Windows 10 Security Flaw Discovered; Millions of Devices at Risk

On January 14, Microsoft issued a statement acknowledging a crucial security flaw within its Windows 10 operating systems: a failure in the Windows 10 CryptoAPI service...

Panorays Enhances Its Cyber Risk Ratings Product With New Dark Web Monitoring Features

Dark web monitoring for supply chain risk is becoming a mandatory feature for cyber risk ratings providers. Panorays’ latest press release shows that it is catching up to...

NormShield Now Allows You to Quantify Supply Chain Risk in Dollars. But Is That a Good Thing?

Normshield recently announced that it has licensed the FAIR model to allow customers to quantify supply chain security risk in terms of financial impacts. It is...

Mimecast Announces New Threat Intel Feed for Your Security Devices at Blackhat 2019

Mimecast announces a new threat intelligence platform at Blackhat 2019, offering customers a new means to feed threat intelligence into security devices such as SIEM,...

Panorays Gifts Its Customers a Mixed Blessing in Access to Shared Assessments Program Questionnaire

Panorays has announced a partnership with Shared Assessments to provide Panorays customers with access to the Standard Information Standard (SIG) questionnaire. This is...

BitSight Says Cyber Risk Ratings Are a Good Measure of Internal Risk – Is It Right?

BitSight Enterprise Analytics looks to increase the value proposition of using cyber risk ratings for internal risk management, but are they barking up the wrong tree? If...

Develop and Implement a Security Incident Management Program

Security incidents are inevitable, but how they’re dealt with can make or break an organization. Poor incident response negatively affects business practices, including...
  • guided implementation icon

Develop and Implement a Security Incident Management Program – Executive Brief

Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident...

Security Incident Management Runbook: Data Breach

Use this template to help you develop an incident-specific runbook and accompanying workflows.

Security Incident Management Runbook: Third-Party Incident

Use this template to help you develop an incident-specific runbook and accompanying workflows.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us