Security Technology & Operations

Identity Security Architecture Tool

A structured tool to help you inventory identity types, threats, and mitigations using the MITRE ATT&CK® framework.

Log4Shell: Assess and Mitigate Your Exposure to This Critical Zero-Day

Read our Log4Shell summary report to better understand this critical zero-day exploit, how you might be affected, and what immediate action you can take.

Threat Landscape Briefing – January 2022

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control...

Security Threat Detection Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Passwordless Authentication

End users have 191 passwords to remember – can infrastructure and operations make life better for users while actually enhancing security? Understand the realizable...

Threat Landscape Briefing – October 2022

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies...

Acceptable Use of Technology Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Human Resource Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Endpoint Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Passwordless Authentication Storyboard

End users have 191 passwords to remember – can infrastructure and operations make life better for users while actually enhancing security? Understand the realizable...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us