Build a Data Privacy Program – Phase 4: Implement and Operationalize

This phase of the blueprint, Build a Data Privacy Program, will help you to make the program functional and operational, through the use and implementation of customized...

Data Privacy Program Report

This template outlines the operations of your organization's data privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible...

Alation Launches Active Data Governance

Data intelligence software vendor Alation has made the move to emphasize data governance amongst its solution offerings to make the data catalog a dynamic platform for “a...

Ethyca’s Additional $13.5 Million in Series A Funding Drives Momentum for Automation Features

The industry’s first self-service privacy software solution Ethyca receives its second round of investor funding, aptly timed with the release of Ethyca Pro. The privacy...

HelpSystems Brings Top-Tier Data Classification Vendors to Its Product Mix

IT software company HelpSystems has acquired leading data classification software vendors Titus and Boldon James to enhance data security capabilities within its current...

How Will Work From Home Change Vulnerability and Patch Management for Businesses in the Future?

COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in...

OneTrust and Integris: Part I – The Acquisition

To further capabilities in the data privacy space, top-tier vendor OneTrust has acquired Integris, another leading vendor within the data discovery and classification...

GTB Technologies Adds Multi-Tenancy to DLP SDK

GTB Technologies, a smaller vendor known for dedicating itself solely to DLP solutions, has introduced a new multi-tenancy feature for its SDK that aims to improve...

Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their...

Address the Root of Your Vulnerabilities in a Resource-Tight Period

Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us