article thumbnail

CIOs Deal With Password Lockout Challenges

The Accidental Successful CIO

Accessing a system should not be a challenge for users Image Credit: Les Orchard One of the things that a CIO has to do is to deal with a long list of complaints from users about how the company’s technology works. Fairly high on this list at most companies is the problem with password lockouts.

article thumbnail

3 Questions That Every CIO Should Be Asking About Clouds (a chief information officer needs an IT strategy to create IT alignment)

The Accidental Successful CIO

Cloud computing has almost become a part of the definition of information technology. This capital expense can be avoided if instead of buying more servers a CIO simply subscribes to more cloud computing resources when it’s time to expand the company’s IT infrastructure. I love clouds, you love clouds, we all love clouds.

Cloud 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How CIOs Can Boost Their IT Budgets Even In Hard Time (a chief information officer needs an IT strategy to create IT alignment)

The Accidental Successful CIO

There are a lot of different costs that all seem to contribute to the definition of information technology: server, networks, applications, developers, system administrators, etc. What this means is that if a CIO is going to meet the IT needs of the company, then they are going to need more funding. Mobile As A Driver.

Budget 100
article thumbnail

The Challenges in Building Digital Trust

SecureWorld News

And how do you trust a company that is silently tracking your movements every day, collecting data on you, and not telling you what they do with that data? With our digital global economy being founded on trust, we need to establish a meaningful definition of "digital trust." Let's start with a quick story.

article thumbnail

Years of Research Reveals Holy Grail of Password Strength

SecureWorld News

The researchers start their new paper on passwords by explaining that everyone on the secure and usable password quest has lacked "empirically evaluated and definitive guidance" on password usage and policies—until now. Password best practices: 10 years of research. Blocklists. Is your quest finally over?

article thumbnail

DevOps Chat Podcast: $2M DARPA Award Sparks Behavior Testing With ForAllSecure's Mayhem Solution

ForAllSecure

It would definitely make sense—makes more sense there. You’ve stepped out of CMU to set up this company, ForAllSecure. So, you’re dealing with lots of layers of companies that are working as part of the government team. One of the things we participated in was, DARPA had a big autonomous Cyber Grand Challenge.

Devops 52
article thumbnail

DevOps Chat Podcast: $2M DARPA Award Sparks Behavior Testing With ForAllSecure's Mayhem Solution

ForAllSecure

It would definitely make sense—makes more sense there. You’ve stepped out of CMU to set up this company, ForAllSecure. So, you’re dealing with lots of layers of companies that are working as part of the government team. One of the things we participated in was, DARPA had a big autonomous Cyber Grand Challenge.

Devops 40