Security Technology & Operations

The Changing Face of Email Security: Avanan Goes Beyond the Inbox to Integrate With O365

While email security gateways help filter out spam, prevent data loss, and inspect for malicious content, they can be easily bypassed. Avanan has patented an API-based...

Qualys Unveils Its New Vulnerability Management, Detection, and Response Matrix

Qualys’ newest product, VMDR (Vulnerability Management, Detection, and Response), will be available in March and will provide an all-in-one cloud-based solution for...

Data Breach Reporting Requirements Summary

Use this template to help keep track of your regulatory reporting requirements following a data breach.

Post-Incident Review Questions Tracking Tool

Use this template to help you determine the key questions that need to be answered at your post-incident review.

Security Incident Report Template

Use this template to create a high-level summary of security incidents.

Root-Cause Analysis Template

Use this template to help you determine the root-cause of your security incident.

Malwarebytes Integrates With ServiceNow to Streamline the Incident Response Process

Malwarebytes’ endpoint security solutions’ cloud integration with ServiceNow simplifies the security deployment process by streamlining and documenting the entire...

Puppet Rolls Out Remediate

Puppet has rolled out Remediate. This release aligns with the ongoing consolidation between IT Operations and IT Security.

HID Now Supports Seos-Enabled Student IDs in Apple Wallet

HID officially announced its support of Seos-enabled IDs in Apple Wallet on August 13. This enables a more convenient and secure authentication process for iPhone users...

Security Incident Management Maturity Checklist ‒ Preliminary

Use this tool to help you quickly gauge your organization's current security incident management processes.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us