WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Cutting Edge CA
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Platform Security
Cynamics | March 07, 2022
Cynamics, leading provider of AI-driven Network Detection and Response solutions, today announced the release of their new offering which is dedicated for Managed Security Service Providers and Managed Service Providers. The Cynamics Managed Service solution delivers a comprehensive dashboard for Cynamics partners to view all aspects of their Cynamics services across all client networks. This new dashboard represents the next step in the continued evolution of the Cynamics solution and offering....
Software Security
Keeper Security | December 15, 2022
Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, secrets and connections, today announced their latest iOS updates which include integration of the One-Time Share feature, which enables secure record sharing on a time-limited basis, using Keeper's zero-knowledge encryption and zero-trust security model. Keeper also now integrates with Siri Shortcuts, providing users with a quicker way to control their Keeper Password Manager....
Data Security
Optiv | January 05, 2022
The cyber advisory and solutions leader, Optive, and the cybersecurity, safety, security, and private investment and advisory firm, NightDragon, have announced their innovation-driven alliance. They have decided to work together to make the technology suitable for the next-gen and serve the clients better. With the alliance, Optive will have access to a portfolio of innovative, future-focused companies from NightDragon. They will also get access to thoroughly vetted cybersecurity ...
Cisco | May 19, 2020
Social Cybersecurity is a new and emerging concept and paradigm that basically involves how better cybersecurity behaviors can be inclined positively using social influence. Practicing proper cyber hygiene in order to protect themselves and others, fr...
none
Whitepaper
Enterprise Security, Network Threat Detection, Software Security
Article
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE