|
|
Spotlight
With the United States Department of Defense's Cybersecurity Maturity Model Certification 2.0 framework entering Phase II on Dec. 16, 2025, institutions must develop a cybersecurity posture that's resilient, defensible, and flexible enough to keep up with an evolving threat landscape. MoreSurprisingly, on many of our campuses, even the IT leadership responsible for the lion's share of technology deployments doesn't realize the extent to which the institution is dependent on open source. And that lack of awareness can be a threat to campuses. More
News
-
Upcoming Award Opportunities
Upcoming Events
-
Aug. 5–6, 2025
New York, NY
-
Aug. 18–22, 2025
San Diego, CA
-
Sept. 25, 2025
Online
-
Oct. 20–24, 2025
Denver, CO
-
Oct. 27–30, 2025
Nashvile, TN
Nov. 12–13, 2025
Online
-
Nov. 3–4, 2025
Chicago, IL
-
Nov. 3–5, 2025
Tucson, AZ
Webinars on Demand
-
Sponsor: MGT
-
Sponsors: Rackspace Technology and AWS
-
Sponsors: Quantiphi and AWS
-
Sponsor: Wiz
-
Sponsor: Ooma
-
Sponsors: Okta, Carahsoft, and Active Cyber
-
Sponsor: Unicon, Inc.
-
Sponsor: Juniper Networks
-
Sponsor: Pluralsight
-
Sponsors: Broadcom and Carahsoft
-
Sponsors: Acquia, Lullabot and Carahsoft
More
Professional Resources
|
|
Tech Tactics is targeted toward higher education IT professionals, managers and C-level executives, and is packed with the latest information about networking, analytics, hardware, developer tools, data security, wireless, virtualization, cloud computing and more. Tech Tactics also offers up project profiles, case studies, interviews and articles focusing on best practices in information technology, IT strategy and IT management. Published twice monthly.
|
|
|