Security Technology & Operations

IBM Zero-Day Vulnerabilities Leave Enterprises Open to Remote Execution Attacks

Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company...

Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?

The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for...

StorMagic – The Magic Bullet for Key Management?

With its announcement of SvKMS, StorMagic, known for leading-edge storage solutions, has officially entered the security marketplace. SvKMS provides key management for...

Rapid7 Penetration Tests Show That Businesses Are Getting Better at Network Security

We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at...

New York State Leads the Charge in Upcoming Zoom Security Enhancements

The Office of the Attorney General of the State of New York has reached a settlement with Zoom Video Communications. The agreement promises enhanced data security and...

Acronis Cyber Protect Cloud Turns Managed Service Providers Into Managed Security Providers

More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers....

CASB Vendors Up Their Threat Protection Game With Big-Name Threat Intelligence Collaborations

CASB vendors CipherCloud and Bitglass have both recently announced partnerships with big-name cyber threat intelligence (CTI) providers to improve the threat protection...

Design a Coordinated Vulnerability Disclosure Program – Phase 2: Formalize the Program

This phase of the blueprint, Formalize the Program, will help you create a coordinated vulnerability disclosure policy and plan.

Design a Coordinated Vulnerability Disclosure Program – Phase 1: Assess Goals

This phase of the blueprint, Assess Goals, will help you identify business requirements, customer expectations, and compliance obligations for the coordinated...

Design a Coordinated Vulnerability Disclosure Program – Phases 1-2

This storyboard will help you develop a methodology for receiving vulnerability reports from external parties.
Visit our IT Crisis Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us