Data Privacy Management Tools, Guides & Reviews
Botnets flood your web servers and gateways, filling up their queues and blocking legitimate access. Find how to stop them.
To block hackers, you need to be able to detect their activities. We investigate intrusion detection systems.
We explain everything you need to know about privacy impact assessment, and how you can leverage it to assess potential privacy risk of new technology initiatives.
Discover everything you need to know about Data Subject Access Request (DSAR), how they are initialized and fulfilled and what strategies you need to have in place.
Consent management is a necessary service for businesses that store personally identifiable Information or track Web users’ behavior. Find out about providers that offer consent management platforms.
Your data protection legal obligations extend throughout your systems, including the parts managed and provided by other companies. Reduce the risk of failure.
When you choose a piece of software or a cloud service, you rely on the competence of its supplier. You should implement vendor risk management to reduce your exposure.
If you hold personally identifiable data, the first step in securing it is to know exactly where it is. We show you how.
Your company needs to be protected from theft or loss, and inappropriate use. We found the tools for the job.