AWS outage: Who’s really to blame?

Amazon’s S3 service outage in the US-East-1 Region yesterday shed light on just how much of the internet depends on that single service in a single region. Dozens of sites that stored assets there failed; sites that stored snapshots of volumes they used to launch instances failed; sites that depended on AWS S3 services in…

Read More
Tags: ,

6 must-attend Microsoft webinars hosted by SHI this spring

SHI’s ringing in spring once again with our Microsoft webinar series, highlighting Microsoft’s latest products and licensing options. SHI and Microsoft have a long history of collaborating on regular webinars, which keep thousands of procurement and IT professionals up-to-date on Microsoft technologies. There are six webinars scheduled for this spring. Sign up today to learn…

Read More
Tags:

A quick guide to finding a cybersecurity framework

Health care has HIPAA. Credit card merchants have PCI. But if you’re not part of these compliance-heavy industries, how can you know your cybersecurity is up to scratch? The answer is a cybersecurity framework–a set of practices, policies, and processes that holds your organization accountable for its defenses. Security frameworks provide a calculated approach to…

Read More
Tags: ,

How to negotiate a better software audit clause

Many customers report that the number of software audits requested by publishers has risen dramatically over the past several years. At best, this proves inconvenient for customers that have to allot valuable time and resources to manage the audit. At worst, organizations face steep financial penalties if unintentional license deficits are discovered. Perhaps the best…

Read More
Tags: , ,

The top 5 IT mistakes you’re probably making

Everyone makes mistakes. Not everyone knows when they’re making them. This is especially true in the world of IT, where teams are often swamped just keeping their environment up and running. In that rush, details sometimes go overlooked, and opportunities sometimes get ignored. The consequences are everything from wasted money to lost time to a…

Read More
Tags: ,

How a virtual CISO could strengthen your security

With the ever-increasing number of cyberattacks for both financial gains and political purposes, companies, government agencies, and other organizations are forced to deploy and maintain an expanding depth of security controls. This has led to a breadth of oftentimes independent point solutions that aren’t driven by policies and processes and aren’t created by an experienced…

Read More
Tags: ,