Platform
Platform Overview
Platform Integrations
Security Frameworks
Professional Services
Knowledge
Resources
Blog
Client Case Studies
Knowledge Center
Packages
Partners
Our Partners
Become an MSP Partner
Partner With Ostendio
About Us
About Ostendio
Serious Security Manifesto
Audit Guarantee
News & Awards
Platform
Platform
Platform Overview
Platform Integrations
Security Frameworks
Professional Services
Knowledge
Knowledge
Resources
Blog
Client Case Studies
Knowledge Center
Packages
Partners
Partners
Our Partners
Become an MSP Partner
Partner With Ostendio
About Us
About Us
About Ostendio
Serious Security Manifesto
Audit Guarantee
News & Awards
Login
Chat With An Expert
Articles about Data Breaches & Data Privacy
April 25, 2022
3 Vendor Risk Management challenges and how to solve them
Read article
April 05, 2022
3 Steps to Establishing a Vendor Risk Management Program
Read article
March 09, 2022
Why The Location of Data is Critical to Data Security and Risk Management
Read article
February 23, 2022
Who owns data?
Read article
February 07, 2022
Do you know where your data is?
Read article
September 09, 2021
5 Most Common Vendor Risk Management Mistakes and how to avoid them
Read article
August 03, 2021
Remote vs Hybrid Work and the Real Cybersecurity Risk
Read article
July 29, 2021
3 Steps to Improve Your Company's Security Posture
Read article
July 16, 2021
How to avoid a Kaseya-type attack
Read article
August 29, 2019
Unpacking the SCF Capability Maturity Model
Read article
August 20, 2019
Cybersecurity Dictionary for 2019
Read article
August 02, 2019
What the Capital One Breach Should Teach Us About Vendor Security Management
Read article
July 25, 2019
5 lessons learned from the Equifax breach
Read article
January 14, 2019
What's Needed for the Private Market to Take Data Security Seriously?
Read article
January 04, 2019
5 Data Privacy and Security Predictions for 2019
Read article
January 02, 2019
Open Sesame! Is your password secure?
Read article