Galvanize’s GRC Products Continue to Deliver

Since its acquisition of Rsam in 2019, Galvanize (formerly ACL) has maintained its high-quality delivery of cloud-based security, risk management, compliance, and audit...

GTB Technologies Recognized as Best Data Loss Prevention Solutions Provider for 2020

GTB Technologies has been recognized as “Best Data Loss Prevention Solutions Provider for 2020.” With organizations addressing digital transformation and a growing remote...

Threat Landscape Briefing – February 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

Cybersecurity Priorities in Times of Pandemic

The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. Security can never be an afterthought,...

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory development, announcements, and changes. This report is updated on a monthly basis.

Microsoft Reminds Users Office 2010 End of Support Is Coming

Microsoft will end Support for Office 2010 on October 13, 2020. It’s now time to think hard about your next steps and put together an upgrade plan to a newer version,...

SC Awards 2020: Qualys Wins Best Vulnerability Management Solution Award

SC Media had its recent 2020 SC Awards Honored in the U.S. event and has awarded Qualys recognition for Best Vulnerability Management Solution in the “Trust Awards” category.

RSA Archer Among Other RSA Products Sold to Symphony Technology Group

RSA Archer, a leader in the governance, risk, and compliance space has been acquired by Symphony Technology Group, based in Palo Alto, California. Symphony, a private...

Cybersecurity Priorities in Times of Pandemic Storyboard

The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. IT is supporting business continuity...

Cybersecurity Priorities Checklist Tool

This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...
GET HELP Contact Us
×
VL Methodology