Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software

Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering...

Zoom Improves Security and Privacy With Version 5.0 Update

Zoom is living up to its namesake in its responsiveness in addressing security and privacy issues that users have identified. While the upcoming 5.0 update addresses many...

Re-Evaluating Privacy and Technology During a Pandemic

When challenging and unprecedented situations occur, the initial reaction is born out of survival instincts. These short-term solutions often negate a calculated set of...

Consultation on the OPC Proposals for Ensuring Appropriate Regulation of Artificial Intelligence

In an effort to assist the Office of the Privacy Commissioner of Canada in regulating the use of AI in business contexts, Info-Tech Research Group has put forth a...

IBM Zero-Day Vulnerabilities Leave Enterprises Open to Remote Execution Attacks

Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company...

Restart the Engine of Your Project Portfolio

Restarting the engine of the project portfolio mid-pandemic won’t be as simple as turning a key and hitting the gas. Use this concise research to find the right path...

Responsibly Resume IT Operations in the Office – Phase 3: Repatriate Assets to the Office

Prepare the organization's assets for return to the office. Ensure that IT takes into account the off-license purchases and new additions to the hardware family that took...

Responsibly Resume IT Operations in the Office – Phase 4: Repatriate Workloads to the Office

Prepare and position IT to support workloads in order to streamline office reintegration. This may include leveraging pre-existing solutions in different ways and...

Responsibly Resume IT Operations in the Office – Phase 5: Prioritize Your Tasks and Build the Roadmap

Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business,...

Rapid7 Penetration Tests Show That Businesses Are Getting Better at Network Security

We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us