Security - Research Notes

Geo-Politics and Privacy: The TikTok Tussle

The United States’ bans on TikTok are a microcosm of the larger tensions between privacy, national security, and global commerce in the digital age. The development and...

Security Strategy: Mature Your Security Practice With Strategy

Security strategy is about the choices we make to prioritize what we do to better protect our data. A comprehensive and flexible security strategy that mitigates risk is...

How to Show the Value of the Security Program

IT security is often thought of as a black hole by organization leaders unconvinced of its value. Learn how to demonstrate the value of the security program: combine...

Combating Social Engineering Attacks

Social engineering is one of those tried-and-true attack vectors that seems to be at the core of many high-profile security breaches. Take these steps to ensure your...

Cyber Insurance

Insurers are responding to an increasingly hostile cybersecurity threat environment by insisting on restrictive contractual language. Organizations must assess their...

Emphasize Response in Incident Response

​Many organizations rely on an outdated security incident management program or, worse, don’t even have one, relying instead on a reactive, case-by-case approach. Improve...

Threats of Open-Source AI

Anyone can manipulate open-source AI for nefarious and criminal purposes, which poses threats at the highest level. Organizations need new threat models to be ready for bad...

Deepfake-Powered Social Engineering Attacks – What, Me Worry?

Seeing is no longer believing. When it comes to deepfake threats, ensure your people, processes, and tools are adjusted accordingly.

Custom Vendor Landscape: Brand Protection Software

Brand protection software assists organizations with guarding against fraudulent use of product listings, websites, and other aspects that infringe intellectual property....

Custom Vendor Landscape: Third-Party Risk Management Solutions

Third-party risk management (TPRM) solutions identify, manage, and mitigate risks related to third parties, including vendors, suppliers, partners, contractors, and service...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us