New Flight Plans: Edge computing company finds success in Indianapolis

Cloud computing Infographic 10 steps pixel design.Cloud Backup, data center, SaaS, Service provider icons

We write a lot about how the Midwest is a better place to start a business than the coastal hubs. But this time we asked someone who has started businesses in Palo Alto, Calif., and Indianapolis. Flyover Future founder Tom Cottingham spoke with CEO and founder of Scale Computing Jeff Ready about edge computing, the Indianapolis ecosystem,…

Read More

Keep your organization safe with a password manager

By guest columnist Carlota Sage In my series so far, we’ve discussed choosing your productivity platform, turning on multi factor authentication (MFA), and how to communicate to users that you are turning off IMAP and POP. This week, I’ll discuss password managers. When you don’t want people just wandering into your house, you lock the…

Read More

Cybersecurity is a relay race, here is how you can train for it

By Carlota Sage, guest columnist In my series so far, we’ve discussed choosing your productivity platform, turning on multi factor authentication (MFA), and how to communicate to users that you are turning off IMAP and POP. This week, I’ll address security awareness training. I like to tell employees and internal users that cybersecurity is a…

Read More

Address users impacted by IMAP and POP turn-offs

By Carlota Sage, guest columnist In my series so far, we’ve discussed choosing your productivity platform and turning on multi factor authentication (MFA). But in order for MFA to fully protect your email platform, you need to turn off IMAP and POP – both of these bypass MFA when logging into email. Last week, I…

Read More

Reducing the friction of MFA rollout

data privacy strategy

By Carlota Sage, guest columnist You likely already know that multi factor authentication (MFA) is an authentication method requiring two or more different elements for gaining access to resources. MFA adds an extra layer of security to ensuring your users are who they say they are. But does your internal audience understand the WHY of…

Read More

Choosing your email and productivity suite

By Carlota Sage, guest columnist In my last article, I listed six things an organization can do to immediately improve security. I’ll spend the next six articles going into detail for each item on that list, starting with the most basic and most critical piece of business infrastructure: your email and productivity suite. In this…

Read More

Six things you can do right now to improve your organization’s security

cybersecurity

By Carlota Sage, guest columnist As CIOs, you’re tasked with securing your organization long before you’re given a budget for security tooling and personnel. Following are some things you can do for an incremental or small spend that can have a big impact on securing your organization. Notice I didn’t say free? Even when I…

Read More

Newly designed government website enhances user experience

All of us know how frustrating it can be navigating through government websites. Most do not seem to be designed with user experience in mind. Recently one of Flyover Country’s fastest growing cities engaged with Net Tango to tackle the problem of user experience and web site interfaces. Net Tango recently finished the project, which…

Read More

Carlota’s Way: Sage vCISO Advice

Once upon a time, I wanted to be a CIO. At that point, I had spent my 15+ years in tech bouncing between IT Operations and Support Operations, and I found that the leaders I appreciated most – the ones I most wanted to emulate – were the CIOs. The best CIOs were tech savvy,…

Read More

Finding underrepresented tech talent

For company leaders, IT managers, and recruiters, finding tech talent is most likely top of your list. It can be hard to find tech talent, but there are great organizations that can help. Per Scholas is a national nonprofit that advances economic equity by providing technology skills training to the traditionally underrepresented. With campuses already…

Read More

FIDO offers alternatives to password protection

cybersecurity

Last week’s Data Strategy Office Hours with Debbie Reynolds was a trove of information around data security and authentication methods. In case you weren’t able to make it to the event, here are some of the highlights of the discussion. The death of passwords Office Hours kicked off with a discussion around the FIDO Alliance’s…

Read More

Team building is a continuous process of learning

Robert Buckingham, Senior Director of Information Systems at Presbyterian SeniorCare in Pittsburgh, knows something about building an IT team. He was the first IT person brought on board almost seven years ago when Presbyterian SeniorCare came to a point where they needed to take better advantage of technology in order to grow the business and…

Read More

A look at neurodiversity on an IT team

We’ve talked a lot in our interviews about best practices for selling tech to the C-suite through good communication. On the other side of the management coin is understanding how the members of your team think and what their strengths and weaknesses are. Neurodiversity There’s been an increase in dialogue around the importance of diversity…

Read More

Practical advice for getting cybersecurity funding

In our feature interview last week, we talked about the importance of communication when selling the C-suite on risk management. This week, we talk to Carlota Sage, a virtual CISO (CISO as a Service), about more tactical approaches to use in the risk funding discussion. You’re a proponent of IT learning the business rather than…

Read More

Selling risk management to the C-suite

How do you explain the risk surrounding something that hasn’t happened yet? How do you speak “the language of the c-suite” in order to set up risk management measures in the enterprise? Those are a couple of questions we put toward Chris Roberts in this Q&A. Roberts is a security advisor and former hacker who…

Read More