Academy Announces Distinguished Chair

WEST POINT, N.Y. – Last week, leadership at the U.S. Military Academy announced the appointment of Abdul Subhani to the position of Distinguished Chair of Innovation and Strategic Engagement.

Subhani, a well-known and highly respected member of the Information Technology industry, is a Pakistani-born American businessman, author, investor, and philanthropist. He is currently the President and Chief Executive Officer of Centex Technologies, an IT consulting company that he founded in 2006. He also serves on the Board of Advisors at the Center for a New American Security, a Washington D.C. based think tank, and he is the Civilian Aide to the Secretary of the Army for the Capitol Region of Texas.

“His selection for this position is a testament to his unique experiences that crosscut the tech sector and the inner workings of the Department of Defense,” said 61st Superintendent Lt. Gen. Steven W. Gilland after the appointment ceremony. “His body of work is exemplary for this far-reaching role.”

Read More

The Risks Of Shadow IT For Businesses

Do your employees practice shadow IT? For the uninitiated, shadow IT (also known as underground or rogue IT) is the use of technology-related solutions by employees without the knowledge and approval of the IT team. Some examples of this are tech solutions and applications used on computer hardware, software, infrastructure/network, tools, applications, platforms and IT services.

The use of unauthorized IT solutions can cause major security challenges. So, why do employees drift to shadow IT?

There are multiple reasons that encourage employees to practice shadow IT. Some of them are:

Read More

Is Your BFSI Protecting Your Information?

The BFSI (banking, financial services and insurance) industry has recently seen significant technical developments. Most banking and insurance operations have gone digital, and the BFSI sector is now processing massive amounts of digital data from various sources. The data being processed is typically of a sensitive nature, containing PII and financial information. As a result, BFSI firms are among the most valuable targets for cybercriminals. Cybersecurity rules around the world, as well as the constant threat from cybercriminals, necessitate a solid data protection solution to defend BFSI operations. Here are five examples of some security practices you should make sure your bank is using.

Read More

Essential Elements Of Cybersecurity

With the increased usage of online services, cloud solutions and overall business digitization, cyberattacks have become lucrative, and hackers are seeking more and more effective means of penetrating cybersecurity safeguards. Let’s discuss some of the key cybersecurity elements businesses should implement and maintain to safeguard their assets from cyberattacks:

Cloud Security

Companies have private and public cloud instances that may be either set up using on-premise or off-site data centers. Public cloud instances across various CSPs (cloud service providers) must be protected by deploying different cloud governance solutions. They help security personnel in enforcing automated policy compliance and cloud vulnerability management. Managing the virtual infrastructure in private clouds supporting server virtualization and providing a virtual desktop interface can be handled by MSSPs (managed security service providers). Cloud instances are the first to be attacked by hackers, even before targeting the on-site server infrastructure. Hence, it must be protected with multiple layers of cyber defense mechanisms.

Read More

The Unknown Issues With Cybersecurity

It is next to impossible to ignore cybersecurity in the 21st century. Organizations need to pay close attention to cybersecurity issues that could severely affect their productivity.

In many cases, organizations have a dedicated department for managing cybersecurity concerns. But what about the rest of the organization? Are the leaders and support staff educated or trained sufficiently to understand the risks and precautions associated with cybersecurity? Do organizations have policies in place that hold employees responsible for their actions pertaining to cybersecurity? Which cybersecurity measures really need to be implemented for your organization?

Read More

Wi-Fi And The Pandemic: How To Support Access For All

With schools and businesses needing to adapt to Covid-19 restrictions, there has been an increase in users on Wi-Fi networks at schools and homes. School districts are scrambling to increase access to both staff and students to support online learning. Organizations are adapting to virtual meetings and employees working from home. However, Pew Research Center’s latest stats show that only three-quarters of the country has internet access. The demographics most affected are low-income households and those who did not graduate high school.

Read More

IndustryWired Magazine Names ‘Top 20 Extraordinary CEOs to Watch’

IndustryWired, a brand of Stravium Intelligence, has named ‘Top 20 Extraordinary CEOs to Watch’ in its October Magazine issue.

The magazine issue recognizes 20 extraordinary CEOs who are revolutionizing industries by leading and building a strong team, combining best-in-class technology, and taking strategic decisions to make their organizations different from their peers. Here is a look at the inspiring executives who made the list:

Read More

Abdul B. Subhani: Supporting Businesses Through Innovative IT Solutions

Centex Technologies is a computer consulting company that was founded in 2006. It is based in Killeen, TX, with additional offices in Austin, Dallas, and Atlanta. The company assists businesses and government institutions by providing technical support such as IT consulting, network planning & maintenance, web design & web application development, and software design and development. It also provides internet marketing services to business, along with digital forensics analysis to law enforcement agencies and district attorneys.

Leadership that Inspires Others

Abdul B. Subhani was born in Multan, Pakistan and raised in Islamabad, Pakistan. He came to the United States in 1998 to begin his education at Central Texas College. After graduation, Abdul began working as Director of IT Audit for the Clements Boys and Girls Club where he oversaw its technology program. In 2006, he founded his own company, Centex Technologies and manages the company as its President and CEO. Additionally, Abdul has been a speaker and writer on IT security issues for the past 10 years and a member of the FBI InfraGard for the past two years.

In addition to his academic achievements, Abdul has been and continues to be actively involved in the community in both academic and civic activities. Currently, he is a member of the Killeen Exchange Club.

Full article