Cybersecurity

Insight on cybersecurity topics, including identity and access management, extended threat detection, data protection, and end user training

Hybrid Workforce Series: Zero Trust Model

April 20, 2021
In this webinar, SHI outlines a five-step program for getting your Zero Trust model up and running.

American Rescue Plan Act includes $633 billion for ‘IT-related’ funds:
Here’s how the money is being distributed

March 11, 2021
Here’s how $633 billion in funding for IT-related projects are broken down and how to take advantage.

How identity and access management (IAM) stops hackers in their tracks:
And what you should do to lock down one of the weakest aspects of your security posture.

March 9, 2021
Look at common identity protection mistakes and best practices for implementing access management solutions.

4 areas dominating the education technology landscape

February 25, 2021
Learn how COVID-19 drove hybrid learning, immersive technologies, esports, and cybersecurity in K-12.

Top 3 security initiatives: Your straightforward cybersecurity guide:
Get your ebook to better support your hybrid workforce

February 18, 2021
An eGuide to Supporting Your Hybrid Workforce from the cybersecurity experts at SHI

The Houdini of hackers: An interview with Kevin Mitnick

February 18, 2021
Kevin Mitnick’s adventures as the world’s most wanted hacker are notorious.

Setting the stage for your hybrid work initiatives

February 9, 2021
Organizations must prepare to commit to the hybrid work environment. But what is it, and what technologies does it require? Join us as we kick off a new series.

New COVID-19 relief bill includes $240 billion for public sector tech initiatives

January 21, 2021
The new coronavirus stimulus package includes $240 billion in IT-related funding. What does this mean for the public sector? Let's explore.

Data encryption: How to avoid common pitfalls and improve cybersecurity:
Discover how to make sure you’re encrypting the right data

December 23, 2020
In this post, we’ll take a closer look at data encryption strategies, including how to make sure you’re encrypting the right data, how to avoid common pitfalls, and how to adhere to best practices.

Foxconn, FireEye, and SolarWinds: Key takeaways from high-profile breaches:
Strengthening your cyber defenses has never been more important

December 15, 2020
Between January and October, 36 billion records were exposed in data breaches. Here’s an overview of some of the latest high-profile cyberattacks, and what they teach us about cyber defense.

12 ways to protect your organization from ransomware

December 11, 2020
Cybercriminals are using more covert tactics with ransomware, carefully targeting organizations they believe are likely to pay a significant amount of money. Here are 12 tactics that can help protect your organization.

6 best practices for application security

August 3, 2020
Applications are the foundation of today’s enterprise, but they have vulnerabilities waiting to be exploited.

Ask the experts: bridging the cybersecurity gap

July 29, 2020
Current end-user computing environments are posing difficulties for customers looking to secure their remote workers, devices, and data.

What CIOs and IT leaders must do to recover from COVID-19

July 28, 2020
SHI’s data center, cloud, collaboration, security, and ITAM experts share advice for CIOs and IT leaders dealing with the aftermath of COVID-19.

Sort & Filter