The Resource Hub for IT Infrastructure, Cybersecurity, and End User Computing
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com

Archives

Tag Archives for: "threat detection and response"
Home » threat detection and response
Executive tabletops simulate cyberattacks to increase preparedness – is your team ready?
By Dennis Allen, Brian Murphy
In Cybersecurity, Program Strategy, Security Operations
Posted October 13, 2025

Executive tabletops simulate cyberattacks to increase preparedness – is your team ready?

Reading Time: 6

READ MORE
How XDR can extend your endpoint protection and why it’s time to evolve from traditional EDR
By Caleb McDowell
In Cybersecurity, Program Strategy, Security Operations
Posted October 7, 2025

How XDR can extend your endpoint protection and why it’s time to evolve from traditional EDR

Reading Time: 5

READ MORE
IAM strategy hit a wall? Strengthen your security, across six core identity domains
By SHI Staff
In Cybersecurity, Identity and Access Management, Program Strategy
Posted October 6, 2025

IAM strategy hit a wall? Strengthen your security, across six core identity domains

Reading Time: 2

READ MORE
What happens when smart AI security takes on hidden zero-day threats?
By Quentin Rhoads-Herrera, Sam Harris, Laura Torres
In Artificial Intelligence, Data and Applications, Hybrid Cloud, Identity and Access Management, Procurement, Program Strategy, Security Operations
Posted September 26, 2025

What happens when smart AI security takes on hidden zero-day threats?

Reading Time: 5

READ MORE
5 strategic imperatives for cybersecurity and AI success in 2025
By Lauren Baines
In Artificial Intelligence, Cybersecurity, Program Strategy, Security Operations
Posted June 25, 2025

5 strategic imperatives for cybersecurity and AI success in 2025

Reading Time: 9

READ MORE
The dual nature of generative AI: A powerful game-changer in cybersecurity
By Kelly Begeny, Laura Torres
In Artificial Intelligence, Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Program Strategy, Security Operations
Posted May 16, 2025

The dual nature of generative AI: A powerful game-changer in cybersecurity

Reading Time: 5

READ MORE
Experts tell all: How to avoid 4 common enterprise AI adoption mistakes
By Zack Donnenberg
In Artificial Intelligence, End-User Computing, Infrastructure, Next-Generation Infrastructure, Training
Posted April 23, 2025

Experts tell all: How to avoid 4 common enterprise AI adoption mistakes

Reading Time: 8

READ MORE
8 cybersecurity trends for 2025: Navigate the evolving threat landscape
By David O'Leary, Brad Bowers
In Artificial Intelligence, Cloud, Cybersecurity, Data and Applications, Hybrid Cloud, Identity and Access Management, Infrastructure, Program Strategy, Security Operations
Posted March 31, 2025

8 cybersecurity trends for 2025: Navigate the evolving threat landscape

Reading Time: < 1

READ MORE
4 important ways AI devices strengthen IT operations and security
By Phalgun Saraf, Matthew Oaks, Dave Gruver, Adam Reiser
In Artificial Intelligence, Cybersecurity, Data and Applications, Digital Workplace, End-User Computing, Security Operations
Posted March 10, 2025

4 important ways AI devices strengthen IT operations and security

Reading Time: 4

READ MORE
SHI’s Threat Protection Engagement for Microsoft: How to fortify your security
By SHI Staff
In Business of IT, Cybersecurity
Posted February 25, 2025

SHI’s Threat Protection Engagement for Microsoft: How to fortify your security

Reading Time: < 1

READ MORE
Load More

shi.com

Business of IT

ITAM & SAM
Software Licensing
IT Lifecycle Management
Procurement
Training

Digital Workspace

Unified Communications & Collaboration
End User Computing
Mobility
Modern Desktop

Cybersecurity

Identity and Access Management
Data & Applications
Hybrid Cloud
Program Strategy
Security Operations

Next Generation Infrastructure

Infrastructure
Cloud
Networking
Storage

Terms and Conditions
Privacy
Do Not Sell My Personal Information
California Transparency in Supply Chains Act
Transparency in Coverage Regulations (MRFs)

ISO 9001

© 2025 SHI International Corp. All Rights Reserved. This site is owned and maintained by SHI for the use of its customers.