Security Technology & Operations

Authentication Strategy Tool

A structured tool that will help build your authentication roadmap and gain the visibility needed to modernize your practices. 

Authentication Standard Template

A standard template that will assist with the execution of your authentication policies.

Authentication Policy Template

A policy template that can be leveraged to assist with the implementation of your authentication roadmap 

Kaspersky Lab: Caught in the Crossfire – A Technical Look at the US Ban

Kaspersky Lab has been knee-deep in controversy surrounding its ties to the Russian government and potential national security risks. We try to understand the situation...

A Deep Dive Into Eracent: SBOM Management, Vulnerability Analysis, and Beyond

Eracent is a privately held IT asset management (ITAM), software asset management (SAM) and cybersecurity solution provider founded in 2000. Their roots trace back to AT&T,...

Devolutions Vs. the Goliaths: How Affordability & Ease of Use Challenge the PAM Status Quo

In this tech note I take a closer look at Devolutions, a partial stack Privileged Access Management (PAM) vendor, exploring its history, market positioning, core features,...

Threat Landscape Briefing – July 2024

This monthly recording covers topics such as cyberthreat trends, nation-states, cybercriminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Threat Landscape Briefing – June 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...

Beyond Legacy Systems: How Verkada's Cloud Architecture Revolutionizes Physical Security

We examine Verkada's history, market position, and core offerings, providing an expert’s perspective informed by three decades of security architecture experience.

Zoho: Simplifying Enterprise Security Through a Unified Approach

This article explores Zoho's security suite, examining the interplay between its various products and the benefits it collectively brings to enterprise security.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us