WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Infosecurity | April 16, 2020
New research published today by the Information Security Forum (ISF) predicts nine potential threats that could make 2022 a turbulent year for cybersecurity and business. The direful overarching theme of the "Threat Horizon 2022" report is that the collision of the digital and physical worlds in 2022 will spell disaster for humanity. The ISF states: "The digital and physical worlds are on an irreversible collision course. By 2022, organizations will be plunged into crisis as ruthl...
prnewswire | January 05, 2021
Owl Cyber Defense Solutions, LLC ("Owl"), a worldwide market pioneer in online protection arrangements and administrations for safeguarding network limits and empowering secure information sharing across areas, reported today the obtaining of the Trident Assured Collaboration Systems ("ACS") product offering. ACS has the solitary U.S. government-affirmed Voice over IP ("VoIP") and Video Teleconference ("VTC") Cross Domain Solution ("CDS") just as...
Data Security, Platform Security, Software Security
Lookout | January 31, 2023
Lookout, Inc., a business specializing in endpoint-to-cloud security, has announced enhanced capabilities and feature updates to its award-winning Lookout Cloud Security Platform, the only endpoint-to-cloud security solution available on the market. In addition to cloud, internet, and private applications, the cloud-native platform now includes a single policy architecture for administration and enforcement across all mobile devices.
A single agent and a single control plane for...
Data Security, Enterprise Security, Software Security
CyberArk | March 15, 2023
On March 14, 2023, CyberArk, the world leader in Identity Security, announced advancements to Workforce Password Management. The cloud-based business password management solution from CyberArk allows businesses to capture, store, and manage password-based apps and other secrets in a secure manner. Added features offer administrators with increased flexibility and power to minimize risk and enhance security for web-based applications.
Workforce Password Management is developed fo...
Enterprise Security, Platform Security, Software Security
Data Security, Enterprise Identity, Software Security
Enterprise Security, Network Threat Detection, Software Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE