WELCOME TO The Information security REPORT
Adaptive Systems Inc
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
MITRE | March 03, 2022
MITRE introduced MITRE Engage™, a communication, and planning framework for cyber adversary engagement, deception, and denial efforts. Engage assists chief information security officers (CISOs), cyber defenders, and vendors in implementing protection methods based on real-world adversary behavior.
Adversary engagement and deception operations can halve the cost of a data breach, waste an adversary's time, and make attackers more challenging to discover. Engage is mapped ...
Keysight Technologies | August 17, 2020
Keysight Technologies, Inc., a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced that the company has earned new security certifications for its full Vision portfolio of network packet brokers (NPB) which enable Federal and Regulated industries to strengthen network visibility and security.
Cybersecurity has become a critical component of government and industry systems as societies...
Coro | July 28, 2022
Coro, the all-in-one cyber security platform for mid-market organizations, growing businesses, and lean IT teams, today announced the launch of its unique Incubiz program. This program is designed to help entrepreneurs build and grow a successful business in one of the hottest markets today - cyber security - with zero risk, upfront costs, or experience needed.
Incubiz will debut in Chicago, Illinois, the location of Coro’s newest U.S. office. Small businesses account for 99...
Google | June 11, 2020
The phishing attacks applied a method known as spear phishing to tricks users into disclosing login credentials by impersonating legitimate websites.
Google-branded sites accounted for 65% of the attacks experienced during the study, while Microsoft-b...
DATA SECURITY, ENTERPRISE IDENTITY, SOFTWARE SECURITY
DATA SECURITY, ENTERPRISE IDENTITY
NETWORK THREAT DETECTION
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE