By Sean Lord, Kelly Begeny In CybersecurityPosted November 25, 2024How the SHI-Fortinet Cyber Range Cup boots security trainingReading Time: 4 READ MORE
By Matthew Oaks In Digital Workplace, End-User Computing, Modern DesktopPosted November 6, 2024AI PC: How to navigate the challenges of tech’s exciting new marketReading Time: 6 READ MORE
By Kelly Begeny, Laura Torres In Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Program Strategy, Security OperationsPosted October 23, 2024The dual nature of generative AI: A powerful game-changer in cybersecurityReading Time: 5 READ MORE
By Kelly Begeny In CybersecurityPosted October 16, 2024Are you protected? 2025’s top cybersecurity trends and strategies to follow nowReading Time: 6 READ MORE
By Sean Lord In Cybersecurity, Identity and Access Management, Security OperationsPosted October 2, 2024Your cyber insurance qualification guide (And yes, you do need it!)Reading Time: 5 READ MORE
By Laura Torres, Sean Lord, Kelly Begeny In Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Program Strategy, Security OperationsPosted July 24, 2024Looming cybersecurity threats this election season and how to stay resilientReading Time: 5 READ MORE
By SHI Staff In Business of IT, Cloud, Cybersecurity, Data and Applications, Digital Workplace, End-User Computing, Hybrid Cloud, Identity and Access Management, Infrastructure, Modern Desktop, Next-Generation Infrastructure, Procurement, Storage, Unified Communications and CollaborationPosted June 26, 2024IT infrastructure for R1 institutions: Sharpen your sphere with confidenceReading Time: < 1 READ MORE
By John Moran, Laura Torres, Tom Fogel, Cory Peters In Cybersecurity, Data and Applications, Identity and Access Management, Infrastructure, Program Strategy, Security OperationsPosted May 3, 2024Why does responsible AI matter? Guidelines for securing your AI futureReading Time: 6 READ MORE
By Laura Torres, Robert Fass In Business of IT, Data and Applications, Hybrid Cloud, Identity and Access Management, Procurement, Program Security, Program Strategy, Security OperationsPosted January 31, 2024SHI study reveals the top 3 barriers in public sector cybersecurityReading Time: < 1 READ MORE
By Michael Brown In Cybersecurity, Identity and Access ManagementPosted January 29, 2024Safe IT asset management: How to shield yourself from cyberattacksReading Time: 3 READ MORE