Security Technology & Operations

SentinelOne Partners With Automox to Offer Customers Automated Vulnerability Patching

Late last month, SentinelOne, the autonomous endpoint protection company, and Automox, a cloud-based automated patch management and configuration management solution,...

Proofpoint SOARs Above the Rest With Award-Winning Security Orchestration, Automation, and Response

Proofpoint’s Threat Response has claimed the Cybersecurity Excellent Awards Gold Winner for 2019 in the Incident Response category.

ADP – Integrating Automation of Human Capital Management With Identity Access Management

Streamlining functionality and workflows of human capital management (HCM) systems while ensuring a rigorous level of security can be challenging. ADP prides itself on...

Build a Cloud Security Strategy – Phase 2: Prioritize Initiatives and Construct a Roadmap

This phase of the blueprint Build an Cloud Security Strategy will help you prioritize and roadmap action items to better secure the cloud.

Cloud Security Governance Program Template

Use this template to ensure the continued maintenance of your cloud program's security.

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you turn your security requirements into specific tasks and develop your...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 5: Build a Cloud Security Governance Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you build the organizational structure of your cloud security governance...

No Surprise: New Survey Confirms That Most Organizations Are Ineffective at Third-Party Risk Management

A new report published by the Ponemon Institute confirms that organizations are spending an increasing amount on third-party risk management, but are failing to realize...

Ransomware Project Roadmap Tool – Example

Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.

Security Incident Management Runbook: Third-Party Incident

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us