Coordinated Vulnerability Disclosure Policy

Use Info-Tech's Coordinated Vulnerability Disclosure Policy to specify the parameters of your program.

Coordinated Vulnerability Disclosure Plan

Use Info-Tech's Coordinated Vulnerability Disclosure Plan to detail the response procedures of the program.

Coordinated Vulnerability Disclosure Workflow

Use Info-Tech's Coordinated Vulnerability Disclosure Workflow to visualize the response procedures of the program.

RiskSense Releases a Unified Infrastructure Security Risk Management Program

RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation...

University Researchers Use AI to Highlight Zoom’s Privacy Risks

University researchers used artificial intelligence in an experiment to determine the extent of privacy risks that come with the use of this web conferencing tool....

Microsoft (Finally) Patches DNS Vulnerability CVE-2020-1350

Microsoft has released a patch to address vulnerability CVE-2020-1350, a Windows DNS server remote code execution vulnerability. This vulnerability’s exploit is...

Address the Root of Your Vulnerabilities in a Resource-Tight Period

Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to...

Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their...

Bomgar & BMC Team Up to Speed Trouble-Ticket Resolution

For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have...

CallStranger Vulnerability Affects Billions of IoT Devices

A vulnerability named CallStranger has been discovered, which exploits the Universal Plug-and-Play (UPNP) protocol used by billions of internet-connected devices. These...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us