WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Infosecurity | April 16, 2020
New research published today by the Information Security Forum (ISF) predicts nine potential threats that could make 2022 a turbulent year for cybersecurity and business. The direful overarching theme of the "Threat Horizon 2022" report is that the collision of the digital and physical worlds in 2022 will spell disaster for humanity. The ISF states: "The digital and physical worlds are on an irreversible collision course. By 2022, organizations will be plunged into crisis as ruthl...
Spacenews | January 30, 2020
Satellites and their ground infrastructure have become targets for hackers and other cyber criminals, experts warn. But many emerging companies in the space industry lack cybersecurity expertise and may be ill prepared to prevent or respond to attacks, warned Richard Leshner, vice president of government and regulatory affairs at Planet Labs. Planet Labs is a subsidiary of Planet, an Earth observation company that operates about 150 imaging satellites. Speaking Jan. 30 at the 2020 Commercial Spa...
BitSight | November 24, 2021
Exclusive Networks, a global trusted cybersecurity specialist for digital infrastructure, today announced its worldwide distribution agreement with Infinipoint, a provider of a pioneering Device-Identity-as-a-Service (DIaaS) security solution that uniquely enables the critical device pillar of the zero-trust cybersecurity approach. Focusing on mid-market aligned partners – initially in Europe covering France, Germany, and the UK with a view to extending across global territories from early...
businesswire | January 19, 2021
Digital Observer, the chief Continuous Controls Monitoring (CCM) arrangement, today declared a significant upgrade to its foundation that empowers CISOs and other security and danger the board heads to acquire new, constant, bound together perceivability into the viability of online protection instruments that are executed all through their endeavor. By ceaselessly recovering and examining Critical Security Controls (CSCs) from applications on-premises and in-cloud, Cyber Observer's CCM stag...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE