Tech Trend Update: If Digital Ethics Then Data Equity

The COVID-19 crisis demands solutions, and some technologists might insist it's time to move fast and break things. But building new technologies without digital ethics...

Ethyca’s Additional $13.5 Million in Series A Funding Drives Momentum for Automation Features

The industry’s first self-service privacy software solution Ethyca receives its second round of investor funding, aptly timed with the release of Ethyca Pro. The privacy...

Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their...

GTB Technologies Adds Multi-Tenancy to DLP SDK

GTB Technologies, a smaller vendor known for dedicating itself solely to DLP solutions, has introduced a new multi-tenancy feature for its SDK that aims to improve...

OneTrust and Integris: Part I – The Acquisition

To further capabilities in the data privacy space, top-tier vendor OneTrust has acquired Integris, another leading vendor within the data discovery and classification...

How Will Work From Home Change Vulnerability and Patch Management for Businesses in the Future?

COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in...

HelpSystems Brings Top-Tier Data Classification Vendors to Its Product Mix

IT software company HelpSystems has acquired leading data classification software vendors Titus and Boldon James to enhance data security capabilities within its current...

Data Privacy Program Report

This template outlines the operations of your organization's data privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible...

Data Process Mapping Tool

Leverage the Data Process Mapping Tool to understand where personal data lives within each of your organization's business processes.

Build a Data Privacy Program – Phase 4: Implement and Operationalize

This phase of the blueprint, Build a Data Privacy Program, will help you to make the program functional and operational, through the use and implementation of customized...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us