Security Technology & Operations

Assessing Onfido: Combating Fraud With AI-Based Identity Verification

In the digital realm, trust is currency. Without robust identity verification, online interactions become a breeding ground for fraud and exploitation.

Ransomware Kill Chain Analysis

Use this tool to compare the controls you have in place to counter the ransomware killchain.

Threat Landscape Briefing – February 2024

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminals and hacktivists campaigns, data breaches, control strategies, and exposure...

Zscaler: Redefining Security in the Zero Trust Era

This analysis examines Zscaler's cloud-based security platform, with a focus on its Zero Trust Exchange (ZTE), Zero Trust Network Access (ZTNA), and broader suite of...

AppViewX: Beyond PKI Automation – A Comprehensive Machine Identity Management Solution

In today's cybersecurity landscape, managing machine identities and digital certificates across complex, hybrid multi-cloud environments is a growing challenge. As the...

Spoofing Be Gone: Abnormal Security Says Hasta la Vista, Baby, to Business and Vendor Email Compromise Scams

The conversation around security awareness training and phishing simulations has changed in the past year. The training and tools of the past simply aren’t working...

Your Employees Are the Target: Proofpoint’s Human-Centric Answer

Proofpoint, an innovator in the cybersecurity industry, has earned its reputation as a leader in email security and DLP. As the threat landscape evolves, Proofpoint has...

Beyond IGA: SailPoint's Identity Security Cloud for the Modern Enterprise

Identity governance and administration (IGA) platforms have become essential for robust security strategies in modern enterprises. SailPoint, at the forefront of IGA...

Senhasegura: An Analysis of Their Cloud Entitlements CIEM Solution and How It Complements PAM

I have met with David from senhasegura several times. He explained this translates to Secure Password in Portuguese. Founded in Brazil and available in more than 60...

The Rise of Human-Centric Data Loss Prevention: A Deep Dive Into Proofpoint’s Approach

With evolving threats and regulations, traditional DLP solutions are struggling to keep pace. Proofpoint is addressing these challenges with its Information Protection...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us