Security - Solution Sets

Optimize Security Mitigation Effectiveness Using STRIDE

Your perception of how well you are protected is only as good as the information you collect, and many organizations struggle with collecting the right information....
  • guided implementation icon

Reinforce End-User Security Awareness During Your COVID-19 Response

With the COVID-19 pandemic forcing many businesses to start operating remotely, security is often the first to suffer. Start a training program for employees on how to...

Debunk Machine Learning Endpoint Security Solutions

Traditional legacy anti-virus solutions are unable to keep up with the sheer volume of new and sophisticated endpoint attacks. As a potential solution to combat this...
  • guided implementation icon

Embed Security Architecture Into All Things IT

Assess your security needs, define security architecture principles, and define security reference architecture.

Manage Third-Party Service Security Outsourcing

A lack of time and resources prevent many CISOs and organizations from being able to enable security services and deliver them internally. In addition, there is not...
  • guided implementation icon

Tech Trend Update: If Digital Ethics Then Data Equity

The COVID-19 crisis demands solutions, and some technologists might insist it's time to move fast and break things. But building new technologies without digital ethics...

Cybersecurity Priorities in Times of Pandemic

The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. Security can never be an afterthought,...

Design a Coordinated Vulnerability Disclosure Program

Businesses prioritize speed to market over secure coding and testing practices in the development lifecycle. As a result, vulnerabilities exist naturally in software but...
  • guided implementation icon

2025 Security Trend Report

To future-proof the CISO, this 2025 Security Trends Report synthesizes input from industry leaders and subjects it to structured scenario analysis using Info-Tech...

Responsibly Resume IT Operations in the Office

As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they move back into the office. Once the office...
  • guided implementation icon
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology