Security - Research Notes

Discover and Classify Your Data – Executive Brief

Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.

Find the Right Balance Between Privacy and Security for K-12

Finding the right balance between security and privacy is difficult for K-12. IT is responsible for protecting faculty, staff, and students, but must do so while...

An Increase in Cyberthreat Actor Campaigns Impacting the Global Critical Infrastructure

Headlines are filled with news about advanced persistent threats orchestrated by nation state, cybercriminal, and hacktivist threat actors. This is driving world leaders...

Petya/NOPetya – Addressing the Destructive Ransomware Attack

Protect yourself against the Petya/NOPetya ransomware attack.

Avoid the Next Heartbleed

This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...

Build, Optimize, and Present a Risk-Based Security Budget – Executive Brief

Read this Executive Brief to understand how to build a risk-based budget and what requirements you need for a defensible security budget.

Lenovo, Superfish, MITM attacks, and SSL Interception: the Bigger Picture

Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.

Develop a Security Awareness and Training Program That Empowers End Users – Executive Brief

Read this Executive Brief to understand why a human-centric security program is needed to raise your security culture and prevent end users from being your largest...

Integrate Threat Intelligence Into Your Security Operations – Executive Brief

Read our concise Executive Brief to find out why you should implement a threat intelligence program, review Info-Tech’s methodology, and understand the four ways we can...

Implement Risk-Based Vulnerability Management – Executive Brief

Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us