This blog post was authored by Uma Ramanathan, FAIA, LEED AP, Principal and Leader of Pediatric Healthcare, Shepley Bulfinch. At Shepley Bulfinch we recognize the critical importance of engaging ...
Sal Rehmetullah is the founder and CEO of Worth, a technology company focused on building the next generation business credit score. If you've ever applied for a small-business loan or opened a new ...
Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
It always takes two for a phishing attack to work – an attacker to send the bait and an insider to take it. Almost every organization carries out some form of security and awareness training (SAT) to ...
I was first introduced to the limitations of ‘end user’ thinking a decade ago when I managed the rollout of an oil & gas exploration toolset. I expected clear processes and defined user roles. Instead ...
Password reuse continues to be a threat to companies everywhere—a recent report found that 64% of people continue to use passwords that have been exposed in a breach. Poor password hygiene by ...
Doug Bonderud is an award-winning writer capable of bridging the gap between complex and conversational across technology, innovation and the human condition. Network downtime is costly for businesses ...
Debate and discussion around data management, analytics, BI and information governance. So, what is the problem? Some of the historical frustrations with ERP systems include: it is clunky with manual ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results