Lenovo, Superfish, MITM attacks, and SSL Interception: the Bigger Picture

Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.

Discover and Classify Your Data – Executive Brief

Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.

Discover and Classify Your Data – Phases 1-3

This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data...

Discover and Classify Your Data – Phase 1: Formalize the Classification Program

This phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your...

Data Classification Standard

Use this template to thoroughly outline details of the data classification program, including classification levels, data handling requirements, and disclaimers.

Discover and Classify Your Data – Phase 2: Discover the Data

This phase of the blueprint will help you perform and manage data discovery.

Bishop Fox Discovers Eight Vulnerabilities in ConnectWise: Patching a Managed Service Provider

Cybersecurity firm Bishop Fox identified eight vulnerabilities in ConnectWise’s remote control and remote access software.

Acronis: Exploring Core Features, Differentiators, and Security Considerations

Acronis presents a compelling option for organizations seeking a comprehensive platform that merges reliable data protection with proactive cybersecurity measures.

Citrix Systems Remain Vulnerable Despite Patching Attempts

A Citrix vulnerability first discovered on December 17, 2019 is being continually exploited by ransomware attackers despite patching attempts by Citrix.

Project Zero Extends Its Vulnerability Disclosure Agreement to 90 Days, Changes to Follow

Project Zero is changing its vulnerability disclosure policy to give software developers more time to patch vulnerabilities. The policy is now shifted to a stringent...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us