WPA2 KRACK Attack Zero-Day: Threat Information Deck

Wi-Fi Protected Access II (WPA2) is the nearly ubiquitous standard protocol used to encrypt Wi-Fi traffic and secure wireless connections – and one of its vulnerabilities...

Micro Focus Aims to Simplify Windows and Linux IAM With Its New Offering, AD Bridge

Micro Focus’s new offering, AD Bridge, extends AD policies and account management to Linux machines, simplifying identity and access management (IAM) for organizations...

Reduce and Manage Your Organization’s Insider Threat Risk

The hard digital wall has crumbled. The focus of organizations has been to protect themselves from the outside, but they equally need to assess and protect themselves...
  • guided implementation icon

Security Operations MSSP RFP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.

Understanding Regulation With Blockchain Technology – Executive Brief

Read our concise Executive Brief to find out why you should understand regulation with blockchain technology and understand how Info-Tech can support you in completing...

Symantec Helps Defend Against Fake Apps With Real DLP

Fake apps that look real have been on the rise lately as a means of stealing sensitive data. However, Symantec has sought to defend against this technique with its Threat...

Develop Necessary Documentation for GDPR Compliance Storyboard

This storyboard will help you get an understanding of the required documentation for GDPR compliance, including a data protection officer job description, data retention...

Orchestration Tool Makers Set Sights on Security and Compliance

Orchestration tool makers have set their sights on security and compliance. IT professionals should remember that “compliance as code” isn’t the easy button they might...

Security Metrics Dashboard

This tool will help you to aggregate several low-level metrics into high-level categories that demonstrate business risk and can be easily understood by the board.

Build an Information Security Strategy – Phase 3: Build the Roadmap

This phase of the blueprint, Build an Information Security Strategy, will help you prioritize your security initiatives into an actionable roadmap with your highest...
GET HELP Contact Us
×
VL Methodology