
Osano reduces complexity for data privacy professionals
Osano announced advanced capabilities within its platform, including tighter integration of its data mapping and assessment modules and powerful reporting and risk management …

A survival guide for data privacy in the age of federal inaction
Things change fast in the world of data privacy. Just earlier this year, the question I was being asked most frequently was, “How similar will the proposed federal privacy law …

Osano releases Privacy Program Maturity Model and Data Mapping product
Osano launched the multi-level Osano Privacy Program Maturity Model alongside its new Data Mapping product to help organizations understand where personal information is being …

Organizations with poor privacy practices 80% more likely to suffer data breach
There’s a predictive relationship between responsible privacy practices and security outcomes, according to Osano. Companies with inadequate data privacy practices are …
Osano raises $5.4M to secure its market position and offer businesses enhanced data protection
Osano, a company building the first platform for data privacy transparency, has announced it has closed a Series A funding round of $5.4M. The round is co-led by LiveOak …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility