WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
CyberWire | May 18, 2021
The CyberWire confirmed recently that Microsoft Security's newest podcast, "Security Unlocked: CISO Series with Bret Arsenault," has debuted as part of the CyberWire's increasingly growing podcast network. The show's host, Microsoft's Chief Information Security Officer (CISO), Bret Arsenault, will speak one-on-one with industry peers as well as Microsoft executives about the most pressing cybersecurity issues today. He and his colleagues will discuss new ideas and persp...
Palo Alto Networks | May 22, 2021
Palo Alto Networks, a leader in the Forrester Wave Zero Trust eXtended Ecosystem Platform Providers, Q3 2020, today introduced five key innovations that make it easier for patrons to adopt Zero Trust across their network security stack.
Today's introductions of SaaS Security, Advanced URL Filtering, DNS Security, Cloud Identity Engine, and new ML-Powered Firewalls allow organizations to simply and effectively implement Zero Trust Network Security with four key benefits:
Datadog | April 29, 2022
Datadog, Inc., a cloud application monitoring and security platform, today announced the official release of its Application Security Monitoring (ASM) solution. ASM utilizes distributed tracing to assist security, development, and operations teams in precisely detecting code-level vulnerabilities like server-side request forgeries (SSRFs), SQL injections, cross-site scripting (XSS) assaults, and others.
Today, applications are a frequent cause of data breaches. According to Forres...
NETWORK THREAT DETECTION
BlackCloak | November 16, 2021
BlackCloak, Inc., the first Concierge Cybersecurity & Privacy™ Protection Platform for Executives and High-Profile Individuals, today officially unveiled proprietary deception technology to catch adversaries' brazen attempts to exploit a member's privacy, personal devices, or home networks.
Commonly referred to as a honeypot, BlackCloak's deception technology lures attackers interacting with a service by simulating a real-world home network. Cybercriminals an...
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE