Security Technology & Operations

Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

Security Incident Runbook Prioritization Tool

Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.

Google’s Backstory SIEM Offers Unprecedented (but Potentially Risky) Data Collection Capabilities

Chronicle’s Backstory marks Google’s first foray into the SIEM industry by introducing a SIEM that claims full data retention “forever.” Organizations must weigh the...

Security Operations MSSP RFP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.

Cloud Security Roadmap Tool

Use this tool to help prioritize your security requirement actions and to develop an action plan.

Implement Risk-Based Vulnerability Management – Phases 1-4

This is the main storyboard of a risk-based approach to vulnerability management and the reduction of your risk surface.

Censinet Enters Third-Party Risk Management Market With a Focus on US Healthcare

Censinet, a new player in the third-party risk management market, is aiming to differentiate itself by focusing specifically on US healthcare vendors. However, healthcare...

Pioneering Network Automation and Infrastructure Integrity: A Technical Overview of BackBox

BackBox represents the next generation in network automation, establishing itself as a network infrastructure integrity platform. Its robust IntelliChecks capabilities...

Be More Secure Without Passwords: Microsoft Embraces Passwordless Authentication and FIDO2

Microsoft is working to usher in the era of passwordless multi-factor authentication as passwordless API becomes an official W3C standard. Strong authentication using...

Select a Security Outsourcing Partner

A lack of time and resources prevents your organization from being able to enable security internally, making outsourcing more appealing. An effective outsourcing partner...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us