REGISTER

Information Security

CCTNacl default Download

Massive amounts of personal data flows to and from third-party vendors, creating many privacy compliance and security challenges. With new regulations and frequent data breaches relating to third-party vendors, proper security and privacy controls must be put in place. Your organization should have access to the latest information regarding global privacy laws and security standards – that is why we created the Ultimate Vendor Risk Management Handbook.

CCTNacl default Download

Organizations worldwide struggle to implement detailed regulatory requirements for maturing privacy laws (e.g., from the EU’s General Data Protection Regulation [GDPR] or California’s Consumer Privacy Act to pending bills that are expected in India and Brazil).

lynxtn pdf Download (1.79 MB)

Cybersecurity Current white paper

 

recorded future default Download

A practical guide for security teams to unlocking the power of intelligence.

 

CCTNacl pdf Download (298 KB)

The role of privacy officer is one that is growing in importance, partly due to legislation such as the EU General Data Protection Regulation (GDPR) that stipulates the nomination of a privacy officer role with accountability specifically for data privacy.

recorded future default Download

Having access to lots of security data — alerts, vulnerability scan data, suspicious files — is great, but how do you know where to focus first? That’s where threat intelligence comes in. The Recorded Future® Browser Extension makes threat intelligence accessible from any web browser, whether you’re in your SIEM, your email security portal, your vulnerability scanner, or even your email. With one click, the browser extension surfaces real-time risk scores and evidence behind those scores and arms you with the intelligence you need to quickly prioritize what needs your immediate attention.

 

recorded future default Download

Having access to lots of security data — alerts, vulnerability scan data, suspicious files — is great, but how do you know where to focus first? That’s where threat intelligence comes in. The Recorded Future® Browser Extension makes threat intelligence accessible from any web browser, whether you’re in your SIEM, your email security portal, your vulnerability scanner, or even your email. With one click, the browser extension surfaces real-time risk scores and evidence behind those scores and arms you with the intelligence you need to quickly prioritize what needs your immediate attention.

 

CCTNacl pdf Download (648 KB)

Many enterprises rely on third-party vendors to help facilitate the delivery of products and services to their customers. However, these relationships come with risk. Data privacy must be a top priority in these relationships.

recorded future default Download

As you begin the process of selecting a threat intelligence solution, you’ll want to be sure you’ve clearly defined your needs, as well as have a good understanding of vendor capabilities.

recorded futureDownload

Find out how ThreatConnect helped a customer:

CCTNacl pdf Download (511 KB)

ClearDATA is the market leader for healthcare cloud computing and information security services for providers, life sciences, payers and healthcare technology organizations.

lynxtn pdf Download (115 KB)

This document is a quick reference guide for creating your IT risk program following some of the key elements of the NIST Cyber Security Framework.

 

recorded future default Download

Many organizations are expanding traditional threat intelligence programs to include vulnerability management, brand protection, and other critical security functions.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top