Mary K. Pratt

Contributing Writer

Mary K. Pratt is a freelance writer based in Massachusetts.

Best Places to Work in IT 2018

Evaluating patch management software: 6 key considerations

Evaluating patch management software: 6 key considerations

Given the breadth of software systems in any given organization and the volume of patches being released by vendors, patch management software is a critical capability within IT environments today. Here's how to choose the tools...

Why data analytics initiatives still fail

Why data analytics initiatives still fail

Strong data analytics is a digital business imperative — and it all begins with smart data governance practices and an emphasis on quality and context.

Future-proof your IT career with these critical skills

Future-proof your IT career with these critical skills

In the era of digital transformation, IT pros must adjust to a rapidly shifting technology and business landscape. Here’s a long-term look at where to aim your career in the years ahead.

6 steps for a solid patch management process

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need...

6 expert budgeting tips for IT leaders

6 expert budgeting tips for IT leaders

IT budgets must not only reflect short-term strategic plans but also drive innovation. Here’s how to ensure you’re delivering tactical IT and services that produce true digital transformation.

What is an intrusion detection system (IDS)? A valued function with significant challenges

What is an intrusion detection system (IDS)? A valued function with significant challenges

An intrustion detection system (IDS) is a software application or hardware appliance that monitors traffic moving on networks and through systems to search for suspicious activity and known threats, sending up alerts when it finds...

The keys to modernizing legacy IT systems

The keys to modernizing legacy IT systems

Legacy technology can hinder your ability to meet changing market dynamics. Here’s how to prioritize and execute IT modernization efforts that drive business value.

What is Zero Trust? A model for more effective security

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

6 secrets of highly innovative CIOs

6 secrets of highly innovative CIOs

Forward-looking CIOs are not only modernizing legacy systems, they’re redefining how IT works. Here’s a look at how to shift from an IT order-taker to a next-gen technology leader.

5 ways users circumvent security measures and how to prevent it

5 ways users circumvent security measures and how to prevent it

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance back in security's favor.

5 hurdles to adopting devops

5 hurdles to adopting devops

The devops journey involves significant changes in culture, processes and technologies. Here’s how to overcome the most common challenges along the way.

Load More