Resource Center

  • The Who and What of Email Security

    In the days of circuit-switched telephony, when Grandma dialed Grandpa, the phone company could easily determine that the caller’s identity was, in fact, Grandma. Such confidence melted away, however, with TCP/IP and the Internet. That is, when Kahn and Cerf decided to allow senders, instead of the network, to specify their identity, they created a flexible Internet protocol – but also one that required add-on overlays for authentication.

  • HMG Tech News Digest August 9

    Trending News on U.S. Restrictions on Huawei Tech, Pentagon JEDI Cloud Contract Process, and Digital Tech Changing the Way We Eat

  • Chained Breach Simulation

    The first time I saw signatures used to detect attacks more than two decades ago, I knew that intrusion detection systems (IDS) would become a new protection category. It was thrilling to see a new security control come to life, and I give credit to the Air Force Information Warfare Center for leading the way on practical implementation. I became so enthused with IDS that I spent a year writing a textbook on the topic.

Welcome to the Automation-First Era

In today’s digital business environment, company margins are getting tighter while customers continue to expect more. Since twentieth-century solutions no longer provide companies the wherewithal to survive, discover how automation is enabling companies and their employees to increase the efficiency, accuracy and speed needed to thrive in a digital, data-driven world.

Attribution: UiPath

Breaking the Rules of Cloud Migration

In this webinar, Prakash Somani, Global Offering Leader, Hybrid Cloud Services at IBM, shares critical success factors for the journey to the cloud.

Attribution: IBM Corporation

  • The CEO of Technology

    The CEO of Technology is the authoritative guidebook to becoming a high-performing CIO in today’s fast-paced, ultra-competitive business environment. The success of the entire business can be critically impacted by the right – or wrong – digital strategy and leadership. In this hands-on resource, you’ll gain access to the intimate wisdom and habits of successful global leaders who are at the front edge of leveraging technology to provide you with an actionable approach to blending innovative technology and cutting-edge business strategy to generate value in the digital age.


  • The CIO Playbook: Strategies and Best Practices for IT Leaders to Deliver on Value

    As our economy shifts from recession to recovery, our current economic climate is ripe for transformation. CIOs are in a unique position to leverage technology in order to drive innovation and boost business growth. The CIO Playbook is the handy desk reference for CIOs, CEOs, CFOs, and up and coming leaders, revealing a dynamic seven-step framework (Partner – Organize – Innovate – Deliver – Support – Protect – Grow) that will guide you in making essential changes to your organization.