WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Ascent InfoSec
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
BullGuard | June 09, 2020
Given the sheer quantity of SMBs, their cybersecurity directly affects local resiliency in the face of cyber threats, SMBs must embrace their importance and scale up their cybersecurity appropriately. Published research showing that one third of small a...
Data Security,Platform Security,Software Security
Saviynt | November 08, 2022
Saviynt, a leading provider of intelligent identity and access governance solutions, today announced it has successfully completed the Information Security Registered Assessor Program (IRAP) assessment. As an important validation for security vendors doing business with government agencies in Australia, the IRAP assessment confirms that Saviynt's Enterprise Identity Cloud (EIC) is assessed at the PROTECTED level. Validating the effectiveness of security controls offered by the Enterprise Ide...
Data Security
Cohere Cyber Secure and SecurityScorecard | September 24, 2021
Cohere Cyber Secure today announced a partnership with SecurityScorecard, the global leader in cybersecurity ratings, to deliver cyber ratings to customers and jointly drive market penetration with a single integrated solution. These include the most recognized companies globally across financial services, including various groups surrounding Registered Investment Advisors of Real Estate, Private Equity, Portfolio Managers, Hedge and LBO funds. As part of the partnership, Cohere will embed Secur...
MITRE | March 03, 2022
MITRE introduced MITRE Engage™, a communication, and planning framework for cyber adversary engagement, deception, and denial efforts. Engage assists chief information security officers (CISOs), cyber defenders, and vendors in implementing protection methods based on real-world adversary behavior. Adversary engagement and deception operations can halve the cost of a data breach, waste an adversary's time, and make attackers more challenging to discover. Engage is mapped ...
Enterprise Security, Platform Security, Software Security
Article
infographic
Data Security, Platform Security, Software Security
none
Whitepaper
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE