Security Technology & Operations

RiskSense Releases a Unified Infrastructure Security Risk Management Program

RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation...

Malwarebytes Endpoint Detection and Response Rated #1 in Endpoint Protection Data Quadrant

Based on data collected from real users, Malwarebytes Endpoint Detection and Response (EDR) took the number one spot on SoftwareReviews’ Endpoint Protection Data Quadrant...

Qualys and Ivanti Partnership Boasts an Incredibly Robust Vulnerability Management Platform

Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti...

Design a Coordinated Vulnerability Disclosure Program

Businesses prioritize speed to market over secure coding and testing practices in the development lifecycle. As a result, vulnerabilities exist naturally in software but...
  • guided implementation icon

Design a Coordinated Vulnerability Disclosure Program – Executive Brief

Read this Executive Brief to understand why a coordinated vulnerability disclosure program is needed in today's modern security landscape.

Design a Coordinated Vulnerability Disclosure Program – Phases 1-2

This storyboard will help you develop a methodology for receiving vulnerability reports from external parties.

Build a Security Metrics Program to Drive Maturity

Many security leaders put off adding metrics to their program because they don't know where to start or how to assess what is worth measuring.
  • guided implementation icon

Coordinated Vulnerability Disclosure Workflow

Use Info-Tech's Coordinated Vulnerability Disclosure Workflow to visualize the response procedures of the program.

Coordinated Vulnerability Disclosure Plan

Use Info-Tech's Coordinated Vulnerability Disclosure Plan to detail the response procedures of the program.

Build a Security Metrics Program to Drive Maturity – Executive Brief

Read this Executive Brief to understand why developing a security metrics program is beneficial, achievable, and relatively simple.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us