The Resource Hub for IT Infrastructure, Cybersecurity, and End User Computing
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com

Archives

Tag Archives for: "ransomware"
Home » ransomware
Innovation Heroes: The deepfake that swindled a company out of $25 million
By SHI Staff
In Artificial Intelligence, Cybersecurity, Data and Applications, Identity and Access Management, Innovation Heroes, Podcasts
Posted October 16, 2025

Innovation Heroes: The deepfake that swindled a company out of $25 million

Reading Time: 5

READ MORE
These 5 important questions will make or break your resiliency strategy
By Chris Sittig, Ted DiMontova, Brad Pollard, Zack Donnenberg
In Cybersecurity, Program Strategy, Security Operations
Posted October 10, 2025

These 5 important questions will make or break your resiliency strategy

Reading Time: 6

READ MORE
What happens when smart AI security takes on hidden zero-day threats?
By Quentin Rhoads-Herrera, Sam Harris, Laura Torres
In Artificial Intelligence, Data and Applications, Hybrid Cloud, Identity and Access Management, Procurement, Program Strategy, Security Operations
Posted September 26, 2025

What happens when smart AI security takes on hidden zero-day threats?

Reading Time: 5

READ MORE
Unlock resiliency: How to build a proactive security roadmap for 2025
By Andrew Lee, Kelly Begeny
In Cybersecurity, Data and Applications, Identity and Access Management, Program Security, Program Strategy
Posted May 7, 2025

Unlock resiliency: How to build a proactive security roadmap for 2025

Reading Time: 4

READ MORE
Here’s why skipping out on cyber insurance is a really bad idea
By Phil Vickman
In Artificial Intelligence, Cybersecurity
Posted December 11, 2024

Here’s why skipping out on cyber insurance is a really bad idea

Reading Time: 5

READ MORE
Are you protected? 2025’s top cybersecurity trends and strategies to follow now
By Kelly Begeny
In Artificial Intelligence, Cybersecurity
Posted October 16, 2024

Are you protected? 2025’s top cybersecurity trends and strategies to follow now

Reading Time: 5

READ MORE
SHIELD Defend: Push-button orchestration for top-tier security
By SHI Staff
In Business of IT, Cybersecurity, Data and Applications, Identity and Access Management, Procurement, Program Strategy, Security Operations, Software Licensing
Posted October 15, 2024

SHIELD Defend: Push-button orchestration for top-tier security

Reading Time: < 1

READ MORE
Healthcare IT: Why you should click ‘Install now’ for effective next-gen infrastructure
By Andrea Daugherty
In Cloud, Infrastructure, Networking, Next-Generation Infrastructure, Storage
Posted May 15, 2024

Healthcare IT: Why you should click ‘Install now’ for effective next-gen infrastructure

Reading Time: 4

READ MORE
Identity and access management (IAM): 10 important ways to avoid vulnerability
By Sean Lord
In Cybersecurity, Identity and Access Management
Posted October 25, 2023

Identity and access management (IAM): 10 important ways to avoid vulnerability

Reading Time: 5

READ MORE
Securing your OT environment: how to proactively protect against cyber threats
By Saran Phiriyavityopas
In Cybersecurity, Security Operations
Posted June 9, 2023

Securing your OT environment: how to proactively protect against cyber threats

Reading Time: 3

READ MORE
Load More

shi.com

Business of IT

ITAM & SAM
Software Licensing
IT Lifecycle Management
Procurement
Training

Digital Workspace

Unified Communications & Collaboration
End User Computing
Mobility
Modern Desktop

Cybersecurity

Identity and Access Management
Data & Applications
Hybrid Cloud
Program Strategy
Security Operations

Next Generation Infrastructure

Infrastructure
Cloud
Networking
Storage

Terms and Conditions
Privacy
Do Not Sell My Personal Information
California Transparency in Supply Chains Act
Transparency in Coverage Regulations (MRFs)

ISO 9001

© 2025 SHI International Corp. All Rights Reserved. This site is owned and maintained by SHI for the use of its customers.