Weighing the Price of a Data Breach: FTC Fines Facebook and Equifax in the Same Week

The US Federal Trade Commission announced both a $5-billion settlement with Facebook and a $575-million penalty against Equifax in the same week. Both were for data...

Sick of Searching? TrustArc Automates Identifying Applicable Regulations

TrustArc’s introduction of Privacy Profile aims to solve an ongoing problem privacy professionals have: identifying all applicable regulations.

Apple Rushes to Fix Zoom Security Flaw

Apple has delivered a silent update to Macs, rectifying a security flaw in its Zoom web-conferencing service.

Micro Focus Aims to Simplify Windows and Linux IAM With Its New Offering, AD Bridge

Micro Focus’s new offering, AD Bridge, extends AD policies and account management to Linux machines, simplifying identity and access management (IAM) for organizations...

Netwrix Report: Growing Security Concerns Bringing Data Out of the Cloud – But Not for Good Reason

According to the latest Netwrix, concerns around data security have been encouraging 46% of organizations to move their personally identifiable information (PII) back on...

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

The cybersecurity skills gap is an ever-growing challenge that all organizations will eventually face. To circumvent the problem, actively plan for the shortage by...
  • guided implementation icon

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Executive Brief

Read this Executive Brief to understand why developing a technical skills sourcing plan is critical to proactively addressing skills gaps in your organization.

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phases 1-3

This storyboard will help you to take a proactive approach to identifying the needed technical skills for your future environment and to systematically decide how to...

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 1: Identity Skill Needs for Target State

This phase of the blueprint will help you define your security initiative skill needs.

Security Initiative Skills Guide

Use this template to document future initiatives skill needs.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us