Osano Applies for Certified-B Status

Osano recently released its SaaS privacy solution aimed at simplifying compliance and vendor assessments. The product feels familiar, but Osano’s ethical commitment sets...

Data Protection by Design Matrix

Use this matrix to track DPbD best practices across your IT systems, business processes, and application development.

Tenable Chosen as the Successor for BeyondTrust’s Vulnerability Management Suite; BeyondTrust Steps Aside

Announced on December 31, 2019, BeyondTrust named Tenable as the successor to its Vulnerability Management suite.

Microsoft Troubles Continue; Zero-Day Vulnerability Places Windows Users at Risk

Reported by Microsoft on January 17, the company admitted to another vulnerability in the older versions of its Windows products. A vulnerability in the remote code...

Barracuda Forensics and Incident Response Adds Extra Email Protection to Your Inbox

In late September, Barracuda Networks, Inc. announced the general availability of Barracuda Forensics and Incident Response. Previously available only to Barracuda Total...

Nymity’s Research & Alerts Receive Revamp

Privacy solution Nymity expands its product offering with the introduction of Next Generation Research & Alerts.

PAM vs. IAM Confusion Is Leading Organizations to Miss Out on Vital PAM Capabilities

Based on a recent survey conducted by Enterprise Management Associates (EMA), organizations are confused about what privileged access management (PAM) is and whether they...

Satisfy Customer Requirements for Information Security

Your customers and potential customers are increasingly demanding assurance that you will meet their information security requirements. Discover best practices for...
  • guided implementation icon

Varonis Report Identifies Widespread Shortcomings of Organizational Data Security Despite Increased Pressure of Regulations

Varonis reports that even after GDPR, businesses still are failing to effectively protect sensitive data.

Security Incident Report Template

Use this template to create a high-level summary of security incidents.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology