91Ƭ

All 91Ƭ

Zendesk Data Breach – How Am I Affected?

Zendesk experienced a data breach of 10,000 accounts. Users of Zendesk Support and Zendesk Chat whose accounts were activated prior to November 1, 2016, were affected.

Slack’s Outages Cost $8.2M in Service Credits, Erodes Customer Trust

Slack's first earnings release as a publicly-traded company beat expectations on revenue and growth projections. However, a significant outage of the service in July may...

Special Letter: At the Edge ‒ The IoT Security Imperative

In this special letter, Paul Clayson, Chief Executive Officer of AgilePQ, offers a detailed explanation of what is wrong with the state of security in the coming era of the...

D2L Brightspace and Aria, an Accessibility Platform, Announce Partnership

Following on the heels of Blackboard Ally accessibility integrating with D2L, D2L announced a strategic partnership with Aria, a service for blind and low-vision people.

Satisfy Customer Requirements for Information Security

Your customers and potential customers are increasingly demanding assurance that you will meet their information security requirements. Discover best practices for managing...
  • guided implementation icon

Satisfy Customer Requirements for Information Security – Executive Brief

Read this Executive Brief to understand why you need to develop a strategy for managing customer expectations for information security, and consider whether a security...

Satisfy Customer Requirements for Information Security – Phases 1-3

This storyboard will help you satisfy customer requirements for information security and determine if SOC 2 or ISO 27001 certification is right for you.

Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand customer expectations for information security and build a...

Satisfy Customer Requirements for Information Security – Phase 2: Select a Certification Path

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand your options for obtaining a security certification and build...

Security Certification Selection Tool

Use this tool to determine whether your organization should consider SOC 2 or ISO 27001 certification to help manage customer expectations for information security.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us