Security Technology & Operations

Implement Risk-Based Vulnerability Management – Phases 1-4

This is the main storyboard of a risk-based approach to vulnerability management and the reduction of your risk surface.

Kaspersky Lab: Caught in the Crossfire – A Technical Look at the US Ban

Kaspersky Lab has been knee-deep in controversy surrounding its ties to the Russian government and potential national security risks. We try to understand the situation...

Cloud Security Roadmap Tool

Use this tool to help prioritize your security requirement actions and to develop an action plan.

Orchestration Tool Makers Set Sights on Security and Compliance

Orchestration tool makers have set their sights on security and compliance. IT professionals should remember that “compliance as code” isn’t the easy button they might...

Leverage Threat Intelligence for Your Organization in Five Steps

These five steps will take you through what you need to know to use threat intelligence to improve your organization’s overall security, no matter what your level of...

Security Incident Runbook Prioritization Tool

Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.

WPA2 KRACK Attack Zero-Day: Threat Information Deck

Wi-Fi Protected Access II (WPA2) is the nearly ubiquitous standard protocol used to encrypt Wi-Fi traffic and secure wireless connections – and one of its vulnerabilities...

Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

Security Operations MSSP RFP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.

Select a Security Outsourcing Partner

A lack of time and resources prevents your organization from being able to enable security internally, making outsourcing more appealing. An effective outsourcing partner...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us