Use this template to help keep track of your regulatory reporting requirements following a data breach.
|
|
Use this template to help you determine the root-cause of your security incident.
|
|
Use this template to create a high-level summary of security incidents.
|
|
Use this tool to help you quickly gauge your organization's current security incident management processes.
|
|
Malwarebytes’ endpoint security solutions’ cloud integration with ServiceNow simplifies the security deployment process by streamlining and documenting the entire...
|
|
Pax8 partners with SentinelOne to offer its clientele endpoint security protection capable of preventing, detecting, and responding to cyberattacks.
|
|
Puppet has rolled out Remediate. This release aligns with the ongoing consolidation between IT Operations and IT Security.
|
|
Avaya’s newly released firmware addresses a vulnerability that has survived for 10 years in VoIP phone models configured with H.323 signaling.
|
|
As of June 28, Microsoft has expanded its flagship endpoint security platform, Microsoft Defender Advanced Threat Protection (ATP), to support Mac operating systems.
|
|
Ayehu is working to bridge the gap between IT Operations and Security Operations. We expect to see more vendor product offerings follow suit.
|
|