Security Technology & Operations

Custom Vendor Landscape: Patch Management Software

Vulnerability and Patch Management Software is an essential tool in bolstering an organization’s cybersecurity. Vulnerability Management consists of the complete process...

Employee Access Change Process

Use this template to document the current- or target-state IAM processes related to managing access when employees change roles.

IAM Improvement Strategy Communication Deck

Use this tool to capture the essential elements of your IAM improvement strategy.

Pioneering Network Automation and Infrastructure Integrity: A Technical Overview of BackBox

BackBox represents the next generation in network automation, establishing itself as a network infrastructure integrity platform. Its robust IntelliChecks capabilities...

Securing the Identity Perimeter: An In-Depth Look at SpecterOps and BloodHound Enterprise

I speak to many cybersecurity vendors, some are good, some are not memorable, but others excel. Recently, one company I briefed with stood out to me for its innovative...

Threat Landscape Briefing – October 2024

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminal and hacktivist campaigns, data breaches, control strategies, and exposure to...

Threat Landscape Briefing – November 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and...

Custom Vendor Landscape: Enterprise Browsers

Enterprise Browser software is a growing industry, catering to the increasing focus on cybersecurity and zero trust network access.

AKA Identity: Revolutionizing Identity Management With Intelligent Data-Driven Insights

For many cybersecurity leaders, identity governance remains a critical yet challenging area. Traditional solutions are complex, costly, and prone to fail. Meet AKA...

Threat Landscape Briefing – December 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure...
Visit our IT Crisis Response Resource Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us