Security Risk, Strategy & Governance

Galvanize’s GRC Products Continue to Deliver

Since its acquisition of Rsam in 2019, Galvanize (formerly ACL) has maintained its high-quality delivery of cloud-based security, risk management, compliance, and audit...

GTB Technologies Recognized as Best Data Loss Prevention Solutions Provider for 2020

GTB Technologies has been recognized as “Best Data Loss Prevention Solutions Provider for 2020.” With organizations addressing digital transformation and a growing remote...

Microsoft Reminds Users Office 2010 End of Support Is Coming

Microsoft will end Support for Office 2010 on October 13, 2020. It’s now time to think hard about your next steps and put together an upgrade plan to a newer version,...

RSA Archer Among Other RSA Products Sold to Symphony Technology Group

RSA Archer, a leader in the governance, risk, and compliance space has been acquired by Symphony Technology Group, based in Palo Alto, California. Symphony, a private...

Checklist for Securing Remote Workers

Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.

Working With Microsoft During an Economic Downturn

Microsoft’s deep pockets and Financing division can save your IT budget. If your Enterprise Agreement is coming up for renewal in the next six months, we will likely be...

Cybersecurity Maturity Model Certification (CMMC) – Should DoD Contractors Prepare Amidst COVID-19?

A note offering guidance to organizations that have, or endeavor to have, a contract relationship with the United States Department of Defense (U.S. DoD) amid the new...

Ensure Your Pandemic Response Plan Is Privacy-Proof

Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time sensitive, scalable,...

Ensure Your Pandemic Response Plan Is Privacy-Proof Storyboard

Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time-sensitive, scalable,...

Data Process Mapping Tool Lite

Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal...
GET HELP Contact Us
×
VL Methodology