Security Technology & Operations

Data Breach Reporting Requirements Summary

Use this template to help keep track of your regulatory reporting requirements following a data breach.

Root-Cause Analysis Template

Use this template to help you determine the root-cause of your security incident.

Security Incident Report Template

Use this template to create a high-level summary of security incidents.

Security Incident Management Maturity Checklist ‒ Preliminary

Use this tool to help you quickly gauge your organization's current security incident management processes.

Malwarebytes Integrates With ServiceNow to Streamline the Incident Response Process

Malwarebytes’ endpoint security solutions’ cloud integration with ServiceNow simplifies the security deployment process by streamlining and documenting the entire...

SentinelOne Partners With Pax8 to Offer Endpoint Security Services

Pax8 partners with SentinelOne to offer its clientele endpoint security protection capable of preventing, detecting, and responding to cyberattacks.

Puppet Rolls Out Remediate

Puppet has rolled out Remediate. This release aligns with the ongoing consolidation between IT Operations and IT Security.

Avaya Releases New Firmware to Resolve Vulnerability in VoIP Phones

Avaya’s newly released firmware addresses a vulnerability that has survived for 10 years in VoIP phone models configured with H.323 signaling.

Microsoft Defender ATP Is “Generally Available” for Macs

As of June 28, Microsoft has expanded its flagship endpoint security platform, Microsoft Defender Advanced Threat Protection (ATP), to support Mac operating systems.

Ayehu Bridges Gap Between IT Ops and Sec Ops

Ayehu is working to bridge the gap between IT Operations and Security Operations. We expect to see more vendor product offerings follow suit.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us