Mary K. Pratt

Contributing Writer

Mary K. Pratt is a freelance writer based in Massachusetts.

Secrets of 'shift left' success

Best Places to Work in IT 2018

Best Places to Work in IT 2018

These 100 U.S. employers attract top tech talent with stellar benefits, challenging projects and plenty of opportunities for growth.

Evaluating patch management software: 6 key considerations

Evaluating patch management software: 6 key considerations

Given the breadth of software systems in any given organization and the volume of patches being released by vendors, patch management software is a critical capability within IT environments today. Here's how to choose the tools...

Why data analytics initiatives still fail

Why data analytics initiatives still fail

Strong data analytics is a digital business imperative — and it all begins with smart data governance practices and an emphasis on quality and context.

Future-proof your IT career with these critical skills

Future-proof your IT career with these critical skills

In the era of digital transformation, IT pros must adjust to a rapidly shifting technology and business landscape. Here’s a long-term look at where to aim your career in the years ahead.

6 steps for a solid patch management process

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need...

6 expert budgeting tips for IT leaders

6 expert budgeting tips for IT leaders

IT budgets must not only reflect short-term strategic plans but also drive innovation. Here’s how to ensure you’re delivering tactical IT and services that produce true digital transformation.

What is an intrusion detection system (IDS)? A valued function with significant challenges

What is an intrusion detection system (IDS)? A valued function with significant challenges

An intrustion detection system (IDS) is a software application or hardware appliance that monitors traffic moving on networks and through systems to search for suspicious activity and known threats, sending up alerts when it finds...

What is Zero Trust? A model for more effective security

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

5 hurdles to adopting devops

5 hurdles to adopting devops

The devops journey involves significant changes in culture, processes and technologies. Here’s how to overcome the most common challenges along the way.

Beach reads for techies 2017

Beach reads for techies 2017

Looking for a great book to read this summer? Ten IT pros share their current reading lists and their all-time favorite books for technologists.

6 ways to prevent burnout in your IT staff

6 ways to prevent burnout in your IT staff

Running employees ragged is bad for them -- and bad for business. Take these steps to lower stress and boost productivity among your IT workers.

Load More