Security Incident Management Policy

The purpose of this policy is to ensure proper recognition, management, and communication of security events and weaknesses through a formal process.

Puppet Rolls Out Remediate

Puppet has rolled out Remediate. This release aligns with the ongoing consolidation between IT Operations and IT Security.

Avaya Releases New Firmware to Resolve Vulnerability in VoIP Phones

Avaya’s newly released firmware addresses a vulnerability that has survived for 10 years in VoIP phone models configured with H.323 signaling.

Ayehu Bridges Gap Between IT Ops and Sec Ops

Ayehu is working to bridge the gap between IT Operations and Security Operations. We expect to see more vendor product offerings follow suit.

Hacker Compromises Data of 106 Million Capital One Customers

A hacker has compromised 106 million Capital One customers after a data breach. But the real story might be less to do with cloud security itself and more to do with...

Apple Rushes to Fix Zoom Security Flaw

Apple has delivered a silent update to Macs, rectifying a security flaw in its Zoom web-conferencing service.

Forge an Ironclad Reporting Strategy for Security Metrics – Executive Brief

Read this Executive Brief to understand how security metrics can help increase business-security alignment and improve the board's understanding of cyber risks.

Forge an Ironclad Reporting Strategy for Security Metrics Storyboard

Develop a strategy for presenting security metrics to the board by creating high-level, easy-to-digest metrics based on business risk.

Security Metrics Dashboard

This tool will help you to aggregate several low-level metrics into high-level categories that demonstrate business risk and can be easily understood by the board.

Board-Level Security Metrics Presentation Template

This template will help you condense and organize your presentation into just three slides, which will help you convey the most critical information to the board...
GET HELP Contact Us
×
VL Methodology