Building Resilience: Best Practices for Threat Response Strategies in Higher Ed
Your data is your institution’s crown jewel, and attackers constantly look for ways they can hack into your systems and gain access to it. While…
Read MoreYour data is your institution’s crown jewel, and attackers constantly look for ways they can hack into your systems and gain access to it. While…
Faced with many competing priorities and limited in-house security expertise, many higher education institutions struggle to maintain a robust security posture amid rapidly evolving cyberthreats.
Earlier today, we publicly announced that Apogee will be joining Boldyn Networks, subject to regulatory approval. You can read the press release…
Your data is your institution’s crown jewel, and attackers constantly look for ways they can hack into your systems and gain access to it. While…
Read MoreFaced with many competing priorities and limited in-house security expertise, many higher education institutions struggle to maintain a robust security posture amid rapidly evolving cyberthreats.
Watch VideoI began my journey at Apogee in the summer of 2021, stepping into the role of interim chief information officer at a regional public university…
Read MoreThis week, I found myself awake at 2:00 a.m. in a hotel room somewhere in the Midwest, on assignment. Unable to fall back asleep, I…
Read MoreEarlier today, we publicly announced that Apogee will be joining Boldyn Networks, subject to regulatory approval. You can read the press release…
Read MoreReaders will remember a story I shared in my first post about a younger colleague, elevated to a leadership role during the height of the…
Read MoreThink about how many times you took advantage of a service or product you could have easily provided yourself this past week. It could be…
Read MoreOver the course of the coming weeks, we’ll explore these evolving perspectives in greater detail, with examples and solutions taken from contemporary practice from institutions…
Read More