Security Risk, Strategy & Governance

Digital Guardian Sees Behavior Analytics as the Future of DLP

Digital Guardian has been a data loss prevention (DLP) leader for some time, so we’d all do well to listen when it says the future of DLP will focus on data, user...

Security Awareness and Training Vendor Evaluation Tool

This tool will help you discover how the organization wants to evaluate vendors in this space. Once vendors have been contacted, the tool can be used to compare them...

Quantivate Targets Credit Unions With New Compliance Management Solution

Quantivate is expanding its governance, risk, and compliance (GRC) offering with the soft launch of a compliance management system for credit unions. The product was...

KnowBe4 Completes the FedRAMP Authorization Process

On October 30, 2019, KnowBe4, a leader in the end-user security training space, was awarded Federal Risk and Authorization Management Program (FedRAMP) approval from the...

Proteus Helps Enterprises Document Privacy by Design

Privacy by Design (PbD) is a General Data Protection Regulation (GDPR) requirement, but effective implementation requires deep insight into the operation and...

National Cyber Security Alliance Names Habitu8 As Their Official Security Awareness Video Training Partner

For 2019’s National Cybersecurity Awareness Month (NCSAM), the National Cyber Security Alliance (NCSA) has named the security awareness and training vendor Habitu8 its...

KnowBe4 Releases Machine Learning Module for PhishER Platform

Security awareness and training vendor KnowBe4 has added a machine learning module called PhishML to its existing SOAR platform, PhishER.

Satisfy Customer Requirements for Information Security

Your customers and potential customers are increasingly demanding assurance that you will meet their information security requirements. Discover best practices for...
  • guided implementation icon

Satisfy Customer Requirements for Information Security – Executive Brief

Read this Executive Brief to understand why you need to develop a strategy for managing customer expectations for information security, and consider whether a security...

Satisfy Customer Requirements for Information Security – Phases 1-3

This storyboard will help you satisfy customer requirements for information security and determine if SOC 2 or ISO 27001 certification is right for you.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us