Download: The Risk Mitigation Handbook for Connected Medical Devices

Wondering what it takes to secure clinical networks in your healthcare organization? Get The Risk Mitigation Handbook for Connected Medical Devices, a practical approach to risk mitigation in connected healthcare. Phase 1: Understanding your environmen… Continue reading Download: The Risk Mitigation Handbook for Connected Medical Devices

Podcast – Malcolm, a new tool for network visibility

Jens Wiesner of the German BSI explores Malcolm, a new (free, open source) tool for OT network visibility, brought to us by the U.S. Idaho National Labs (INL).
The post Podcast – Malcolm, a new tool for network visibility appeared first on Help N… Continue reading Podcast – Malcolm, a new tool for network visibility

Template: Assess the performance of your security team

Assessing the performance of your security team is critical to knowing your current posture, as well as planning ahead. The Ultimate 2019 Security Team Assessment Template captures all the KPIs of the security team main pillars, and provides a simple w… Continue reading Template: Assess the performance of your security team

Download: Internal compliance assessment templates

The Comprehensive Security Guide provides security executives with a single document that gathers standardized and easy to use templates of all main compliance frameworks: PCI-DSS, HIPAA, NIST Cyber Security Framework and GDPR. Prior to having an exter… Continue reading Download: Internal compliance assessment templates

Whitepaper: Cybersecurity is improving, but is it enough?

Digital transformation initiatives are pushing many organizations into unfamiliar territory that they are not equipped to protect. This primary 451 Research paper, commissioned by eSentire, examines advancements organizations have made in improving the… Continue reading Whitepaper: Cybersecurity is improving, but is it enough?

Download PPT template: Build your 2020 security plan

The end of the year is coming and it’s time for security decision makers to make plans for 2020 and get management approval. Typically, this entails making a solid case regarding why current resources, while yielding significant value, need to be reall… Continue reading Download PPT template: Build your 2020 security plan

Whitepaper: Busting the myth that more threat intel feeds lead to better security

It’s a common misconception that a large quantity of threat intelligence feeds leads to more effective security. Unfortunately, threat feed overindulgence can lead to confusion, disorganization, and inaccurate threat reports. Instead of adding more thr… Continue reading Whitepaper: Busting the myth that more threat intel feeds lead to better security