Threat Landscape Briefing – July 2024

This monthly recording covers topics such as cyberthreat trends, nation-states, cybercriminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Threat Landscape Briefing – August 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure...

Ransomware Payment Policy Template

Use this template to create a ransomware payment policy BEFORE you're faced with a difficult decision. This policy will guides your decision based on criteria you've...

Threat Landscape Briefing – September 2024

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminal and hacktivist campaigns, data breaches, control strategies, and exposure to...

One-Page Emergency Incident Response Plan

Use this tool to develop an emergency incident response plan on a single page.

Deepfake-Powered Social Engineering Attacks – What, Me Worry?

Seeing is no longer believing. When it comes to deepfake threats, ensure your people, processes, and tools are adjusted accordingly.

Exponential Phishing With Generative AI

AI-enabled phishing is here. AI will be used by attackers for intelligence gathering, analyzing social media profiles, online behavior, and publicly available information...

Emphasize Response in Incident Response

​Many organizations rely on an outdated security incident management program or, worse, don’t even have one, relying instead on a reactive, case-by-case approach. Improve...

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory developments, announcements, and changes. This report is updated on a monthly basis.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us