Security Technology & Operations

Securing Digital Identities: Exploring LastPass' Features, Security, and Market Strategy

As digital threats evolve, LastPass' proactive security measures will continue to gain momentum and improve their market strategy, positioning them well to serve their...

Delinea’s Identity Security Platform: A Deep Dive Into Privileged Access Management

Delinea’s identity security solution integrates privileged access management with other critical security components to provide a robust solution for identity and access...

Threat Landscape Briefing – December 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

An Evaluation of Gurucul's Identity Security Analytics Platform

From the outset, Gurucul positioned itself as a pioneer in what would later be known as user and entity behavior analytics (UEBA). This early focus allowed Gurucul to...

Tabletop Program Charter Template

A template to document your objectives, scope, and other relevant information for your tabletop program.

Tabletop Rapid Needs Assessment

A tool designed to help you assess your requirements for tabletop planning.

Uptycs: Your Swiss Army Knife for CNAPP Solutions

As more organizations move to a cloud-first or hybrid deployment model, the protection of cloud-native applications is of the utmost importance. This tech note explores how...

SMBs and Cybersecurity: Finding the Right Help

Small and medium enterprises are worried about being attacked, but they underestimate the costs. A survey by Nationwide shows 69% of SMBs worry about cyberattacks, with...

Threat Landscape Briefing – January 2025

This monthly recording covers topics such as cyber threat trends, nation states, cybercriminals and hacktivists campaigns, data breaches, control strategies, and exposure...

Synchronizing the Pillars of the Security Strategy

Maturity, culture, and organizational goals are the three core pillars of any strong security strategy. Explore how each of the pillars individually contribute to a...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us