Security for Your Security
Oliver deGeest
Security for Your Security

Consensus, or at least the mutual acceptance of certain fundamental principles is rare across academia; rather, through dialogue and debate, individual viewpoints are challenged and progress occurs. The one exception, however, is the common pursuit to better predict and understand the future by first examining the past. With the benefit of hindsight, it is argued, individuals can spot trends to avoid pitfalls and better inform their decision making.  In...

READ MORE
The Complexity Gap
Josh Mayfield
The Complexity Gap

Enterprise Strategy Group (ESG) has been one of several organizations tracking the cybersecurity skills shortage and they have been sounding an alarm for many years. While a few tactical programs have attempted to address this shortfall, ESG views them more as lip service rather than a real solution. Alarmingly, the situation appears to be getting much worse—so much so that ESG and others now believe that the growing cybersecurity...

READ MORE
Reinforce Learning with Summer Device Programs
Harold Reaves
Reinforce Learning with Summer Device Programs

Earlier this month, I wrote about how an end-of-year device collection policy may be an unnecessary drain on IT resources. With the support of endpoint tools, districts can perform remote device maintenance, keep track of device inventory and automatically enforce compliance with student privacy regulations such as the Children’s Internet Protection Act (CIPA). With these tools in place, it also becomes possible to support a year-round 1:1 program that...

READ MORE