Security Technology & Operations

Ransomware Kill Chain Analysis

Use this tool to compare the controls you have in place to counter the ransomware kill chain.

Threat Landscape Briefing – February 2024

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminals and hacktivists campaigns, data breaches, control strategies, and exposure to...

Zscaler: Redefining Security in the Zero Trust Era

This analysis examines Zscaler's cloud-based security platform, with a focus on its Zero Trust Exchange (ZTE), Zero Trust Network Access (ZTNA), and broader suite of...

AppViewX: Beyond PKI Automation – A Comprehensive Machine Identity Management Solution

In today's cybersecurity landscape, managing machine identities and digital certificates across complex, hybrid multi-cloud environments is a growing challenge. As the...

Spoofing Be Gone: Abnormal Security Says Hasta la Vista, Baby, to Business and Vendor Email Compromise Scams

The conversation around security awareness training and phishing simulations has changed in the past year. The training and tools of the past simply aren’t working against...

Threat Landscape Briefing – March 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Acronis: Exploring Core Features, Differentiators, and Security Considerations

Acronis presents a compelling option for organizations seeking a comprehensive platform that merges reliable data protection with proactive cybersecurity measures.

Threat Landscape Briefing – April 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Maximizing Security: Choosing the Best Multifactor Authentication Tool (MFA) for Your Company

"Fortresstify" your company's defenses with the right multifactor authentication (MFA) tool. This article dives deep into the world of MFA, exploring its features, key...

Senhasegura: An Analysis of Their Cloud Entitlements CIEM Solution and How It Complements PAM

I have met with David from senhasegura several times. He explained this translates to Secure Password in Portuguese. Founded in Brazil and available in more than 60...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us