Security Technology & Operations

HP Acquires Bromium

HP acquired Bromium, an endpoint security start-up that uses virtualization to isolate browser-based attacks, malicious downloads and applications, and email attachments...

Threat Landscape Briefing – October 2019

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals, hacktivists campaigns, data breaches, control strategies,...

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory development, announcements, and changes. This report is updated on a monthly basis.

BitSight Says Cyber Risk Ratings Are a Good Measure of Internal Risk – Is It Right?

BitSight Enterprise Analytics looks to increase the value proposition of using cyber risk ratings for internal risk management, but are they barking up the wrong tree? If...

Panorays Gifts Its Customers a Mixed Blessing in Access to Shared Assessments Program Questionnaire

Panorays has announced a partnership with Shared Assessments to provide Panorays customers with access to the Standard Information Standard (SIG) questionnaire. This is...

Threat Landscape Briefing – September 2019

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals, hacktivists campaigns, data breaches, control strategies,...

Symantec Leaves the Strongest Emotional Footprint in the IAM Space With Its Symantec VIP Product

Recent data released from SoftwareReviews' Identity Access Management (IAM) Customer Experience Report reveals Symantec VIP is performing above the rest when it comes to...

HID Now Supports Seos-Enabled Student IDs in Apple Wallet

HID officially announced its support of Seos-enabled IDs in Apple Wallet on August 13. This enables a more convenient and secure authentication process for iPhone users...

VMware Acquires Carbon Black for $2.1 Billion

VMware acquires Carbon Black, a cloud-based endpoint protection solution, at $26 per share, representing an enterprise value of $2.1 billion.

Security Incident Management Runbook: Data Breach

Use this template to help you develop an incident-specific runbook and accompanying workflows.
GET HELP Contact Us
×
VL Methodology