By Laura Torres, Mayur Pitamber In Artificial Intelligence, Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Infrastructure, Procurement, Program Security, Program Strategy, Security Operations, TrainingPosted July 3, 2025Cyber risk alert: 8 key takeaways for effective SOC and TPRM strategiesReading Time: 8 READ MORE
By Lauren Baines In Artificial Intelligence, Cybersecurity, Program Strategy, Security OperationsPosted June 25, 20255 strategic imperatives for cybersecurity and AI success in 2025Reading Time: 9 READ MORE
By Christopher Sullo In Artificial Intelligence, Data and Applications, Identity and Access Management, Program Strategy, Security OperationsPosted June 11, 2025Is shadow AI undermining your compliance? Here’s what you need to knowReading Time: 5 READ MORE
By Christopher Sullo, Casey Corcoran In Artificial Intelligence, Business of IT, Cybersecurity, Identity and Access Management, Program Strategy, Security OperationsPosted June 6, 2025Shadow AI threats are on the rise: How to secure your organizationReading Time: 6 READ MORE
By Andrew Lee, Kelly Begeny In Cybersecurity, Data and Applications, Identity and Access Management, Program Security, Program StrategyPosted May 7, 2025Unlock resiliency: How to build a proactive security roadmap for 2025Reading Time: 4 READ MORE
By Preston Davis, Alexandra Ivan, Jeff Seltzer, Danielle Kraft In Business of IT, IT Lifecycle Management, ITAM and SAM, Procurement, Software LicensingPosted March 21, 2025Oracle Java subscription: How to easily gain visibility into your license agreementsReading Time: 4 READ MORE
By Brian Carufe In Cybersecurity, Hybrid Cloud, Identity and Access Management, Program StrategyPosted December 16, 2024How to build an effective IAM program in 2025’s hybrid landscapeReading Time: 4 READ MORE
By Kelly Begeny In Cybersecurity, Security OperationsPosted October 30, 2024Supply chain risk management: Why third parties could be your kryptoniteReading Time: 5 READ MORE
By Laura Torres, Sean Lord, Kelly Begeny In Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Program Strategy, Security OperationsPosted July 24, 2024Looming cybersecurity threats this election season and how to stay resilientReading Time: 5 READ MORE
By Linda Heiss, Theo Meek, Reece Hartle In Cybersecurity, Program SecurityPosted April 10, 20245 ways to increase school safety with technology (and grant funding)Reading Time: 5 READ MORE