Academic Industry Alignment A Formula for Success

The second article in the three-part series, “The Business Case for T-Shaped Leaders – Why Your Company Needs Them” will explore why universities and corporations are in the early stages of building T-shaped curriculum into their leadership development programs.

Read more

Bring Your Own Device, Not Your Security Threats

As with all technologies, the biggest security threat emerges from end users’ device management habits. The best security ever devised can fall apart if a user writes their ID and password on the side of a two-factor key and then drops it in the hall. Security can also fall apart if end users visit malicious websites. Sure these threat conditions have existed since the first days of the Internet, but Bring Your Own Device (BYOD) has focused security attention on devices once again.

Read more