigate attacks. But they should also have a good knowledge of…
Read MoreDevSecOps: Why it’s important to your cybersecurity and software development landscape
“Hardware and software should be treated together, integrated with cybersecurity early and frequently.” ― Linda Rawson, author and founder of DynaGrace You’ve likely heard of DevOps –…
Read MoreWomen in cybersecurity: How one woman persisted to live her dreams
Tosin Ajayi moved to the United States from Lagos, Nigeria, in 2009 at the age of 20. Two years ago, she was able to land her dream job at…
Read MoreHow HCI by Scale Computing and Prosource helped this architecture firm do the important work
Image: metamorworks/ShutterstockWhen building or maintaining a network and data storage architecture, you have to think about a lot of things. Unfortunately, one of those things is maintenance. You have to…
Read MoreWhat is HCI? A beginner’s intro to hyper-converged infrastructure and why you might need it
You may have heard about a type of infrastructure that sounded really cool but you’re not sure what it means and why it might be right for your business. Hyper-converged…
Read MoreThe uphill battle of hiring tech talent: What’s your edge?
Today’s job market is a boon for those looking for jobs. But for businesses trying to hire and keep tech talent, it’s a struggle – especially for technology companies. Though…
Read MoreBlack Hat and DEF CON 2022: Hacking tractors and satellites, and the cyberwar in Ukraine
The annual Black Hat cybersecurity conference and DEF CON hacking conference in Las Vegas celebrated its 25th anniversary this month. The conferences began in 1997. To get a sense of…
Read MoreCybersecurity: CISA releases top malware strains report
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) released a report on Aug. 4 listing the top malware strains experienced in 2021. As always,…
Read MoreNew Flight Plans: Edge computing company finds success in Indianapolis
We write a lot about how the Midwest is a better place to start a business than the coastal hubs. But this time we asked someone who has started businesses…
Read MoreNew Flight Plans: A CISO’s advice for Midwesterners to stay safe – ask more questions
Knowing what your company needs to stay secure is not easy. Do you need multiple, comprehensive tools? Do you need to spend a fortune on consultants? Can one tool do…
Read MoreNew Flight Plans: Expert talks politics in relation to security and why he hates Cybersecurity Awareness Month
Why would a political scientist be the go-to guy for cybersecurity? Well, it turns out there’s a lot of crossover. That’s what Fast Future’s founder Tom Cottingham found out when…
Read MoreNew Flight Plans: The future of cybersecurity, according to a professor at Carnegie Mellon
We talk with Matthew Butkovic, from the Software Engineering Institute at Carnegie Mellon University, about the future of cybersecurity.
Read MoreNew Flight Plans: Data privacy, the future of CIOs and how soft skills can help your career
How will Apple’s and Google’s new data rules affect your business? Can you deal with the most difficult person in an organization? What will the future of CIOs look like?…
Read MoreKeep your organization safe with a password manager
By guest columnist Carlota Sage In my series so far, we’ve discussed choosing your productivity platform, turning on multi factor authentication (MFA), and how to communicate to users that you…
Read MoreCan “data stakeholder” thinking be a winning data privacy strategy for organizations?
By guest writer Debbie Reynolds In 2020, I created a five-minute video about data privacy and trust. I introduced the notion of the “rise of the individual.” The “rise of the…
Read MoreCybersecurity is a relay race, here is how you can train for it
By Carlota Sage, guest columnist In my series so far, we’ve discussed choosing your productivity platform, turning on multi factor authentication (MFA), and how to communicate to users that you…
Read MoreAddress users impacted by IMAP and POP turn-offs
By Carlota Sage, guest columnist In my series so far, we’ve discussed choosing your productivity platform and turning on multi factor authentication (MFA). But in order for MFA to fully…
Read MoreReducing the friction of MFA rollout
By Carlota Sage, guest columnist You likely already know that multi factor authentication (MFA) is an authentication method requiring two or more different elements for gaining access to resources. MFA…
Read More