Achieving sustainable PCI security excellence

Organizations face persistent challenges in achieving, and more importantly, sustaining Payment Card Industry Data Security Standard (PCI DSS) compliance. Due to the burgeoning number of competing regulatory requirements, organizations often find themselves overwhelmed with PCI security complexity and repeat failures in sustaining compliance, resulting in compliance fatigue.  Two influential thought leaders of our time offer…

How IT nurtures a work-life balance at Baptcare

With about 3,800 staff and operations across Victoria, South Australia, and Tasmania, Baptcare is a purpose-driven non-profit providing residential and community aged care, as well as support to children, families, and people seeking asylum. How all those demands dovetail into IT is testament to the work fulfilled by CIO Suzanne Hall and her team. “Being…

How new public transportation technology is prioritizing passenger safety

Each year, Americans take billions of trips on buses, light rail, subways, trains and other public transit modalities. So it’s not surprising the recent Bipartisan Infrastructure Law earmarked $91 billion in guaranteed funding for public transportation, with priority areas of public safety, climate, transport equity and investing in new public transportation technology. Though traveling by public transportation is…

Empowering at-risk youth and adults with devices, connectivity and dignity

Portland Opportunities Industrial Center and Rosemary Anderson High School (POIC + RAHS) has a long name, but a simple, powerful mission: helping at-risk youth and adults be safe and successful. This thriving non-profit organization based in Portland, Oregon provides a diverse range of much-needed services, including alternative education, public safety and violence intervention, and job…

How to enhance and secure cloud communications between government agencies

The May 2021 release of Executive Order 14028, Improving the Nation’s Cybersecurity, the growing attack surface due to cloud adoption, and the January 2022 Federal Zero Trust memorandum have all added urgency to the federal government’s move to implement better network security through solutions based in Zero Trust architecture. With initiatives such as the Cloud Smart strategy and agencies like…

How Zero Trust is supposed to look

Over the last few years, it has become more and more apparent that the status quo for networking and security is no longer viable. Endlessly extending hub-and-spoke networks to more remote users, branch offices, and cloud apps increases risk, harms the user experience, and is prohibitively complex and expensive. The same is true when relying…

Righting the vessel

In 2019, advanced aquatic engine technology provider YANMAR Marine International was all at sea, or in a state of confusion. The company had outgrown its enterprise resource planning (ERP) system, with its legacy processes outdated and no longer supported.   The tech structure was largely manual, requiring employees to enter data in multiple places.  As a result, inputs were…