By Andrew Lee, Kelly Begeny In Cybersecurity, Data and Applications, Identity and Access Management, Program Security, Program StrategyPosted May 7, 2025Unlock resiliency: How to build a proactive security roadmap for 2025Reading Time: 5 READ MORE
By Preston Davis, Alexandra Ivan, Jeff Seltzer, Danielle Kraft In Business of IT, IT Lifecycle Management, ITAM and SAM, Procurement, Software LicensingPosted March 21, 2025Oracle Java subscription: How to easily gain visibility into your license agreementsReading Time: 4 READ MORE
By Brian Carufe In Cybersecurity, Hybrid Cloud, Identity and Access Management, Program StrategyPosted December 16, 2024How to build an effective IAM program in 2025’s hybrid landscapeReading Time: 4 READ MORE
By Kelly Begeny In Cybersecurity, Security OperationsPosted October 30, 2024Supply chain risk management: Why third parties could be your kryptoniteReading Time: 5 READ MORE
By Laura Torres, Sean Lord, Kelly Begeny In Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Program Strategy, Security OperationsPosted July 24, 2024Looming cybersecurity threats this election season and how to stay resilientReading Time: 5 READ MORE
By Linda Heiss, Theo Meek, Reece Hartle In Cybersecurity, Program SecurityPosted April 10, 20245 ways to increase school safety with technology (and grant funding)Reading Time: 5 READ MORE
By SHI Staff In Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Program Strategy, Security OperationsPosted March 25, 20242024 cybersecurity trends: The impact of AI, automation, and moreReading Time: < 1 READ MORE
By Victoria Barber In Cloud, Cybersecurity, End-User Computing, Strategic InsightsPosted February 7, 2024Predicting which 2024 tech trends will emerge as the next AI or sustainabilityReading Time: 5 READ MORE
By Laura Torres, Robert Fass In Business of IT, Data and Applications, Hybrid Cloud, Identity and Access Management, Procurement, Program Security, Program Strategy, Security OperationsPosted January 31, 2024SHI study reveals the top 3 barriers in public sector cybersecurityReading Time: < 1 READ MORE
By Michael Brown In Cybersecurity, Identity and Access ManagementPosted January 29, 2024Safe IT asset management: How to shield yourself from cyberattacksReading Time: 3 READ MORE