Skip to main content

Expert Insights

blog

Secure Modern Workplace


Mitigating Security Threats with Zero Trust

Targeted security attacks are on the rise and Microsoft reports 52% of organizations saw a change in security challenges due to the pandemic. Concurrency CTO Nathan Lasnoski presents at the 2020 Microsoft Inspire Global Partner Conference on how a zero trust security in action. 

Stephanie Siewert by Stephanie Siewert

Securing and Governing the Power Platform

The Power Platform is compelling with its low-code/no-code capabiltiies, but how do you secure and govern it across your enterprise? Making decisions on structure and governance will set your employees up for success. 

Stephanie Siewert by Stephanie Siewert

How Tech Can Accelerate Your Start Resmart

To kick off Smart Restart, we welcomed Concurrency's UX Architect Damon Sanchez and Technical Architect Anthony Escobedo where they discussed Power Apps and low-code, no-code options to create meaningful and safe environments for returning to the workplace. Damon explains how infusing empathy and technology can provide comfort and efficiency in the face of uncertainty, while Anthony dives into the real-world examples of applications already being utilized by companies with the help of Concurrency to ensure they're ready to move into their work stations again. 

Stephanie Siewert by Stephanie Siewert

Executive Summary: Remote Workforce Productivity Webinar

In the midst of shifting workforces prior to, during, or after a pandemic, Rockwell Automation's End User Technology Manager Brandon Lemery opens up a dialogue on what makes a company generate strong workflows when it comes to productivity with its employees, and how valuing the humanity of a worker propels them to succeed. 

Stephanie Siewert by Stephanie Siewert

COVID Survival Kit: Remote Workforce Security

I recorded a webinar with Alan Mitchell, CISO of Brunswick Corporation. We talked about their security response to COVID and how modern technologies have positively impacted their environment.

Nathan Lasnoski by Nathan Lasnoski

10 Security Changes Every CIO Should Implement

Every quarter we receive a call from a company that has been taken advantage of by a serious security event, typically ransomware or phishing, but also sometimes events more complicated. In many cases enterprise organizations have 95% of their datacenter and end user computing environments compromised. Not surprisingly, in examining these events I’ve consistently noticed […]

Nathan Lasnoski by Nathan Lasnoski

The CMDB Solves Yesterday’s Problems… the Cloud is Different

I spent many years building CMDBs for companies. The promise was that if we could just get the configuration information into a centralized database we’d be able to better plan, build, and run IT by understanding the landscape of applications and how they work. We had a relatively slow moving technology picture, with the complexity […]

Nathan Lasnoski by Nathan Lasnoski

How to Easily Create an Effective Blog Post

In this Blog Post, I will walk you through easily creating an effective blog post. This will help people who are writing a blog post and are having trouble completing it.

Jack Bumgarner by Jack Bumgarner