Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.
|
|
This is the main storyboard of a risk-based approach to vulnerability management and the reduction of your risk surface.
|
|
Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the...
|
|
Vulnerabilities will always exist. Addressing these will consume your department’s time and resources, and your efforts will quickly become stale as new vulnerabilities...
|
|
Use this policy template to define and support your organization's release and patch management program.
|
|
Microsoft’s end-of-life support for Windows 7 has run into its first set of issues with its extended security updates (ESUs). Administrators who paid for the ESU found...
|
|
Pax8 partners with SentinelOne to offer its clientele endpoint security protection capable of preventing, detecting, and responding to cyberattacks.
|
|
IBM is divesting BigFix, Domino, Notes, and other software lines to HCL. It’s not a reason to jump ship, but do a muster drill to be safe.
|
|