Security Risk, Strategy & Governance

Microsoft Unveils Tamper Support for Windows 10 Defender Advanced Threat Protection

Microsoft has added its Windows 10 Tamper Protection controls to the public version of Microsoft Defender. Previously available only to enterprise users, Tamper...

Qualys Discovers Critical Flaw With OpenBSD Mail Server, Multiple Programs Vulnerable

Qualys Research Labs, a vulnerability management provider, discovered a vulnerability in the OpenSMTPD Mail server used in conjunction with the OpenBSD operating system....

United Nations Faces Cyber-Espionage; Failure to Patch Causes Breach

A leaked UN report showed that servers were compromised during a cyberattack that exploited an older version of Microsoft SharePoint. This breach is a case study in the...

Microsoft Troubles Continue; Zero-Day Vulnerability Places Windows Users at Risk

Reported by Microsoft on January 17, the company admitted to another vulnerability in the older versions of its Windows products. A vulnerability in the remote code...

Windows 7 Reaches End of Life; Are You About to Pay the Price?

Last fall, Microsoft announced that it would be ending support for Windows 7 on January 14, 2020.

Zoho Says Surveillance Tech Is Immoral, Aligns Ideologically With Apple

Many companies are adopting GDPR as a global standard for user privacy, but Zoho went a step further at its analyst event held in Cedar Creek, Texas, Jan. 28-30. It...

Tenable Chosen as the Successor for BeyondTrust’s Vulnerability Management Suite; BeyondTrust Steps Aside

Announced on December 31, 2019, BeyondTrust named Tenable as the successor to its Vulnerability Management suite.

Department of Defense Seeks Improved Patch Management Tech: Why You Should Care

On January 15, 2020, the Department of Defense (DoD) issued an open call to vendors to fulfill a contract to help improve their technology and inventory management.

2020 Security Priorities Report

Use this deck to learn what projects security practitioners are prioritizing for 2020.
  • guided implementation icon

2020 Security Priorities Report – The Five Priorities

Use this deck to understand what projects security practitioners are prioritizing for 2020.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us