Security Technology & Operations - Research Notes

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory developments, announcements, and changes. This report is updated on a monthly basis.

Huawei and Canada’s Recent 5G Ban: Your Supply Chain Could Still Be at Risk

This technology brief will describe Huawei’s history and its current technology focus, possible cause for concerns based on multiple allegations, and finally how use of...

Mitigate Cyber Risks During the Russia-Ukraine Conflict

Review this publication for a summary of cyber risks related to the Russia-Ukraine conflict, nation-level and Info-Tech cyber-defense recommendations, and resources to...

Log4Shell: Assess and Mitigate Your Exposure to This Critical Zero-Day

Read our Log4Shell summary report to better understand this critical zero-day exploit, how you might be affected, and what immediate action you can take.

Discover and Classify Your Data – Executive Brief

Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.

Defend Against the Evolving Threat of Ransomware

Review this publication for a summary of recent attacks, including the Kaseya VSA server compromise, typical ransomware attack vectors, and recommendations for actions to...

The Cloud Puts Your Castle in the Sky – Now Secure It!

The cloud offers an opportunity to expand or move your operating environment to a hosted platform managed by someone else. While the cloud can have many benefits, it can...

ARP Funding and Security Considerations for Internet of Things and Operational Technology

ARP funding can open up a wealth of opportunities, including the acquisition of IoT and OT to offer remote monitoring and automation of your key infrastructure services....

Implement Risk-Based Vulnerability Management – Executive Brief

Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the...

Respond to the HAFNIUM-Microsoft Exchange Attack

The HAFNIUM attack on Microsoft Exchange has left organizations reeling, and information sources are somewhat confusing as to the seriousness of the attack, what one...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us