91Ƭ

Security Technology & Operations

Exponential Phishing With Generative AI

AI-enabled phishing is here. AI will be used by attackers for intelligence gathering, analyzing social media profiles, online behavior, and publicly available information...

Deepfake-Powered Social Engineering Attacks – What, Me Worry?

Seeing is no longer believing. When it comes to deepfake threats, ensure your people, processes, and tools are adjusted accordingly.

Securing the Digital Identity: The Critical Role of Proofpoint's ITDR in Modern Cybersecurity

Proofpoint's Identity Threat Detection and Response (ITDR) solution, known as Identity Threat Defense (ITD), emerges as a beacon of security, offering not just a shield but...

One-Page Emergency Incident Response Plan

Use this tool to develop an emergency incident response plan on a single page.

Threat Landscape Briefing – September 2024

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminal and hacktivist campaigns, data breaches, control strategies, and exposure to...

Ransomware Payment Policy Template

Use this template to create a ransomware payment policy BEFORE you're faced with a difficult decision. This policy will guides your decision based on criteria you've...

Secure Your Perimeterless Network Storyboard

Determine which methods and tools are required to support your security pillars in a perimeterless environment.

Secure Your Perimeterless Network

Due to the increased attack surface of perimeterless networks, whether it is location, devices, or distributed resources in a cloud environment, considerations for security...

Perimeterless Network Vendor Evaluation Tool

This tool helps identify successful vendor candidates for shortlisting based on a unique, user-defined set of characteristics.

Beyond Traditional IGA: Lumos Delivers Zero Trust Identity Governance for the Modern Enterprise

As cyberthreats continue to evolve, managing access to sensitive resources is a growing challenge for organizations. Lumos, a relatively new player in the identity...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us