CASB Vendors Up Their Threat Protection Game With Big-Name Threat Intelligence Collaborations

CASB vendors CipherCloud and Bitglass have both recently announced partnerships with big-name cyber threat intelligence (CTI) providers to improve the threat protection...

Making Sense of SIEM Pricing: Pricing by Data Volume

As the Security Information and Event Management (SIEM) market continues to grow, organizations now have more options than ever to decide which SIEM is right for them....

Titus’ Timely Release of Illuminate 2020 Pushes Privacy Angle

In early March, Titus released Titus Illuminate 2020, which was the company’s answer to the question of analyzing data at rest. This latest version of Illuminate leverages...

Varonis Moves Beyond Simple Data Classification to Provide a Privacy Perspective

In the data discovery and classification sphere, Varonis has long been associated with impressive features and a user-friendly approach to platform integration. The company...

Policy Exception Tracker

Use this tool to help you track ongoing exceptions to your security policies.

Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.

Air Canada's Temperature Testing Raises Concern for Individual Data Privacy, Explained by a Privacy Expert

In an interview with Info-Tech analysts, privacy expert Dr. Ann Cavoukian explains why Air Canada's recent mandatory temperature check policy to screen for COVID-19 should...

Acronis Cyber Protect Cloud Turns Managed Service Providers Into Managed Security Providers

More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers....

PHEMI: A Data Privacy Tool for Healthcare Providers

PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us