Security Technology & Operations

Develop and Implement a Security Incident Management Program – Phase 3: Maintain and Optimize

Maintain and optimize the incident management process by tracking metrics, performing tabletop exercises, and leveraging best practices.

Debunk Machine Learning Endpoint Security Solutions – Phase 2: Evaluate Vendors That Leverage Machine Learning

This phase will help you determine your endpoint security requirements and evaluate potential vendors.

Vivvo Delivers E-Services Platform CitizenOne

Canadian-based technology company Vivvo eyes government services as it launches e-services platform, CitizenOne.

Barracuda Forensics and Incident Response Adds Extra Email Protection to Your Inbox

In late September, Barracuda Networks, Inc. announced the general availability of Barracuda Forensics and Incident Response. Previously available only to Barracuda Total...

Develop Your Security Outsourcing Strategy – Executive Brief

Read this Executive Brief to understand what security responsibilities can be outsourced, the benefits of outsourcing, and the true cost of outsourcing to your organization.

Develop Your Security Outsourcing Strategy – Phases 1-3

This storyboard will help you decide which security responsibilities/functions you can outsource, select a managed security service provider (MSSP), and finally, manage...

HP Acquires Bromium

HP acquired Bromium, an endpoint security start-up that uses virtualization to isolate browser-based attacks, malicious downloads and applications, and email attachments...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 2: Identify Your Cloud Security Requirements

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you use the Cloud Security CAGI Tool to perform four unique assessments...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 3: Evaluate Vendors From a Security Perspective

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you learn how to assess and communicate with cloud vendors with...

Security Incident Management Runbook: Blank Template

Use this blank template to create your own incident-specific runbook.
GET HELP Contact Us
×
VL Methodology