Security Technology & Operations

Bomgar & BMC Team Up to Speed Trouble-Ticket Resolution

For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have...

Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their...

Signal Sciences Shows Off Its Next-Gen WAF and RASP at Black Hat 2019

Signal Sciences showed off its award-winning next-gen web application firewall and runtime application self-protection product at Black Hat 2019. It has become one of the...

Address the Root of Your Vulnerabilities in a Resource-Tight Period

Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike....

Microsoft (Finally) Patches DNS Vulnerability CVE-2020-1350

Microsoft has released a patch to address vulnerability CVE-2020-1350, a Windows DNS server remote code execution vulnerability. This vulnerability’s exploit is considered...

Design a Coordinated Vulnerability Disclosure Program

Businesses prioritize speed to market over secure coding and testing practices in the development lifecycle. As a result, vulnerabilities exist naturally in software but...
  • guided implementation icon

Design a Coordinated Vulnerability Disclosure Program – Phase 1: Assess Goals

This phase of the blueprint, Assess Goals, will help you identify business requirements, customer expectations, and compliance obligations for the coordinated vulnerability...

Design a Coordinated Vulnerability Disclosure Program – Phases 1-2

This storyboard will help you develop a methodology for receiving vulnerability reports from external parties.

Design a Coordinated Vulnerability Disclosure Program – Executive Brief

Read this Executive Brief to understand why a coordinated vulnerability disclosure program is needed in today's modern security landscape.

Malwarebytes Endpoint Detection and Response Rated #1 in Endpoint Protection Data Quadrant

Based on data collected from real users, Malwarebytes Endpoint Detection and Response (EDR) took the number one spot on SoftwareReviews’ Endpoint Protection Data Quadrant...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us