Security Technology & Operations - Research Notes

Implement Risk-Based Vulnerability Management – Executive Brief

Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the four...

Respond to the HAFNIUM-Microsoft Exchange Attack

The HAFNIUM attack on Microsoft Exchange has left organizations reeling, and information sources are somewhat confusing as to the seriousness of the attack, what one should...

Respond to the SolarWinds Compromise

The extent and sophistication of this attack are staggering, and IT Security must be fully informed and take action immediately.

Mature Your Identity and Access Management Program – Executive Brief

Read our concise Executive Brief to find out how you improve the organization's Identity and Access Management practices using Info-Tech’s methodology, and understand the...

Build a Cloud Security Strategy – Executive Brief

Read our concise Executive Brief to find out why you should build a cloud security strategy, review Info-Tech’s methodology, and understand the four ways we can support you...

Build a Security Metrics Program to Drive Maturity – Executive Brief

Read this Executive Brief to understand why developing a security metrics program is beneficial, achievable, and relatively simple.

Design a Coordinated Vulnerability Disclosure Program – Executive Brief

Read this Executive Brief to understand why a coordinated vulnerability disclosure program is needed in today's modern security landscape.

Managing Security Vendors in a Pandemic

During times of global pandemics and crisis, organizations must be vigilant about risk management, especially around cybersecurity. The COVID-19 outbreak is the worst...

Monitor Remote User Activity via SIEM

The COVID-19 pandemic is an opportunity for cybercriminals as organizations reduce focus on security protocols due to time-sensitive remote access initiatives. SIEM can...

Coronavirus Pandemic Challenges Certain Aspects of Enterprise Information Security Strategy

Enterprises with small information security teams are being stretched to deliver upon their security strategy, unless they have taken steps to ensure business continuity,...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us