VLCM Blogs

Cybersecurity, vciso

When a vCISO Becomes the Right Move for IT Teams

If you’ve been carrying the weight of security strategy alongside daily operations, you’re in...

Cybersecurity

Annual Cybersecurity Assessments Take Center Stage as Legal and Regulatory Pressure Intensifies

Your company has just suffered a data breach, and your customers’ data has been compromised and...

Cybersecurity, concentric ai

Why Most Enterprises Can’t Find Their Sensitive Data—and What to Do About It

Today’s enterprises are pouring resources into data security, yet many still can’t answer a...

Cybersecurity, penetration testing

Choosing the Right Time to Switch Penetration Testing Providers: A Guide to Vendor Rotation Strategy

Penetration testing is a standard practice, but relying on the same provider year after year might...

COMPANY NEWS, VLCM TECH NEWS, Cybersecurity, sentinelone, awards

VLCM Named SentinelOne 2025 Regional Partner of the Year

Salt Lake City, UT – April 10, 2025 – VLCM, a leading provider of enterprise technology and...

Cybersecurity, awards, netspi

VLCM Named NetSPI's 2024 Americas Regional Partner of the Year

Salt Lake City, UT – January 15, 2025 – VLCM has been named NetSPI’s Americas Regional Partner of...

VLCM TECH NEWS, Cybersecurity, sentinelone

VLCM Named 2024 SentinelOne Regional Partner of the Year 

VLCM, a leader in enterprise technology and cybersecurity solutions, is proud to announce it has...

HP, Cybersecurity, education, K-12, HP Wolf Security

HP computers and cybersecurity: What you need to know as a K-12 IT professional

As a K-12 IT professional, you know how critical cybersecurity is for your school. Cybersecurity...

Cybersecurity, zero trust, zerto

Using Air-Gapped Recovery Systems To Be More Cyber Secure

How Zerto's Cyber Resilience Vault can help businesses protect and recover their data from...

Cybersecurity, veeam

Everything You Need to Know About Veeam's Latest Cybersecurity Update [Infographic]

At VLCM, we are always eager to share breakthroughs in cybersecurity that have the potential to...