Proteus Helps Enterprises Document Privacy by Design

Privacy by Design (PbD) is a General Data Protection Regulation (GDPR) requirement, but effective implementation requires deep insight into the operation and...

HP Acquires Bromium

HP acquired Bromium, an endpoint security start-up that uses virtualization to isolate browser-based attacks, malicious downloads and applications, and email attachments...

BitSight Says Cyber Risk Ratings Are a Good Measure of Internal Risk – Is It Right?

BitSight Enterprise Analytics looks to increase the value proposition of using cyber risk ratings for internal risk management, but are they barking up the wrong tree? If...

Panorays Gifts Its Customers a Mixed Blessing in Access to Shared Assessments Program Questionnaire

Panorays has announced a partnership with Shared Assessments to provide Panorays customers with access to the Standard Information Standard (SIG) questionnaire. This is...

National Cyber Security Alliance Names Habitu8 As Their Official Security Awareness Video Training Partner

For 2019’s National Cybersecurity Awareness Month (NCSAM), the National Cyber Security Alliance (NCSA) has named the security awareness and training vendor Habitu8 its...

KnowBe4 Releases Machine Learning Module for PhishER Platform

Security awareness and training vendor KnowBe4 has added a machine learning module called PhishML to its existing SOAR platform, PhishER.

Satisfy Customer Requirements for Information Security

Your customers and potential customers are increasingly demanding assurance that you will meet their information security requirements. Discover best practices for...
  • guided implementation icon

Satisfy Customer Requirements for Information Security – Executive Brief

Read this Executive Brief to understand why you need to develop a strategy for managing customer expectations for information security, and consider whether a security...

Satisfy Customer Requirements for Information Security – Phases 1-3

This storyboard will help you satisfy customer requirements for information security and determine if SOC 2 or ISO 27001 certification is right for you.

Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand customer expectations for information security and build a...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us