SHARE
Facebook X Pinterest WhatsApp

VIDEO: Red Hat CIO Takes an Open-Source Approach to Security and BYOD

Sep 11, 2013

VIDEO: CIO of Linux vendor Red Hat explains how he brings technologies into the organization and how BYOD policy plays out.

Every organization today faces a similar set of challenges about implementing bring-your-own-device (BYOD) practices, secure access measures and new technology deployment.

When you’re the CIO of a technology vendor, those challenges are magnified, as subject matter experts on any and every choice that the CIO has to make, are plentiful and often vocal. That’s the challenge that faces Lee Congdon, CIO of Linux vendor Red Hat.

Read the full story at eWeek:
Red Hat CIO Takes an Open-Source Approach to Security and BYOD

Sean Michael Kerner is a senior editor at InternetNews.com. Follow him on Twitter @TechJournalist.

Recommended for you...

U.S. Needs to Protect Tech Leadership: Qualcomm
Rob Enderle
Apr 8, 2022
HP’s ExtendXR Service Gets an Early Lead on a Looming Metaverse Problem
Rob Enderle
Mar 5, 2022
Cisco’s Purpose Is to Improve the World. Imagine if Others Followed.
Rob Enderle
Dec 17, 2021
HP Builds an Advanced Cloud Workstation for the Metaverse
Rob Enderle
Nov 13, 2021
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.