Malwarebytes Endpoint Detection and Response Rated #1 in Endpoint Protection Data Quadrant

Based on data collected from real users, Malwarebytes Endpoint Detection and Response (EDR) took the number one spot on SoftwareReviews’ Endpoint Protection Data Quadrant...

Qualys and Ivanti Partnership Boasts an Incredibly Robust Vulnerability Management Platform

Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti...

Remote Work Landscape Pushes Microsoft to Releases Endpoint DLP and Double Key Encryption Features for Added Data Security

Microsoft recently previewed the specific features to tackle data security and risk management for end users with Microsoft Endpoint Data Loss Prevention (DLP) and Double...

Twilio Breach and Cloud Security

By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers...

Design a Coordinated Vulnerability Disclosure Program

Businesses prioritize speed to market over secure coding and testing practices in the development lifecycle. As a result, vulnerabilities exist naturally in software but...
  • guided implementation icon

Design a Coordinated Vulnerability Disclosure Program – Executive Brief

Read this Executive Brief to understand why a coordinated vulnerability disclosure program is needed in today's modern security landscape.

Design a Coordinated Vulnerability Disclosure Program – Phases 1-2

This storyboard will help you develop a methodology for receiving vulnerability reports from external parties.

Design a Coordinated Vulnerability Disclosure Program – Phase 1: Assess Goals

This phase of the blueprint, Assess Goals, will help you identify business requirements, customer expectations, and compliance obligations for the coordinated...

Design a Coordinated Vulnerability Disclosure Program – Phase 2: Formalize the Program

This phase of the blueprint, Formalize the Program, will help you create a coordinated vulnerability disclosure policy and plan.

Coordinated Vulnerability Disclosure Policy

Use Info-Tech's Coordinated Vulnerability Disclosure Policy to specify the parameters of your program.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us