WPA2 KRACK Attack Zero-Day: Threat Information Deck

Wi-Fi Protected Access II (WPA2) is the nearly ubiquitous standard protocol used to encrypt Wi-Fi traffic and secure wireless connections – and one of its vulnerabilities...

Micro Focus Aims to Simplify Windows and Linux IAM With Its New Offering, AD Bridge

Micro Focus’s new offering, AD Bridge, extends AD policies and account management to Linux machines, simplifying identity and access management (IAM) for organizations...

Reduce and Manage Your Organization’s Insider Threat Risk

The hard digital wall has crumbled. The focus of organizations has been to protect themselves from the outside, but they equally need to assess and protect themselves...
  • guided implementation icon

Understanding Regulation With Blockchain Technology – Executive Brief

Read our concise Executive Brief to find out why you should understand regulation with blockchain technology and understand how Info-Tech can support you in completing...

Symantec Helps Defend Against Fake Apps With Real DLP

Fake apps that look real have been on the rise lately as a means of stealing sensitive data. However, Symantec has sought to defend against this technique with its Threat...

Develop Necessary Documentation for GDPR Compliance Storyboard

This storyboard will help you get an understanding of the required documentation for GDPR compliance, including a data protection officer job description, data retention...

Prebuilt, Layered Campaign Kits Make Security Awareness and Training a Low-Effort, High-Value Initiative

Infosec now offers campaign kits through its Infosec IQ product: prebuilt campaigns consisting of layered training materials and implementation recommendations. While...

Orchestration Tool Makers Set Sights on Security and Compliance

Orchestration tool makers have set their sights on security and compliance. IT professionals should remember that “compliance as code” isn’t the easy button they might...

Security Metrics Dashboard

This tool will help you to aggregate several low-level metrics into high-level categories that demonstrate business risk and can be easily understood by the board.

Design and Implement a Vulnerability Management Program – Phases 1-4

This storyboard will help you create a vulnerability management program that identifies, prioritizes, and remediates vulnerabilities. It will help you build a repeatable...
GET HELP Contact Us
×
VL Methodology