data security

A fishhook pierces a paper envelope hovering above a smartphone screen displaying colorful digital code, symbolizing a phishing cyberattack targeting mobile devices and sensitive data.
| 2 min read
A giant robot peers over a group of office workers, symbolizing the security risks of shadow AI use in the lab
| 2 min read
A cybersecurity analyst for a laboratory looks at his computer, with other screens running programs in the background
| 5 min read
A wide shot of the Microsoft sign outside a glass-walled office building
| 2 min read
Researchers working in a high-security laboratory with computers, microscopes, and protective gear
| 4 min read
The silhouette of a hand cut out of a block of binary code. Shadow IT can lead to security vulnerabilities in a lab's IT infrastructure.
| 3 min read
a padlock attached to a feli folder illustrating the need for a laboratory document managment system
Updated | 3 min read
Page 1 of 4 - 35 Total Items

CURRENT ISSUE - November/December 2025

AI & Automation

Preparing Your Lab for the Next Stage

Lab Manager Nov/Dec 2025 Cover Image