SECURITI.ai Addresses the Privacy vs. AI Debacle With the Industry’s First AI-Powered Privacy Solution

AI-powered privacy is here to stay, driven by the innovative team at SECURITI.ai. The company injects automation through AI with its PrivacyOps solution, PRIVACI, taking...

2B Advice Makes Moves to Support a Privacy-Aware Culture

The privacy management software space is rapidly becoming crowded with vendors all looking to add value. 2B Advice has released the most recent version (7.0) of its...

Proteus-Cyber Bridges the Gap Between Data Privacy and Threat Intelligence

Proteus-Cyber, a leading vendor within the privacy program management space, has added two standout features to its current privacy software offering. The Threat...

Transactional Email Service Gives Retarus a Leg Up on the Competition

Retarus, a managed service cloud-based email security platform, is a growing company to watch out for. Since its initiation in 1992, it has quickly expanded its services...

FBI Looking to Implement a Governance Risk Compliance Tool

The Department of Justice is looking to acquire a GRC tool for the Office of the CIO within the FBI’s Enterprise Information Security Section.

Google Sets Limit on How Long It Will Store Some Data

In response to criticism over data collection practices, Google is introducing default deletion of location history in its web and application activities for new accounts.

Azure Sentinel: What is it, What are the Four Key Security Fundamentals, and Why You Should Know About It

Microsoft’s cloud Security Incident Event Management (SIEM) solution leverages modern day enhancements such as Security Orchestration Automated Response (SOAR), Machine...

“Unsafe” Code Uncovered in Chrome Browser (and Chromium-Based Browsers)

Google has identified “unsafe” code in the Chromium web browser engine. This flaw introduces a potential vulnerability that effects Google Chrome, as well as all...

Rapid7 – Key Reasons Around Cloud-Native SIEM

In today’s world many security teams require a simplified holistic method to consolidate disparate log data, threat anomalies, and responses. Due to these pressured...

Webinar: 2025 Security Trend Report

To future-proof your security program, you need to understand and plan for emerging threats and trends. In this webinar we will introduce you to the future of...
GET HELP Contact Us
×
VL Methodology