Security Technology & Operations

Modernize Your Identity Authentication Practices – Phases 1-3

This blueprint will provide guidance on building an authentication roadmap to modernize your authentication strategies.

Authentication Strategy Tool

A structured tool that will help build your authentication roadmap and gain the visibility needed to modernize your practices. 

Authentication Strategy Communication Deck

A communication template that will help you present your authentication roadmap and strategy to your executives. 

Authentication Policy Template

A policy template that can be leveraged to assist with the implementation of your authentication roadmap 

Kaspersky Lab: Caught in the Crossfire – A Technical Look at the US Ban

Kaspersky Lab has been knee-deep in controversy surrounding its ties to the Russian government and potential national security risks. We try to understand the situation...

A Deep Dive Into Eracent: SBOM Management, Vulnerability Analysis, and Beyond

Eracent is a privately held IT asset management (ITAM), software asset management (SAM) and cybersecurity solution provider founded in 2000. Their roots trace back to...

Devolutions Vs. the Goliaths: How Affordability & Ease of Use Challenge the PAM Status Quo

In this tech note I take a closer look at Devolutions, a partial stack Privileged Access Management (PAM) vendor, exploring its history, market positioning, core...

Threat Landscape Briefing – July 2024

This monthly recording covers topics such as cyberthreat trends, nation-states, cybercriminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Threat Landscape Briefing – June 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and...

Zoho: Simplifying Enterprise Security Through a Unified Approach

This article explores Zoho's security suite, examining the interplay between its various products and the benefits it collectively brings to enterprise security.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us