ITSR Featured Interview
New Flight Plans: Edge computing company finds success in Indianapolis
We write a lot about how the Midwest is a better place to start a business than the coastal hubs. But this time we asked someone who has started businesses in Palo Alto, Calif., and Indianapolis. Flyover Future founder Tom Cottingham spoke with CEO and founder of Scale Computing Jeff Ready about edge computing, the Indianapolis ecosystem,…
Read MoreNew Flight Plans: A CISO’s advice for Midwesterners to stay safe – ask more questions
Knowing what your company needs to stay secure is not easy. Do you need multiple, comprehensive tools? Do you need to spend a fortune on consultants? Can one tool do all the work? The answer you’ll likely get is, “It depends.” Chris Roberts, founder of the HillBilly Hit Squad and CISO at Boom Supersonic, sat…
Read MoreNew Flight Plans: Expert talks politics in relation to security and why he hates Cybersecurity Awareness Month
Why would a political scientist be the go-to guy for cybersecurity? Well, it turns out there’s a lot of crossover. That’s what Flyover Future’s founder Tom Cottingham found out when he interviewed Dr. Richard Harknett, professor and director of the School of Public and International Affairs at the University of Cincinnati. The two chatted about…
Read MoreNew Flight Plans: The future of cybersecurity, according to a professor at Carnegie Mellon
We talk with Matthew Butkovic, from the Software Engineering Institute at Carnegie Mellon University, about the future of cybersecurity.
Read MoreNew Flight Plans: Data privacy, the future of CIOs and how soft skills can help your career
How will Apple’s and Google’s new data rules affect your business? Can you deal with the most difficult person in an organization? What will the future of CIOs look like? These are all important questions we recently asked of global data privacy expert Debbie Reynolds, also known as the Data Diva. She took the time to…
Read MoreKeep your organization safe with a password manager
By guest columnist Carlota Sage In my series so far, we’ve discussed choosing your productivity platform, turning on multi factor authentication (MFA), and how to communicate to users that you are turning off IMAP and POP. This week, I’ll discuss password managers. When you don’t want people just wandering into your house, you lock the…
Read MoreCan “data stakeholder” thinking be a winning data privacy strategy for organizations?
By guest writer Debbie Reynolds In 2020, I created a five-minute video about data privacy and trust. I introduced the notion of the “rise of the individual.” The “rise of the individual” is an expression of the idea that organizations must always consider obligations to their shareholders but must also come to terms with the fact…
Read MoreCybersecurity is a relay race, here is how you can train for it
By Carlota Sage, guest columnist In my series so far, we’ve discussed choosing your productivity platform, turning on multi factor authentication (MFA), and how to communicate to users that you are turning off IMAP and POP. This week, I’ll address security awareness training. I like to tell employees and internal users that cybersecurity is a…
Read MoreAddress users impacted by IMAP and POP turn-offs
By Carlota Sage, guest columnist In my series so far, we’ve discussed choosing your productivity platform and turning on multi factor authentication (MFA). But in order for MFA to fully protect your email platform, you need to turn off IMAP and POP – both of these bypass MFA when logging into email. Last week, I…
Read MoreReducing the friction of MFA rollout
By Carlota Sage, guest columnist You likely already know that multi factor authentication (MFA) is an authentication method requiring two or more different elements for gaining access to resources. MFA adds an extra layer of security to ensuring your users are who they say they are. But does your internal audience understand the WHY of…
Read MoreChoosing your email and productivity suite
By Carlota Sage, guest columnist In my last article, I listed six things an organization can do to immediately improve security. I’ll spend the next six articles going into detail for each item on that list, starting with the most basic and most critical piece of business infrastructure: your email and productivity suite. In this…
Read MoreSix things you can do right now to improve your organization’s security
By Carlota Sage, guest columnist As CIOs, you’re tasked with securing your organization long before you’re given a budget for security tooling and personnel. Following are some things you can do for an incremental or small spend that can have a big impact on securing your organization. Notice I didn’t say free? Even when I…
Read MoreNewly designed government website enhances user experience
All of us know how frustrating it can be navigating through government websites. Most do not seem to be designed with user experience in mind. Recently one of Flyover Country’s fastest growing cities engaged with Net Tango to tackle the problem of user experience and web site interfaces. Net Tango recently finished the project, which…
Read MoreCarlota’s Way: Sage vCISO Advice
Once upon a time, I wanted to be a CIO. At that point, I had spent my 15+ years in tech bouncing between IT Operations and Support Operations, and I found that the leaders I appreciated most – the ones I most wanted to emulate – were the CIOs. The best CIOs were tech savvy,…
Read MoreFinding underrepresented tech talent
For company leaders, IT managers, and recruiters, finding tech talent is most likely top of your list. It can be hard to find tech talent, but there are great organizations that can help. Per Scholas is a national nonprofit that advances economic equity by providing technology skills training to the traditionally underrepresented. With campuses already…
Read MoreFIDO offers alternatives to password protection
Last week’s Data Strategy Office Hours with Debbie Reynolds was a trove of information around data security and authentication methods. In case you weren’t able to make it to the event, here are some of the highlights of the discussion. The death of passwords Office Hours kicked off with a discussion around the FIDO Alliance’s…
Read MoreTeam building is a continuous process of learning
Robert Buckingham, Senior Director of Information Systems at Presbyterian SeniorCare in Pittsburgh, knows something about building an IT team. He was the first IT person brought on board almost seven years ago when Presbyterian SeniorCare came to a point where they needed to take better advantage of technology in order to grow the business and…
Read MoreA look at neurodiversity on an IT team
We’ve talked a lot in our interviews about best practices for selling tech to the C-suite through good communication. On the other side of the management coin is understanding how the members of your team think and what their strengths and weaknesses are. Neurodiversity There’s been an increase in dialogue around the importance of diversity…
Read MorePractical advice for getting cybersecurity funding
In our feature interview last week, we talked about the importance of communication when selling the C-suite on risk management. This week, we talk to Carlota Sage, a virtual CISO (CISO as a Service), about more tactical approaches to use in the risk funding discussion. You’re a proponent of IT learning the business rather than…
Read MoreSelling risk management to the C-suite
How do you explain the risk surrounding something that hasn’t happened yet? How do you speak “the language of the c-suite” in order to set up risk management measures in the enterprise? Those are a couple of questions we put toward Chris Roberts in this Q&A. Roberts is a security advisor and former hacker who…
Read More