RSA Archer Among Other RSA Products Sold to Symphony Technology Group

RSA Archer, a leader in the governance, risk, and compliance space has been acquired by Symphony Technology Group, based in Palo Alto, California. Symphony, a private...

Cybersecurity Maturity Model Certification (CMMC) – Should DoD Contractors Prepare Amidst COVID-19?

A note offering guidance to organizations that have, or endeavor to have, a contract relationship with the United States Department of Defense (U.S. DoD) amid the new...

SECURITI.ai Wins Innovation Sandbox Contest at RSA Conference

Startup security vendor SECURITI.ai wins RSAC “Most Innovative Startup” at the RSA Conference 2020 Innovation Sandbox Contest.

Microsoft Unveils Tamper Support for Windows 10 Defender Advanced Threat Protection

Microsoft has added its Windows 10 Tamper Protection controls to the public version of Microsoft Defender. Previously available only to enterprise users, Tamper...

Tenable Chosen as the Successor for BeyondTrust’s Vulnerability Management Suite; BeyondTrust Steps Aside

Announced on December 31, 2019, BeyondTrust named Tenable as the successor to its Vulnerability Management suite.

ServiceNow New York is Here

ServiceNow version New York has entered General Availability. These features should delight high-maturity IT departments but are mostly worthless for low-maturity groups.

Time Study

Info-Tech Research Group conducted a research project that focused on the time management practices of cybersecurity professionals. The report was based on the responses...

Time Study Storyboard

Info-Tech Research Group conducted a research project that focused on the time management practices of cybersecurity professionals.

Quantivate Targets Credit Unions With New Compliance Management Solution

Quantivate is expanding its governance, risk, and compliance (GRC) offering with the soft launch of a compliance management system for credit unions. The product was...

Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain Certification

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you determine the scope of your certification, prepare for and pass the...
GET HELP Contact Us
×
VL Methodology