Security Technology & Operations

Design a Coordinated Vulnerability Disclosure Program – Phase 1: Assess Goals

This phase of the blueprint, Assess Goals, will help you identify business requirements, customer expectations, and compliance obligations for the coordinated...

Design a Coordinated Vulnerability Disclosure Program – Phase 2: Formalize the Program

This phase of the blueprint, Formalize the Program, will help you create a coordinated vulnerability disclosure policy and plan.

Coordinated Vulnerability Disclosure Policy

Use Info-Tech's Coordinated Vulnerability Disclosure Policy to specify the parameters of your program.

Coordinated Vulnerability Disclosure Plan

Use Info-Tech's Coordinated Vulnerability Disclosure Plan to detail the response procedures of the program.

Coordinated Vulnerability Disclosure Workflow

Use Info-Tech's Coordinated Vulnerability Disclosure Workflow to visualize the response procedures of the program.

Qualys and Ivanti Partnership Boasts an Incredibly Robust Vulnerability Management Platform

Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti...

Malwarebytes Endpoint Detection and Response Rated #1 in Endpoint Protection Data Quadrant

Based on data collected from real users, Malwarebytes Endpoint Detection and Response (EDR) took the number one spot on SoftwareReviews’ Endpoint Protection Data Quadrant...

RiskSense Releases a Unified Infrastructure Security Risk Management Program

RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation...

University Researchers Use AI to Highlight Zoom’s Privacy Risks

University researchers used artificial intelligence in an experiment to determine the extent of privacy risks that come with the use of this web conferencing tool....

Signal Sciences Shows Off Its Next-Gen WAF and RASP at Black Hat 2019

Signal Sciences showed off its award-winning next-gen web application firewall and runtime application self-protection product at Black Hat 2019. It has become one of the...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us