Ensure Your Pandemic Response Plan Is Privacy-Proof

Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time sensitive, scalable,...

Ensure Your Pandemic Response Plan Is Privacy-Proof Storyboard

Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time-sensitive, scalable,...

Data Process Mapping Tool Lite

Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal...

Spirion Partners With Tonic to Introduce Differential Privacy to Its Data Discovery Software

Spirion’s recent integration with synthetic data provider Tonic marks an important evolutionary step in the data privacy space. The synergistic gain enables organizations...

OneTrust Dips Its Toes Into the AI Pond With Launch of OneTrust Athena

OneTrust challenges the antiquated idea of data privacy and artificial intelligence (AI) as stark opponents, with the introduction of OneTrust Athena, the vendor’s AI and...

Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software

Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering...

Re-Evaluating Privacy and Technology During a Pandemic

When challenging and unprecedented situations occur, the initial reaction is born out of survival instincts. These short-term solutions often negate a calculated set of...

Consultation on the OPC Proposals for Ensuring Appropriate Regulation of Artificial Intelligence

In an effort to assist the Office of the Privacy Commissioner of Canada in regulating the use of AI in business contexts, Info-Tech Research Group has put forth a...

IBM Zero-Day Vulnerabilities Leave Enterprises Open to Remote Execution Attacks

Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company...

Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?

The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us