StorMagic – The Magic Bullet for Key Management?

With its announcement of SvKMS, StorMagic, known for leading-edge storage solutions, has officially entered the security marketplace. SvKMS provides key management for...

IBM Zero-Day Vulnerabilities Leave Enterprises Open to Remote Execution Attacks

Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company...

Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?

The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for...

Making Sense of SIEM Pricing: The Top Four Options

As the SIEM market continues to grow, organizations have more options than ever to decide which SIEM is right for them. In the first of this five-part series on SIEM...

Global Vulnerability Management Market Outlook 2020-2023

Market researcher ResearchandMarkets.com has published its market outlook for vulnerability management tools.

Flexera – Patch Automation Capability Now Available in Software Vulnerability Manager

Flexera is leveraging artificial intelligence (AI) to offer patch automation capability within its Software Vulnerability Manager (SVM) product.

Cybersecurity Priorities in Times of Pandemic

The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. Security can never be an afterthought,...

Cybersecurity Priorities in Times of Pandemic Storyboard

The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. IT is supporting business continuity...

Cybersecurity Priorities Checklist Tool

This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...

Monitor Remote User Activity via SIEM

The COVID-19 pandemic is an opportunity for cybercriminals as organizations reduce focus on security protocols due to time-sensitive remote access initiatives. SIEM can...
GET HELP Contact Us
×
VL Methodology