Security - Research Notes

Achieve Digital Resilience by Managing Digital Risk – Executive Brief

Digital risk exists in many new strategic initiatives and innovative projects, regardless of your industry and location. Through an amalgamation of enterprise, IT, and...

Respond to the HAFNIUM-Microsoft Exchange Attack

The HAFNIUM attack on Microsoft Exchange has left organizations reeling, and information sources are somewhat confusing as to the seriousness of the attack, what one...

Identify the Components of Your Cloud Security Architecture – Executive Brief

Read our concise Executive Brief to find out why you should identify the components of your cloud security architecture, review Info-Tech’s methodology, and understand...

Implement Risk-Based Vulnerability Management – Executive Brief

Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the...

ARP Funding and Security Considerations for Internet of Things and Operational Technology

ARP funding can open up a wealth of opportunities, including the acquisition of IoT and OT to offer remote monitoring and automation of your key infrastructure services....

The Cloud Puts Your Castle in the Sky – Now Secure It!

The cloud offers an opportunity to expand or move your operating environment to a hosted platform managed by someone else. While the cloud can have many benefits, it can...

Embed Privacy and Security Culture Within Your Organization – Executive Brief

Privacy and security are two heavy-hitting items that all organizations need to account for. Technical controls are a start, but privacy and security need to become part...

Defend Against the Evolving Threat of Ransomware

Review this publication for a summary of recent attacks, including the Kaseya VSA server compromise, typical ransomware attack vectors, and recommendations for actions to...

Threat Preparedness Using MITRE ATT&CK® – Executive Brief

Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s...

Discover and Classify Your Data – Executive Brief

Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us