Security Risk, Strategy & Governance

Zoho Says Surveillance Tech Is Immoral, Aligns Ideologically With Apple

Many companies are adopting GDPR as a global standard for user privacy, but Zoho went a step further at its analyst event held in Cedar Creek, Texas, Jan. 28-30. It...

Tenable Chosen as the Successor for BeyondTrust’s Vulnerability Management Suite; BeyondTrust Steps Aside

Announced on December 31, 2019, BeyondTrust named Tenable as the successor to its Vulnerability Management suite.

Department of Defense Seeks Improved Patch Management Tech: Why You Should Care

On January 15, 2020, the Department of Defense (DoD) issued an open call to vendors to fulfill a contract to help improve their technology and inventory management.

Internet Acceptable Use Policy

Internet usage is both a necessary tool and a potential distraction and security risk. With capabilities of the Internet and users advancing daily, it is important for...

2020 Security Priorities Report – Executive Brief

This storyboard will help you learn what projects security practitioners are prioritizing for 2020.

2020 Security Priorities Report – Priority 1: Data Security

This priority of the 2020 Security Priorities Report will help you understand why data security is being prioritized by security professionals.

2020 Security Priorities Report – Priority 2: Cloud Security

This priority of the 2020 Security Priorities Report will help you understand why cloud security is being prioritized by security professionals.

2020 Security Priorities Report – Priority 3: Email Security

This priority of the 2020 Security Priorities Report will help you understand why email security is being prioritized by security professionals.

2020 Security Priorities Report – Priority 4: Security Risk Management

This priority of the 2020 Security Priorities Report will help you understand why security risk management is being prioritized by security professionals.

2020 Security Priorities Report – Priority 5: Security Awareness and Training

This priority of the 2020 Security Priorities Report will help you understand why security awareness and training is being prioritized by security professionals.
GET HELP Contact Us
×
VL Methodology