Security Technology & Operations
Topics
Types of Content
Integrate Threat Intelligence Into Your Security Operations – Executive BriefRead our concise Executive Brief to find out why you should implement a threat intelligence program, review Info-Tech’s methodology, and understand the four ways we can... |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis ProcessDesign a threat intelligence analysis process that complements your existing security operations. |
|
Integrate Threat Intelligence Into Your Security OperationsOrganizations are struggling to get ahead of threats as they continue to respond reactively rather than proactively. Don’t be left behind. Develop a manageable and... |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 4: Design a Collaboration and Feedback ProgramStand up an intelligence dissemination and feedback program. |
|
Threat Intelligence Alert and Briefing Cadence Schedule TemplateFormalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary threat intelligence stakeholders. |
|
WikiLeaks – Vault 7 ReleasesWhat do the Vault 7 releases mean for you? (And what do they NOT mean.) |
|
The Shadow Brokers – Details on Leaked Cyberintelligence Tools and VulnerabilitiesThis Info-Tech briefing will provide a synopsis of what the Shadow Brokers leak might mean for users and organizations, and what actions can be taken in response to this... |
|
APT10 & Operation Cloud Hopper – Exposing a Global Cyberespionage CampaignYour managed IT service providers may be leaving you vulnerable. |
|
Endpoint Protection Roadmap & RACI ToolAssign responsibilities and deadlines for the endpoint protection implementation and management process. |
|
Select and Implement a Next Generation Endpoint Protection Solution – Executive BriefRead our Executive Brief to understand why you should consider a next generation endpoint protection solution. |
|