Hacker Compromises Data of 106 Million Capital One Customers

A hacker has compromised 106 million Capital One customers after a data breach. But the real story might be less to do with cloud security itself and more to do with...

User Data Handling Requirements Tool

This tool will help you organize the data handling requirements for users throughout each phase of data's lifecycle.

Data Classification Verification Tool

This tool will help you verify the classification levels of your data by ensuring a balance of protection for sensitive data with limited cost and user friction.

Weighing the Price of a Data Breach: FTC Fines Facebook and Equifax in the Same Week

The US Federal Trade Commission announced both a $5-billion settlement with Facebook and a $575-million penalty against Equifax in the same week. Both were for data...

Sick of Searching? TrustArc Automates Identifying Applicable Regulations

TrustArc’s introduction of Privacy Profile aims to solve an ongoing problem privacy professionals have: identifying all applicable regulations.

Apple Rushes to Fix Zoom Security Flaw

Apple has delivered a silent update to Macs, rectifying a security flaw in its Zoom web-conferencing service.

Micro Focus Aims to Simplify Windows and Linux IAM With Its New Offering, AD Bridge

Micro Focus’s new offering, AD Bridge, extends AD policies and account management to Linux machines, simplifying identity and access management (IAM) for organizations...

Netwrix Report: Growing Security Concerns Bringing Data Out of the Cloud – But Not for Good Reason

According to the latest Netwrix, concerns around data security have been encouraging 46% of organizations to move their personally identifiable information (PII) back on...

Quest Software’s Toad for Oracle SDP Addresses Data Privacy Compliance Challenges

Quest Software’s new add-on module, Toad for Oracle Standard Data Protection (SDP), automates the detection and remediation of potential violations of data privacy...

Cloud Security CAGI Tool

The Cloud Security CAGI Tool follows a custom framework in which an organization's cloud risk profile is analyzed to produce unique recommendations.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us