Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

Leverage Threat Intelligence for Your Organization in Five Steps

These five steps will take you through what you need to know to use threat intelligence to improve your organization’s overall security, no matter what your level of...

A More Versatile SIEM Could See Market Growth Up to $3.23 Billion

Analysis by Frost & Sullivan recently claimed that the Security Information and Event Management (SIEM) market will grow to $3.23 billion by 2023 as a result of recent...

Threat Landscape Briefing – April 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure...

Censinet Enters Third-Party Risk Management Market With a Focus on US Healthcare

Censinet, a new player in the third-party risk management market, is aiming to differentiate itself by focusing specifically on US healthcare vendors. However, healthcare...

LogPoint Continues to Expand Into Global Markets

LogPoint, the next generation SIEM, UEBA, and big data analytics company, continues to expand into the global market outside of its European base.

Vulnerability Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Incident Runbook Prioritization Tool

Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.

Google’s Backstory SIEM Offers Unprecedented (but Potentially Risky) Data Collection Capabilities

Chronicle’s Backstory marks Google’s first foray into the SIEM industry by introducing a SIEM that claims full data retention “forever.” Organizations must weigh the...

WPA2 KRACK Attack Zero-Day: Threat Information Deck

Wi-Fi Protected Access II (WPA2) is the nearly ubiquitous standard protocol used to encrypt Wi-Fi traffic and secure wireless connections – and one of its vulnerabilities...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us