info@mill-all.com 212-256-9890

15 Mar, 2017

Digital Transformers: Top technology for Security and Enterprise

 -

There are literally hundreds of businesses selling technology to help you through your digital transformation. So we thought we would simplify things a little with our weekly list – “The Digital Transformers”, top technology for each industry. This week and for the third edition, we are taking a look...

Read more
07 Sep, 2016

Jack Barsky Former Undercover KGB Agent Headlines 2016 Digital Enterprise and Transformational CISO Assembly!

Jack Barsky Former Undercover KGB Agent Headlines 2016 Digital Enterprise and Transformational CISO Assembly! NEW YORK, September 7th, 2016 – The Millennium Alliance is incredibly honored to have Jack Barsky, Retired CIO of NRG Energy and Former Undercover KGB Agent, as the gala dinner keynote speaker at our upcoming Digital Enterprise Transformation...

Read more
29 Jun, 2016

Beyond Illegal Orders: Concern About a Misuse of Executive Power

During this unusual political season, I hear a recurring question from former, present, and aspiring intelligence officers.  It’s a question that I have rarely heard before, no matter the Administration or political persuasion of my interlocutors: “What do we do if we are given an illegal order?”  This has...

Read more
21 Jun, 2016

Most Impressive Displays From HPE Discover Las Vegas 2016

  7 Most Impressive Displays From HPE Discover Las Vegas 2016 HPE Discover 2016 was brimming with engaging presentations, vibrant demos and incredible product launches. HPE executives, partners and customers came together in Las Vegas to share their perspectives on the future of technology, and here, we’ve summarized some...

Read more
01 Jun, 2016

Security Without Compromise

SECURITY WITHOUT COMPROMISE NEW YORK, June 1, 2016 – Faced with the ever-evolving complexity and explosion of data, Financial Services attendees will get a chance to gain insights from C-Level executives during the Keynote Breakfast Panel that will kick off Day 2 of the FSI Transformation Assembly, sponsored and...

Read more
26 Feb, 2016

APPLE ENCRYPTION AND LAW ENFORCEMENT

By first obtaining a court order, law enforcement has the legal authority to access communications during the course of an investigation. The police do this to obtain evidence of a crime, or in the case of terrorism to hopefully prevent a future attack. Unfortunately, in today’s world of advancing...

Read more
09 Feb, 2016

CYBER SECURITY HEALTH CHECK

CYBER SECURITY HEALTH CHECK When you see your doctor for a medical checkup, the results are kind of predictable, and not very actionable – lose weight, get more exercise, and avoid stress. A cyber security health check can be much more insightful and actionable, and I recommend that your...

Read more
09 Feb, 2016

10 Tips To Help You Defend And Protect Your Business From ID Theft

10 Tips To Help You Defend And Protect Your Business From ID Theft Information to keep your business safe. With 2016 upon us, you’re likely reflecting on your business triumphs, challenges, and opportunities over the past year and planning ahead. While doing so, make sure to include cybersecurity best-practice...

Read more
08 Feb, 2016

DISTRIBUTED DENIAL OF SERVICE ATTACK (DDos)

DISTRIBUTED DENIAL OF SERVICE ATTACK (DDos) Cyber security attackers have become extremely sophisticated at implanting malware in your systems and evading detection as they quietly steal your sensitive data. While that threat is increasing in popularity among clever hackers, there remains a thriving community of criminals who are far...

Read more
08 Sep, 2015

Financial Services Transformation Trends

 -FSI Infographic

Within the next 5 years, 50% of new applications launched by financial institutions will be cloud-first applications. Review our infographic on the 9 key drivers and 10 decision imperatives of worldwide financial services in 2015. 

Read more
Show Buttons
Share On Facebook
Share On Twitter
Share On Linkedin
Hide Buttons