Cisco Suffers Security Flaw With Zoom Interoperability

Cisco is beginning to lose patience with its Zoom interoperability after another Zoom security risk: access for the Zoom Connector for Cisco hosted on zoom.us did not...

Darktrace Masters the Art of Storytelling With Cyber AI Analyst

Darktrace introduced a “Cyber AI Analyst” in September 2019 as a means of offloading incident management responsibilities from InfoSec practitioners. This new feature...

Puppet Rolls Out Remediate

Puppet has rolled out Remediate. This release aligns with the ongoing consolidation between IT Operations and IT Security.

Avaya Releases New Firmware to Resolve Vulnerability in VoIP Phones

Avaya’s newly released firmware addresses a vulnerability that has survived for 10 years in VoIP phone models configured with H.323 signaling.

Ayehu Bridges Gap Between IT Ops and Sec Ops

Ayehu is working to bridge the gap between IT Operations and Security Operations. We expect to see more vendor product offerings follow suit.

Hacker Compromises Data of 106 Million Capital One Customers

A hacker has compromised 106 million Capital One customers after a data breach. But the real story might be less to do with cloud security itself and more to do with...

Apple Rushes to Fix Zoom Security Flaw

Apple has delivered a silent update to Macs, rectifying a security flaw in its Zoom web-conferencing service.

Security Metrics KPX Dashboard

This tool will help you track and present your key performance indexes for security metrics.

Board-Level Security Metrics Presentation Template

This template will help you assemble a board-level metrics presentation.

Are Cyberattacks Like Natural Disasters?

Cyberattacks are terrible and require the same dedication to overcome them as would any other disaster response effort. Just like natural disasters, cyberattacks cause...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us