91Ƭ

91Ƭ a Data Privacy Program – Phase 4: Implement and Operationalize

This phase of the blueprint, 91Ƭ a Data Privacy Program, will help you to make the program functional and operational, through the use and implementation of customized...

Tech Trend Update: If Digital Ethics Then Data Equity

The COVID-19 crisis demands solutions, and some technologists might insist it's time to move fast and break things. But building new technologies without digital ethics can...

SECURITI.ai Addresses the Privacy vs. AI Debacle With the Industry’s First AI-Powered Privacy Solution

AI-powered privacy is here to stay, driven by the innovative team at SECURITI.ai. The company injects automation through AI with its PrivacyOps solution, PRIVACI, taking...

2B Advice Makes Moves to Support a Privacy-Aware Culture

The privacy management software space is rapidly becoming crowded with vendors all looking to add value. 2B Advice has released the most recent version (7.0) of its...

FBI Looking to Implement a Governance Risk Compliance Tool

The Department of Justice is looking to acquire a GRC tool for the Office of the CIO within the FBI’s Enterprise Information Security Section.

Google Sets Limit on How Long It Will Store Some Data

In response to criticism over data collection practices, Google is introducing default deletion of location history in its web and application activities for new accounts.

Proteus-Cyber Bridges the Gap Between Data Privacy and Threat Intelligence

Proteus-Cyber, a leading vendor within the privacy program management space, has added two standout features to its current privacy software offering. The Threat...

Transactional Email Service Gives Retarus a Leg Up on the Competition

Retarus, a managed service cloud-based email security platform, is a growing company to watch out for. Since its initiation in 1992, it has quickly expanded its services...

Azure Sentinel: What is it, What are the Four Key Security Fundamentals, and Why You Should Know About It

Microsoft’s cloud Security Incident Event Management (SIEM) solution leverages modern day enhancements such as Security Orchestration Automated Response (SOAR), Machine...

“Unsafe” Code Uncovered in Chrome Browser (and Chromium-Based Browsers)

Google has identified “unsafe” code in the Chromium web browser engine. This flaw introduces a potential vulnerability that effects Google Chrome, as well as all...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us