This worksheet allows enterprises to profile their email security gateway (ESG) requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors....
|
|
Allowing vendors to run a product demonstration without your guidance will only highlight their strengths and present a subjective and skewed view of their product offering.
|
|
This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...
|
|
Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.
|
|
The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...
|
|
Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.
|
|
Data owners, data stewards, and end users are the ones who use the data on a day-to-day basis and will be able to provide the best information regarding ongoing data...
|
|
The Data Source Inventory Tool will help you document relevant information pertaining to each data source to act as a point of reference document.
|
|
Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
|
|
Use this tool to allow you to determine your organization's specific appropriateness for having a security awareness and training program.
|
|