Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
|
|
The Data Source Inventory Tool will help you document relevant information pertaining to each data source to act as a point of reference document.
|
|
Data owners, data stewards, and end users are the ones who use the data on a day-to-day basis and will be able to provide the best information regarding ongoing data...
|
|
Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.
|
|
The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...
|
|
Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.
|
|
This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...
|
|
Allowing vendors to run a product demonstration without your guidance will only highlight their strengths and present a subjective and skewed view of their product offering.
|
|
This worksheet allows enterprises to profile their email security gateway (ESG) requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors....
|
|
Issuing an RFP to vendors is a critical step in your email security gateway solution selection process.
|
|