| 
| 
	
	
	
     
		|  |  
		|   |  
	    
	 
| 
| Spotlight
			With the United States Department of Defense's Cybersecurity Maturity Model Certification 2.0 framework entering Phase II on Dec. 16, 2025, institutions must develop a cybersecurity posture that's resilient, defensible, and flexible enough to keep up with an evolving threat landscape.MoreSurprisingly, on many of our campuses, even the IT leadership responsible for the lion's share of technology deployments doesn't realize the extent to which the institution is dependent on open source. And that lack of awareness can be a threat to campuses.More
 
 
 News
			
Upcoming Award Opportunities       
MoreUpcoming Events          
    
    
    Aug. 5–6, 2025New York, NY
    
    Aug. 18–22, 2025San Diego, CA
    
    Sept. 25, 2025Online
    
    Oct. 20–24, 2025Denver, CO
    
    Oct. 27–30, 2025Nashvile, TN
 Nov. 12–13, 2025
 Online
    
    Nov. 3–4, 2025Chicago, IL
    
    Nov. 3–5, 2025Tucson, AZ
 Webinars on Demand
    
    
    
    Sponsor: MGT 
    
    
    Sponsors: Rackspace Technology and AWS 
    
    
    Sponsors: Quantiphi and AWS 
    
    
    Sponsor: Wiz 
    
    
    Sponsor: Ooma 
    
    
    Sponsors: Okta, Carahsoft, and Active Cyber
    
    
    Sponsor: Unicon, Inc. 
    
    
    Sponsor: Juniper Networks 
    
    
    Sponsor: Pluralsight 
    
    
    Sponsors: Broadcom and Carahsoft
    
    
    
    Sponsors: Acquia, Lullabot and Carahsoft 
 Professional Resources |  |  
	
	| Tech Tactics is targeted toward higher education IT professionals, managers and C-level executives, and is packed with the latest information about networking, analytics, hardware, developer tools, data security, wireless, virtualization, cloud computing and more. Tech Tactics also offers up project profiles, case studies, interviews and articles focusing on best practices in information technology, IT strategy and IT management. Published twice monthly. |  
 |  |