Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

WPA2 KRACK Attack Zero-Day: Threat Information Deck

Wi-Fi Protected Access II (WPA2) is the nearly ubiquitous standard protocol used to encrypt Wi-Fi traffic and secure wireless connections – and one of its vulnerabilities...

A More Versatile SIEM Could See Market Growth Up to $3.23 Billion

Analysis by Frost & Sullivan recently claimed that the Security Information and Event Management (SIEM) market will grow to $3.23 billion by 2023 as a result of recent...

Threat Landscape Briefing – July 2024

This monthly recording covers topics such as cyberthreat trends, nation-states, cybercriminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Implement Risk-Based Vulnerability Management – Phases 1-4

This is the main storyboard of a risk-based approach to vulnerability management and the reduction of your risk surface.

LogPoint Continues to Expand Into Global Markets

LogPoint, the next generation SIEM, UEBA, and big data analytics company, continues to expand into the global market outside of its European base.

Censinet Enters Third-Party Risk Management Market With a Focus on US Healthcare

Censinet, a new player in the third-party risk management market, is aiming to differentiate itself by focusing specifically on US healthcare vendors. However, healthcare...

Vulnerability Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Google’s Backstory SIEM Offers Unprecedented (but Potentially Risky) Data Collection Capabilities

Chronicle’s Backstory marks Google’s first foray into the SIEM industry by introducing a SIEM that claims full data retention “forever.” Organizations must weigh the...

Leverage Threat Intelligence for Your Organization in Five Steps

These five steps will take you through what you need to know to use threat intelligence to improve your organization’s overall security, no matter what your level of...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
Contact Us