Malwarebytes Winter Release: A Focus on Admin Experience and Visibility

Malwarebytes, the top player on Info-Tech’s Endpoint Protection SoftwareReviews’ Data Quadrant, announced its winter release of three key product enhancements.

Zscaler Looks to Solidify Its Entry Into the CASB Market With the Acquisition of Cloudneeti

Zscaler has announced its intent to buy cloud security posture management (CSPM) vendor Cloudneeti. The move suggests that Zscaler is serious about entering the CASB market.

Comply With the California Consumer Privacy Act – Phase 1: Create a Subject Access Request (SAR) Process

This phase of the blueprint, Comply with the California Consumer Privacy Act, will help you create a subject access request process.

2020 Security Priorities Report – Priority 4: Security Risk Management

This priority of the 2020 Security Priorities Report will help you understand why security risk management is being prioritized by security professionals.

Checklist for Securing Remote Workers

Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.

KnowBe4 Releases Machine Learning Module for PhishER Platform

Security awareness and training vendor KnowBe4 has added a machine learning module called PhishML to its existing SOAR platform, PhishER.

Cybersecurity Priorities Checklist Tool

This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...

Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain Certification

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you determine the scope of your certification, prepare for and pass the...

Darktrace Masters the Art of Storytelling With Cyber AI Analyst

Darktrace introduced a “Cyber AI Analyst” in September 2019 as a means of offloading incident management responsibilities from InfoSec practitioners. This new feature...

Create a Disaster-Ready Ransomware Recovery Plan – Phases 1-4

Use this blueprint to coordinate your incident management and disaster recovery programs to plan for and mitigate the impact of ransomware.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology