By SHI Staff In Cybersecurity, Data and Applications, Identity and Access Management, Program Security, Program Strategy, Security OperationsPosted February 23, 2026Incident response readiness: Training today to win when it countsReading Time: 7 READ MORE
By Philip Armbrust In Cybersecurity, Program StrategyPosted February 4, 2026How defense in depth can help cybersecurity teams win the big gameReading Time: 6 READ MORE
By Virginia Barber In CybersecurityPosted February 2, 20267 cybersecurity trends for 2026: Focus on NHIs, AI agents, and supply chain securityReading Time: 2 READ MORE
By Brian Carufe In Artificial Intelligence, Newsletter, THE UPDAITEPosted January 9, 2026Can Shakespeare crack what firewalls can’t? | THE UPDAITEReading Time: 5 READ MORE
By Saran Phiriyavityopas In Cybersecurity, Security OperationsPosted December 15, 2025OT security: Why it matters and how you can stay protectedReading Time: 4 READ MORE
By Philip Armbrust In Cybersecurity, UncategorizedPosted December 8, 2025How brushing up on your IAM health and hygiene keeps breaches at bayReading Time: 6 READ MORE
By Steve Troxel In Artificial Intelligence, Business of IT, Cybersecurity, Next-Generation Infrastructure, Program Strategy, Security Operations, TrainingPosted November 26, 20254 critical cybersecurity strategies for state and local governments in 2026Reading Time: 5 READ MORE
By Laura Klein In Artificial Intelligence, Data and Applications, Hybrid Cloud, Identity and Access Management, Modern Desktop, Program Strategy, Security OperationsPosted November 21, 2025A new era of work: How to close critical gaps with secure enterprise browsersReading Time: 5 READ MORE
By Joseph Karpenko In Cybersecurity, Program StrategyPosted November 19, 2025Firefighting to future building: How CISOs can lead strategically in the year aheadReading Time: 7 READ MORE
By Melissa McEntee In Cybersecurity, Identity and Access ManagementPosted November 3, 2025Want to keep your K-12 district cyber safe? Prioritize IAMReading Time: 7 READ MORE