The Resource Hub for IT Infrastructure, Cybersecurity, and End User Computing
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com

Archives

Tag Archives for: "risk management"
Home » risk management
Unlock resiliency: How to build a proactive security roadmap for 2025
By Andrew Lee, Kelly Begeny
In Cybersecurity, Data and Applications, Identity and Access Management, Program Security, Program Strategy
Posted May 7, 2025

Unlock resiliency: How to build a proactive security roadmap for 2025

Reading Time: 5

READ MORE
Oracle Java subscription: How to easily gain visibility into your license agreements
By Preston Davis, Alexandra Ivan, Jeff Seltzer, Danielle Kraft
In Business of IT, IT Lifecycle Management, ITAM and SAM, Procurement, Software Licensing
Posted March 21, 2025

Oracle Java subscription: How to easily gain visibility into your license agreements

Reading Time: 4

READ MORE
How to build an effective IAM program in 2025’s hybrid landscape
By Brian Carufe
In Cybersecurity, Hybrid Cloud, Identity and Access Management, Program Strategy
Posted December 16, 2024

How to build an effective IAM program in 2025’s hybrid landscape

Reading Time: 4

READ MORE
Supply chain risk management: Why third parties could be your kryptonite
By Kelly Begeny
In Cybersecurity, Security Operations
Posted October 30, 2024

Supply chain risk management: Why third parties could be your kryptonite

Reading Time: 5

READ MORE
Looming cybersecurity threats this election season and how to stay resilient
By Laura Torres, Sean Lord, Kelly Begeny
In Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Program Strategy, Security Operations
Posted July 24, 2024

Looming cybersecurity threats this election season and how to stay resilient

Reading Time: 5

READ MORE
5 ways to increase school safety with technology (and grant funding)
By Linda Heiss, Theo Meek, Reece Hartle
In Cybersecurity, Program Security
Posted April 10, 2024

5 ways to increase school safety with technology (and grant funding)

Reading Time: 5

READ MORE
2024 cybersecurity trends: The impact of AI, automation, and more
By SHI Staff
In Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Program Strategy, Security Operations
Posted March 25, 2024

2024 cybersecurity trends: The impact of AI, automation, and more

Reading Time: < 1

READ MORE
Predicting which 2024 tech trends will emerge as the next AI or sustainability
By Victoria Barber
In Cloud, Cybersecurity, End-User Computing, Strategic Insights
Posted February 7, 2024

Predicting which 2024 tech trends will emerge as the next AI or sustainability

Reading Time: 5

READ MORE
SHI study reveals the top 3 barriers in public sector cybersecurity
By Laura Torres, Robert Fass
In Business of IT, Data and Applications, Hybrid Cloud, Identity and Access Management, Procurement, Program Security, Program Strategy, Security Operations
Posted January 31, 2024

SHI study reveals the top 3 barriers in public sector cybersecurity

Reading Time: < 1

READ MORE
Safe IT asset management: How to shield yourself from cyberattacks
By Michael Brown
In Cybersecurity, Identity and Access Management
Posted January 29, 2024

Safe IT asset management: How to shield yourself from cyberattacks

Reading Time: 3

READ MORE
Load More

shi.com

Business of IT

ITAM & SAM
Software Licensing
IT Lifecycle Management
Procurement
Training

Digital Workspace

Unified Communications & Collaboration
End User Computing
Mobility
Modern Desktop

Cybersecurity

Identity and Access Management
Data & Applications
Hybrid Cloud
Program Strategy
Security Operations

Next Generation Infrastructure

Infrastructure
Cloud
Networking
Storage

Terms and Conditions
Privacy
Do Not Sell My Personal Information
California Transparency in Supply Chains Act
Transparency in Coverage Regulations (MRFs)

ISO 9001

© 2025 SHI International Corp. All Rights Reserved. This site is owned and maintained by SHI for the use of its customers.