article thumbnail

Addressing the insecurity of verified identities

CIO Business Intelligence

Many of today’s most popular forms of identity verification, such as multi-factor authentication (MFA), are hackable. GPP appeared with the release of Server 2008 and allows domain-attached machines to be configured through group policies. I’m not suggesting we let perfect be the enemy of good.

Policies 141
article thumbnail

Rackspace’s Brian Lillie on the importance of leadership principles

CIO Business Intelligence

These thoughtful and reflective experiences allowed me to develop a statement of purpose about the life that I’d like to live, namely, to live a full and authentic life by personally and continually striving, learning, and growing, and by helping others flourish,” he says. CIO, Innovation, IT Leadership, IT Strategy

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Diversity and inclusion: 7 best practices for changing your culture

CIO Business Intelligence

How can you encourage people to be authentic if you’re not allowing them to show off their tattoos or piercings and things like that?” That is all part of being authentic.” Starting my career at a high-profile social networking company, back in 2008 and 2009, I would go into something I called man mode,” says Gascoigne.

Groups 140
article thumbnail

How Blacks in Technology Foundation is ‘stomping the divide’

CIO Business Intelligence

When Greg Greenlee joined the IT industry in 2008, the lack of representation of Black IT professionals among attendees and speakers at tech conferences and events was readily apparent. “It Mentorship as a cornerstone to success For Black IT pros, finding mentorship or sponsorship opportunities in the workplace can be challenging.

article thumbnail

Broadcom’s Approach Towards Delivering Customer Value

CIO Business Intelligence

Additionally, Symantec is a founding member of the Open Cybersecurity Schema Framework and the National Cybersecurity Centre of Excellence, which both are working to develop standards for Zero Trust, a security framework that authenticates and validates user identity and access. He has held this position since March 2006.

Vmware 83
article thumbnail

Top 5 Reasons Why Agile Development Spurs Innovation

Social, Agile and Transformation

I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 and business transformation. ► 2008. (21). Social, Agile, and Transformation. Newer Post.

Agile 105
article thumbnail

Victus pro Scientia Opus -- Food for the Knowledge Worker: SPC 2008 Session -- RMS and SharePoint

Victus pro Scientia Opus -- Food for the Knowledge

Active Directory for authentication 3. A: On the server: it is incorporated into Windows Server 2008 operating system. Enterprise 2.0 Enterprise 2.0 Q: What are the components of RMS? Client workstation containing lockbox, APO, templates 2. Microsoft SQL Server database with configuration data, logging, cached credentials 4.