The Resource Hub for IT Infrastructure, Cybersecurity, and End User Computing
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com

Archives

Tag Archives for: "cyberattack"
Home » cyberattack
5 strategic imperatives for cybersecurity and AI success in 2025
By Lauren Baines
In Artificial Intelligence, Cybersecurity, Program Strategy, Security Operations
Posted June 25, 2025

5 strategic imperatives for cybersecurity and AI success in 2025

Reading Time: 9

READ MORE
Shadow AI threats are on the rise: How to secure your organization
By Christopher Sullo, Casey Corcoran
In Artificial Intelligence, Business of IT, Cybersecurity, Identity and Access Management, Program Strategy, Security Operations
Posted June 6, 2025

Shadow AI threats are on the rise: How to secure your organization

Reading Time: 6

READ MORE
The dual nature of generative AI: A powerful game-changer in cybersecurity
By Kelly Begeny, Laura Torres
In Artificial Intelligence, Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Program Strategy, Security Operations
Posted May 16, 2025

The dual nature of generative AI: A powerful game-changer in cybersecurity

Reading Time: 5

READ MORE
How the SHI-Fortinet Cyber Range Cup boots security training
By Sean Lord, Kelly Begeny
In Cybersecurity
Posted November 25, 2024

How the SHI-Fortinet Cyber Range Cup boots security training

Reading Time: 4

READ MORE
AI PC: How to navigate the challenges of tech’s exciting new market
By Matthew Oaks
In Artificial Intelligence, Digital Workplace, End-User Computing, Modern Desktop
Posted November 6, 2024

AI PC: How to navigate the challenges of tech’s exciting new market

Reading Time: 5

READ MORE
Are you protected? 2025’s top cybersecurity trends and strategies to follow now
By Kelly Begeny
In Artificial Intelligence, Cybersecurity
Posted October 16, 2024

Are you protected? 2025’s top cybersecurity trends and strategies to follow now

Reading Time: 5

READ MORE
Your cyber insurance qualification guide (And yes, you do need it!)
By Sean Lord
In Cybersecurity, Identity and Access Management, Security Operations
Posted October 2, 2024

Your cyber insurance qualification guide (And yes, you do need it!)

Reading Time: 5

READ MORE
Looming cybersecurity threats this election season and how to stay resilient
By Laura Torres, Sean Lord, Kelly Begeny
In Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Program Strategy, Security Operations
Posted July 24, 2024

Looming cybersecurity threats this election season and how to stay resilient

Reading Time: 5

READ MORE
IT infrastructure for R1 institutions: Sharpen your sphere with confidence
By SHI Staff
In Artificial Intelligence, Business of IT, Cloud, Cybersecurity, Data and Applications, Digital Workplace, End-User Computing, Hybrid Cloud, Identity and Access Management, Infrastructure, Modern Desktop, Next-Generation Infrastructure, Procurement, Storage, Unified Communications and Collaboration
Posted June 26, 2024

IT infrastructure for R1 institutions: Sharpen your sphere with confidence

Reading Time: < 1

READ MORE
Why does responsible AI matter? Guidelines for securing your AI future
By John Moran, Laura Torres, Tom Fogel, Cory Peters
In Artificial Intelligence, Cybersecurity, Data and Applications, Identity and Access Management, Infrastructure, Program Strategy, Security Operations
Posted May 3, 2024

Why does responsible AI matter? Guidelines for securing your AI future

Reading Time: 6

READ MORE
Load More

shi.com

Business of IT

ITAM & SAM
Software Licensing
IT Lifecycle Management
Procurement
Training

Digital Workspace

Unified Communications & Collaboration
End User Computing
Mobility
Modern Desktop

Cybersecurity

Identity and Access Management
Data & Applications
Hybrid Cloud
Program Strategy
Security Operations

Next Generation Infrastructure

Infrastructure
Cloud
Networking
Storage

Terms and Conditions
Privacy
Do Not Sell My Personal Information
California Transparency in Supply Chains Act
Transparency in Coverage Regulations (MRFs)

ISO 9001

© 2025 SHI International Corp. All Rights Reserved. This site is owned and maintained by SHI for the use of its customers.