Security Risk, Strategy & Governance

Spirion Partners With Tonic to Introduce Differential Privacy to Its Data Discovery Software

Spirion’s recent integration with synthetic data provider Tonic marks an important evolutionary step in the data privacy space. The synergistic gain enables organizations...

OneTrust Dips Its Toes Into the AI Pond With Launch of OneTrust Athena

OneTrust challenges the antiquated idea of data privacy and artificial intelligence (AI) as stark opponents, with the introduction of OneTrust Athena, the vendor’s AI and...

RSA Updates RSA Archer and NetWitness Platforms

In a move to better respond to digital risk resulting from digital transformation and innovation priorities, RSA has updated the RSA Archer and NetWitness Platforms.

Hong Kong’s First Virtual Bank Selects OneSumX for Regulatory Reporting

In March 2020, ZA Bank, Hong Kong’s first virtual bank, selected the OneSumX solution from Wolters Kluwer for regulatory reporting.

Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software

Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering...

Re-Evaluating Privacy and Technology During a Pandemic

When challenging and unprecedented situations occur, the initial reaction is born out of survival instincts. These short-term solutions often negate a calculated set of...

Consultation on the OPC Proposals for Ensuring Appropriate Regulation of Artificial Intelligence

In an effort to assist the Office of the Privacy Commissioner of Canada in regulating the use of AI in business contexts, Info-Tech Research Group has put forth a...

IBM Zero-Day Vulnerabilities Leave Enterprises Open to Remote Execution Attacks

Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company...

Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?

The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for...

Responsibly Resume IT Operations in the Office

As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they move back into the office. Once the office...
  • guided implementation icon
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us