Security Risk, Strategy & Governance

Osano Applies for Certified-B Status

Osano recently released its SaaS privacy solution aimed at simplifying compliance and vendor assessments. The product feels familiar, but Osano’s ethical commitment sets...

ServiceNow New York is Here

ServiceNow version New York has entered General Availability. These features should delight high-maturity IT departments but are mostly worthless for low-maturity groups.

Datex’s DataStealth Reduces Data Loss by Limiting Sensitive Data Acquisition

DataStealth is a difficult product to classify. It resembles DLP and privacy software but doesn’t fit neatly in either category. DataStealth focuses on data obfuscation,...

TrustArc Acquires Nymity, Seeks to Bolster Feature Set

TrustArc has announced the acquisition of Canadian counterpart, Nymity – a more boutique-style vendor known for its very high standard of privacy research, expertise...

Zecurion Offers Flexible Rules and Data Discovery Tool to Boost DLP Outcomes

Zecurion DLP offers a robust set of features, including optical-character and voice analysis (for images and recordings, respectively), but equally attention-grabbing is...

Demonstrate Data Protection by Design for IT Systems – Phases 1-2

Privacy is fast becoming a non-negotiable part of information security. Being able to demonstrate how your organization designs its systems for privacy will give you an...

Demonstrate Data Protection by Design for IT Systems – Phase 1: Determine What Data Protection by Design Means for You

This phase of the blueprint, Demonstrate Data Protection by Design for IT Systems, will help you use the PbD and DPbD frameworks and help you understand how they apply to...

Demonstrate Data Protection by Design for IT Systems – Phase 2: Plan for IT-System Data Protection by Design Implementation

This phase of the blueprint, Demonstrate Data Protection by Design for IT Systems, will help you demonstrate your adhearance to the DPbD principles in your IT systems.

Data Protection by Design Matrix

Use this matrix to track DPbD best practices across your IT systems, business processes, and application development.

Data Protection by Design IT Systems Record

Use this matrix to record the specific DPbD controls your organization is using to ensure data privacy across IT systems.
GET HELP Contact Us
×
VL Methodology