Learn With Afidence
Insights and wisdom from our community
Business Technology Services
8 Critical Pitfalls to Avoid: Mastering Your Azure Implementation Journey
IT Trends with IT People
IT Trends With IT People: Leadership and Cybersecurity Insights from Jeff Reed
Business Technology Services
Active Directory Simplified: 4 Essential Tips Every IT Pro Should Know
IT Trends with IT People
IT Trends With IT People: Leadership Lessons from Jon Rike, CIO of the City of Dayton
All
- All
- Afidence Updates
- Business Technology Services
- Cybersecurity
- IT Trends with IT People
- Software Development
- Taste of IT Conference
![Cyber_Attack_Countermeasures Cyber_Attack_Countermeasures](https://afidence.com/wp-content/uploads/2024/02/Cyber_Attack_Countermeasures.jpg)
Anatomy of a Cyber Attack: From ATT&CK Execution to D3FEND Countermeasures
Picture it: You’ve just finished dinner with your family. You’re on the couch in your living room, winding down for...
![Vulnerability Management Cybersecurity Afidence Vulnerability Management Cybersecurity Afidence](https://afidence.com/wp-content/uploads/2024/01/Vulnerability-Management-Cybersecurity-Afidence.jpg)
Effective Vulnerability Management in the Age of Cyber Threats
Effectively managing vulnerabilities is a critical component of cybersecurity. It requires continuous attention and various factors involving risk management, asset...
![CMMC Framework Defense Contracting CMMC Framework Defense Contracting](https://afidence.com/wp-content/uploads/2024/01/CMMC-Framework-Defense-Contracting.jpg)
CMMC Framework: Enhancing Cybersecurity in Defense Contracting
Safeguarding sensitive information against cyber threats has become a top priority for the Department of Defense (DoD). The defense industry...
![IT Trends with IT People Emily Morgan IT Trends with IT People Emily Morgan](https://afidence.com/wp-content/uploads/2024/01/IT-Trends-with-IT-People-Emily-Morgan.jpg)
IT Trends With IT People: A Leadership Journey with Emily Morgan, CISO
Emily Morgan's journey from student worker to the VP of security and chief information security officer (CISO) at Coterie, a...
![Leveraging-Security-to-Catalyze-Your-AI-Journey-Afidence-Panel Leveraging-Security-to-Catalyze-Your-AI-Journey-Afidence-Panel](https://afidence.com/wp-content/uploads/2024/01/Leveraging-Security-to-Catalyze-Your-AI-Journey-Afidence-Panel.jpg)
Leveraging Security to Catalyze Your AI Journey: Join Us!
Calling all IT leaders and AI enthusiasts! Are you ready to supercharge your AI journey while keeping security at the...
![Meet IT Goals and Boost Returns with Technology Augmentation - Afidence Meet IT Goals and Boost Returns with Technology Augmentation - Afidence](https://afidence.com/wp-content/uploads/2023/12/Meet-IT-Goals-and-Boost-Returns-with-Technology-Augmentation-Afidence.jpg)
Technology Augmentation: How Top IT Talent Integrates With Your In-House Team
While technology augmentation is becoming an increasingly common strategy for companies looking to enhance their IT capabilities, many IT leaders...
![How a Business Continuity Plan Can Help You Avoid Disaster How a Business Continuity Plan Can Help You Avoid Disaster](https://afidence.com/wp-content/uploads/2023/12/How-a-Business-Continuity-Plan-Can-Help-You-Avoid-Disaster.jpg)
How Not Having a Business Continuity Plan Could Put You at Serious Risk
For many businesses today, the ability to adapt and thrive in the face of disruptions is paramount. This is where...