Data and Applications

Strengthen your cybersecurity competencies, protect your data and applications, and adapt your investments to the evolving threat landscape

Web3.0 is here. Will it break security best practices?

May 20, 2022
Without a change management and continuity plan, data stored on the blockchain might actually be too secure.

Data protection: 4 steps to secure your most valuable assets

May 18, 2022
Protect your company’s data from malicious actors by following four simple steps.

4 takeaways from the 2022 NASCIO Midyear Conference

May 13, 2022
The 2022 NASCIO Midyear Conference brought IT leaders together for the latest in government IT solutions.

Dell Technologies World: the future is hybrid everything

May 10, 2022
Dell Technologies World 2022 made clear Dell’s vision for the multi-cloud, hybrid everything future.

SHI Esports Environment Assessment: Datasheet

March 30, 2022
SHI’s Esports Environment Assessment defines your program priorities and provides a path forward

6 ways to defend against the next wave of global cyber attacks

March 10, 2022
It is more important than ever that your organization can prevent, detect, and respond to cyberattacks.

CMMC is coming for higher education: 3 ways to prepare

March 1, 2022
Higher education organizations need to prepare for federally mandated CMMC cybersecurity regulations.

Millions will watch the Super Bowl on Sunday…including hackers

February 10, 2022
Super Bowl Sunday creates a huge target for cyberterrorists. Learn how to protect yourself like the pros do.

7 Ways State CISOs Can Go Bold for Cybersecurity

January 26, 2022
Favorable laws and new funding bring state CISOs opportunities to build out their cybersecurity environments.

Microsoft Inspire 2021 Kicks Off: Day 1 Summary

July 14, 2021
Microsoft’s most important partner event of the year, Inspire 2021, gets underway in a virtual setting

Data Intelligence - The Data-Centric Approach & How Improving Data Quality Enables Impactful AI

May 7, 2021
In this Horizon Report, we outline how you can improve your data quality for more impactful AI engagement.

Cybersecurity Zero Trust Series – Device Assurance

April 23, 2021
In this Horizon Report, we identify how security leaders should establish a device strategy that enables their business needs and risk tolerance.

Cybersecurity Zero Trust Series – Identity Management

March 23, 2021
This Horizon Report identifies how IT leaders should develop an effective zero trust strategy and roadmap.

American Rescue Plan Act includes $633 billion for ‘IT-related’ funds

March 11, 2021
Here’s how $633 billion in funding for IT-related projects are broken down and how to take advantage.

Modern identity and access management

March 9, 2021
Look at common identity protection mistakes and best practices for implementing access management solutions.

Sort & Filter

You May Be Interested In