Your IT department needs to operate a security operations center to protect your system and data. Find out about the best tools for the job.
By Stephen Cooper in Data Privacy Management on October 25, 2024
Botnets flood your web servers and gateways, filling up their queues and blocking legitimate access. Find how to stop them.
By Stephen Cooper in Data Privacy Management on February 26, 2024
To block hackers, you need to be able to detect their activities. We investigate intrusion detection systems.
By Stephen Cooper in Data Privacy Management on February 8, 2024
We explain everything  you need to know about privacy impact assessment, and how you can leverage it to assess potential privacy risk of new technology initiatives.
Discover everything you need to know about Data Subject Access Request (DSAR), how they are initialized and fulfilled and what strategies you need to have in place.
By Amakiri Welekwe in Data Privacy Management on October 20, 2022
Consent management is a necessary service for businesses that store personally identifiable Information or track Web users’ behavior. Find out about providers that offer consent management platforms.
By Stephen Cooper in Data Privacy Management on February 15, 2024
Your data protection legal obligations extend throughout your systems, including the parts managed and provided by other companies. Reduce the risk of failure.
By Stephen Cooper in Data Privacy Management on February 29, 2024
When you choose a piece of software or a cloud service, you rely on the competence of its supplier. You should implement vendor risk management to reduce your exposure.
By Stephen Cooper in Data Privacy Management on April 11, 2024
If you hold personally identifiable data, the first step in securing it is to know exactly where it is. We show you how.
By Stephen Cooper in Data Privacy Management on February 19, 2024
Page 3 of 7