Security Risk, Strategy & Governance

Responsibly Resume IT Operations in the Office

As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they move back into the office. Once the office...
  • guided implementation icon

Responsibly Resume IT Operations in the Office – Executive Brief

As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they return to the office.

Responsibly Resume IT Operations in the Office – Phases 1-5

As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they return to the office.

Resume Operations Information Security Pressure Analysis Tool

Use this tool in phase 1 of the Responsibly Resume IT Operations in the Office research to evaluate and better understand the organization's post-pandemic risk tolerance.

Responsibly Resume IT Operations in the Office – Phase 2: Repatriate People to the Office

Prepare to return your employees to the office. Ensure that IT takes into account the health and safety of employees while creating an efficient and sustainable working...

IBM Zero-Day Vulnerabilities Leave Enterprises Open to Remote Execution Attacks

Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company...

Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?

The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for...

Re-Evaluating Privacy and Technology During a Pandemic

When challenging and unprecedented situations occur, the initial reaction is born out of survival instincts. These short-term solutions often negate a calculated set of...

Consultation on the OPC Proposals for Ensuring Appropriate Regulation of Artificial Intelligence

In an effort to assist the Office of the Privacy Commissioner of Canada in regulating the use of AI in business contexts, Info-Tech Research Group has put forth a...

Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software

Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering...
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology