HOPZERO Partners With Incubator CTX for Good Cause (and Industry Insights)
(From left to right) Kristin Spindler, Director IncubatorCTX; Ben Haley, SVP Engineering HOPZERO; Ann Schwartz, Water to Thrive Sponsor at CTX and Elise Brazier, MBA Director.
Learning more about your industry is worthwhile for any business owner, especially when that learning contributes to a good cause.
That’s the experience the team behind HOPZERO, an Austin-based network security company, had recently when they partnered with Incubator CTX, on the campus of Concordia University where their company is headquartered, to conduct a market research study.
The study, helmed by Concordia University Texas online MBA students Erica Kasinski, Ashley Akroyd and Cecilee Perez, gave HOPZERO valuable intel about the enterprise security industry.
It also offered study participants the opportunity to receive either a gift card or donate a like amount to Water to Thrive, a non-profit dedicated to providing safe drinking water to communities across eastern Africa.
Many participants elected to support Water to Thrive. The picture above shows HOPZERO making that donation.
HOPZERO would like to thank everyone that participated in our market research study. They are delighted to work with these excellent organizations and thankful for the generosity of the study participants.
For more information on Water to Thrive and the work they are doing: https://www.watertothrive.org/.
Information on Concordia University Texas’s MBA program: https://www.concordia.edu/admissions/graduate/mba/
For information on IncubatorCTX: http://www.incubatorctx.com/
Even the best-trained dogs have leashes while in public. Despite how much one trusts their dog to act obediently, it simply is not possible to know what kind of situations one might encounter while on a walk—maybe an enticing squirrel? A loud noise?...
Enterprise Management Associates (EMA) is a leading voice in the information security industry. With its dedication to in-depth research — and unrivaled analysis — the EMA is an important resource for data management and IT professionals...
Chinese Army purportedly inserted chips to provide hackers a connection into the back-end infrastructure where they can steal information and credentials.
As we move closer to another anniversary of 9/11, I'm reminded of the opportunity my team and I had, just days after the attack, to serve my country by assisting with communication recovery for a besieged Pentagon.It was an experience I'll never forget....
Even the most comprehensive cyber defense system can still be vulnerable when dependent on a single layer of cyber protection.