The Resource Hub for IT Infrastructure, Cybersecurity, and End User Computing
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com

Archives

Tag Archives for: "cyberattack"
Home » cyberattack
A new era of work: How to close critical gaps with secure enterprise browsers
By Laura Klein, Laura Torres
In Artificial Intelligence, Data and Applications, Hybrid Cloud, Identity and Access Management, Modern Desktop, Program Strategy, Security Operations
Posted November 21, 2025

A new era of work: How to close critical gaps with secure enterprise browsers

Reading Time: 5

READ MORE
Firefighting to future building: How CISOs can lead strategically in the year ahead
By Joseph Karpenko, Ben Boyd
In Cybersecurity, Program Strategy
Posted November 19, 2025

Firefighting to future building: How CISOs can lead strategically in the year ahead

Reading Time: 7

READ MORE
Want to keep your K-12 district cyber safe? Prioritize IAM
By Melissa McEntee
In Cybersecurity, Identity and Access Management
Posted November 3, 2025

Want to keep your K-12 district cyber safe? Prioritize IAM

Reading Time: 7

READ MORE
Innovation Heroes: The deepfake that swindled a company out of $25 million
By SHI Staff
In Artificial Intelligence, Cybersecurity, Data and Applications, Identity and Access Management, Innovation Heroes, Podcasts
Posted October 16, 2025

Innovation Heroes: The deepfake that swindled a company out of $25 million

Reading Time: 5

READ MORE
Executive tabletops simulate cyberattacks to increase preparedness – is your team ready?
By Dennis Allen, Brian Murphy
In Cybersecurity, Program Strategy, Security Operations
Posted October 13, 2025

Executive tabletops simulate cyberattacks to increase preparedness – is your team ready?

Reading Time: 6

READ MORE
These 5 important questions will make or break your resiliency strategy
By Chris Sittig, Ted DiMontova, Brad Pollard, Zack Donnenberg
In Cybersecurity, Program Strategy, Security Operations
Posted October 10, 2025

These 5 important questions will make or break your resiliency strategy

Reading Time: 6

READ MORE
SHI’s Research Roundup for October 3, 2025
By Scott Smith
In Cybersecurity, Identity and Access Management, Newsletter, Research Roundup, Security Operations, Strategic Insights
Posted October 3, 2025

SHI’s Research Roundup for October 3, 2025

Reading Time: 3

READ MORE
What happens when smart AI security takes on hidden zero-day threats?
By Quentin Rhoads-Herrera, Sam Harris, Laura Torres
In Artificial Intelligence, Data and Applications, Hybrid Cloud, Identity and Access Management, Procurement, Program Strategy, Security Operations
Posted September 26, 2025

What happens when smart AI security takes on hidden zero-day threats?

Reading Time: 5

READ MORE
Why are data breach costs rising in the U.S. while falling everywhere else?
By Rob Forbes
In Cybersecurity, Program Strategy, Security Operations
Posted August 25, 2025

Why are data breach costs rising in the U.S. while falling everywhere else?

Reading Time: 7

READ MORE
Why does responsible AI matter? Guidelines for securing your AI future
By John Moran, Laura Torres, Tom Fogel, Cory Peters
In Artificial Intelligence, Cybersecurity, Data and Applications, Identity and Access Management, Infrastructure, Program Strategy, Security Operations
Posted July 21, 2025

Why does responsible AI matter? Guidelines for securing your AI future

Reading Time: 6

READ MORE
Load More

shi.com

Business of IT

ITAM & SAM
Software Licensing
IT Lifecycle Management
Procurement
Training

Digital Workspace

Unified Communications & Collaboration
End User Computing
Mobility
Modern Desktop

Cybersecurity

Identity and Access Management
Data & Applications
Hybrid Cloud
Program Strategy
Security Operations

Next Generation Infrastructure

Infrastructure
Cloud
Networking
Storage

Terms and Conditions
Privacy
Do Not Sell My Personal Information
California Transparency in Supply Chains Act
Transparency in Coverage Regulations (MRFs)

ISO 9001

© 2025 SHI International Corp. All Rights Reserved. This site is owned and maintained by SHI for the use of its customers.