Webinar: Create a Business-Aligned Information Security Strategy

Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful security strategy.

CORL Technologies Launches Its Vendor Risk Management Resource Center

Navigating the vendor risk management space, particularly in the current environment that consists of a mix of cloud, managed services, and critical supply chain, is key...

Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their...

GTB Technologies Adds Multi-Tenancy to DLP SDK

GTB Technologies, a smaller vendor known for dedicating itself solely to DLP solutions, has introduced a new multi-tenancy feature for its SDK that aims to improve...

HelpSystems Brings Top-Tier Data Classification Vendors to Its Product Mix

IT software company HelpSystems has acquired leading data classification software vendors Titus and Boldon James to enhance data security capabilities within its current...

OneTrust and Integris: Part I – The Acquisition

To further capabilities in the data privacy space, top-tier vendor OneTrust has acquired Integris, another leading vendor within the data discovery and classification...

Privileged Access Management (PAM) Misconceptions: Starting the Journey

During the first three months of the COVID-19 pandemic, many organizations realized the true value of IT and the role it played in ensuring ongoing business operations....

Alation Launches Active Data Governance

Data intelligence software vendor Alation has made the move to emphasize data governance amongst its solution offerings to make the data catalog a dynamic platform for “a...

CallStranger Vulnerability Affects Billions of IoT Devices

A vulnerability named CallStranger has been discovered, which exploits the Universal Plug-and-Play (UPNP) protocol used by billions of internet-connected devices. These...

Onspring Interview

I recently had the opportunity to speak with Jason Rohlf, VP Solutions, Mark Scheinkoenig, VP Commercial Sales, and Emily Figg, VP Marketing about their GRC solution at...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us