Use this template to take a lean approach to scoping initiatives during planning stages and tracking its progress during its execution.
|
|
These five steps will take you through what you need to know to use threat intelligence to improve your organization’s overall security, no matter what your level of...
|
|
The Brexit vote says Leave. UK-based IT leaders must start to plan for a potentially new era of trans-border data flow and the availability of IT staff. Those in the rest...
|
|
This Info-Tech briefing will provide a synopsis of what the Shadow Brokers leak might mean for users and organizations, and what actions can be taken in response to this...
|
|
Your managed IT service providers may be leaving you vulnerable.
|
|
Protect yourself against the WannaCry ransomware attack.
|
|
Use Info-Tech's Maintenance Policy to define how system maintenance procedures will operate.
|
|
The Concept of Operations Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...
|
|
Assess current prevention, detection, analysis, and response capabilities.
|
|
Threat management has become resource-intensive, requiring continuous monitoring, collection, and analysis of significant volumes of event data. Implement a next-gen...
|
|