The Resource Hub for IT Infrastructure, Cybersecurity, and End User Computing
  • Business of IT
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com
  • Business of IT
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com

Archives

Tag Archives for: "threat detection and response"
Home » threat detection and response
How MITRE ATT&CK helps security teams outpace today’s faster, smarter attackers
By Zack Donnenberg
In Cybersecurity
Posted April 1, 2026

How MITRE ATT&CK helps security teams outpace today’s faster, smarter attackers

Reading Time: 6

READ MORE
Enterprise AI today: A sword, a shield, and the battleground itself?
By Virginia Barber
In Cybersecurity, Program Strategy
Posted March 23, 2026

Enterprise AI today: A sword, a shield, and the battleground itself?

Reading Time: 7

READ MORE
Incident response readiness: Training today to win when it counts
By SHI Staff
In Cybersecurity, Data and Applications, Identity and Access Management, Program Security, Program Strategy, Security Operations
Posted February 23, 2026

Incident response readiness: Training today to win when it counts

Reading Time: 7

READ MORE
OT security: Why it matters and how you can stay protected
By Saran Phiriyavityopas
In Cybersecurity, Security Operations
Posted December 15, 2025

OT security: Why it matters and how you can stay protected

Reading Time: 4

READ MORE
A new era of work: How to close critical gaps with secure enterprise browsers
By Laura Klein
In Artificial Intelligence, Data and Applications, Hybrid Cloud, Identity and Access Management, Modern Desktop, Program Strategy, Security Operations
Posted November 21, 2025

A new era of work: How to close critical gaps with secure enterprise browsers

Reading Time: 5

READ MORE
Firefighting to future building: How CISOs can lead strategically in the year ahead
By Joseph Karpenko
In Cybersecurity, Program Strategy
Posted November 19, 2025

Firefighting to future building: How CISOs can lead strategically in the year ahead

Reading Time: 7

READ MORE
Executive tabletops simulate cyberattacks to increase preparedness – is your team ready?
By Dennis Allen
In Cybersecurity, Program Strategy, Security Operations
Posted October 13, 2025

Executive tabletops simulate cyberattacks to increase preparedness – is your team ready?

Reading Time: 6

READ MORE
How XDR can extend your endpoint protection and why it’s time to evolve from traditional EDR
By Caleb McDowell
In Cybersecurity, Program Strategy, Security Operations
Posted October 7, 2025

How XDR can extend your endpoint protection and why it’s time to evolve from traditional EDR

Reading Time: 5

READ MORE
IAM strategy hit a wall? Strengthen your security, across six core identity domains
By SHI Staff
In Cybersecurity, Identity and Access Management, Program Strategy
Posted October 6, 2025

IAM strategy hit a wall? Strengthen your security, across six core identity domains

Reading Time: 2

READ MORE
What happens when smart AI security takes on hidden zero-day threats?
By Quentin Rhoads-Herrera
In Artificial Intelligence, Data and Applications, Hybrid Cloud, Identity and Access Management, Procurement, Program Strategy, Security Operations
Posted September 26, 2025

What happens when smart AI security takes on hidden zero-day threats?

Reading Time: 5

READ MORE
Load More

shi.com

Business of IT

ITAM & SAM
Software Licensing
IT Lifecycle Management
Procurement
Training

Digital Workspace

Unified Communications & Collaboration
End User Computing
Mobility
Modern Desktop

Cybersecurity

Identity and Access Management
Data & Applications
Hybrid Cloud
Program Strategy
Security Operations

Next Generation Infrastructure

Infrastructure
Cloud
Networking
Storage

Terms and Conditions
Privacy
Do Not Sell My Personal Information
California Transparency in Supply Chains Act
Transparency in Coverage Regulations (MRFs)

ISO 9001

© 2026 SHI International Corp. All Rights Reserved. This site is owned and maintained by SHI for the use of its customers.