WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Cymulate | August 12, 2022
Cymulate, the leader in Continuous Threat Exposure Management, today announced the expansion of its Extended Security Posture Management (XSPM) Platform to include advanced insights and analytics capabilities. As businesses struggle to manage attack surfaces and validate security controls, these new data-driven capabilities significantly improve risk visibility and deliver actionable insights for reducing remediation time. Businesses also now gain enhanced levels of granularity for setting and t...
DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY
BeyondTrust | November 04, 2022
BeyondTrust, the leader in intelligent identity and access security today released its annual forecast of cybersecurity trends emerging for the New Year and beyond. These projections, authored by BeyondTrust experts Morey J. Haber, Chief Security Officer and Brian Chappell, Chief Security Strategist, EMEA/APAC, are based on shifts in technology, threat actor habits, culture, and decades of combined experience.
Prediction #1: Negative, Zero, and Positive Trust -- N...
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Apiiro | September 12, 2022
Apiiro, the leader in Cloud-Native Application Security, today announced it is a platinum sponsor of Cloud Native SecurityCon, an event designed to foster collaboration, discussion and knowledge sharing of cloud native security projects to address security challenges and opportunities.
The in-person event takes place October 24-25, 2022 in Detroit, MI and will showcase breakthrough technology and advances in modern cybersecurity approaches including secure software development and...
ProtectedBy.A | June 09, 2021
A world leader in artificial intelligence driven solutions, ProtectedBy.AI, is launching CodeLock. This has been designed as its patented revolutionary approach to prevent insertion attacks that may occur in a software supply chain.
The recent cyberattacks with Colonial Pipeline, with SolarWinds, and JBS have destroyed many organizations globally. Globally, including the attacks on multiple U.S. government agencies could have prevented by using CodeLock™.
DATA SECURITY, ENTERPRISE IDENTITY, SOFTWARE SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE