Security - Research Notes

Consultation on the OPC Proposals for Ensuring Appropriate Regulation of Artificial Intelligence

In an effort to assist the Office of the Privacy Commissioner of Canada in regulating the use of AI in business contexts, Info-Tech Research Group has put forth a...

Re-Evaluating Privacy and Technology During a Pandemic

When challenging and unprecedented situations occur, the initial reaction is born out of survival instincts. These short-term solutions often negate a calculated set of...

Cybersecurity Maturity Model Certification (CMMC) – Should DoD Contractors Prepare Amidst COVID-19?

A note offering guidance to organizations that have, or endeavor to have, a contract relationship with the United States Department of Defense (U.S. DoD) amid the new...

Preying on Fear: Beware of the COVID-19 “Maps” Malware

The fear, uncertainty, and doubt created by COVID-19 provides a window of opportunity for cybercriminals to launch crisis-themed attacks. IT needs to ensure security...

Managing Security Vendors in a Pandemic

During times of global pandemics and crisis, organizations must be vigilant about risk management, especially around cybersecurity. The COVID-19 outbreak is the worst...

Monitor Remote User Activity via SIEM

The COVID-19 pandemic is an opportunity for cybercriminals as organizations reduce focus on security protocols due to time-sensitive remote access initiatives. SIEM can...

Coronavirus Pandemic Challenges Certain Aspects of Enterprise Information Security Strategy

Enterprises with small information security teams are being stretched to deliver upon their security strategy, unless they have taken steps to ensure business continuity,...

Build Your Security Operations Program From the Ground Up – Executive Brief

Security operations require a strategy because different processes need to collaborate and build upon each other to be effective. Read this Executive Brief to understand...

SIM Hijacking/Swapping – Should We Be Worried?

SIM hijacking, also known as SIM-jacking and SIM swapping, has been making the news as a way for hackers to gain access to your information. It is nothing new, but the...

2020 Security Priorities Report – Executive Brief

This storyboard will help you learn what projects security practitioners are prioritizing for 2020.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us