Your IT department needs to operate a security operations center to protect your system and data. Find out about the best tools for the job.
By Stephen Cooper in Data Privacy Management on November 30, 2024
Botnets flood your web servers and gateways, filling up their queues and blocking legitimate access. Find how to stop them.
By Stephen Cooper in Data Privacy Management on February 28, 2025
To block hackers, you need to be able to detect their activities. We investigate intrusion detection systems.
By Stephen Cooper in Data Privacy Management on December 20, 2024
We explain everything  you need to know about privacy impact assessment, and how you can leverage it to assess potential privacy risk of new technology initiatives.
By Amakiri Welekwe in Data Privacy Management on March 26, 2025
Discover everything you need to know about Data Subject Access Request (DSAR), how they are initialized and fulfilled and what strategies you need to have in place.
By Amakiri Welekwe in Data Privacy Management on March 13, 2025
Consent management is a necessary service for businesses that store personally identifiable Information or track Web users’ behavior. Find out about providers that offer consent management platforms.
By Stephen Cooper in Data Privacy Management on March 26, 2025
Your data protection legal obligations extend throughout your systems, including the parts managed and provided by other companies. Reduce the risk of failure.
By Stephen Cooper in Data Privacy Management on March 10, 2025
When you choose a piece of software or a cloud service, you rely on the competence of its supplier. You should implement vendor risk management to reduce your exposure.
By Stephen Cooper in Data Privacy Management on March 13, 2025
If you hold personally identifiable data, the first step in securing it is to know exactly where it is. We show you how.
By Stephen Cooper in Data Privacy Management on December 23, 2024
Page 3 of 7