WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > CBI | Cyber Security Solutions
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Software Security
Palo Alto Networks | May 12, 2022
Palo Alto Networks , the global cybersecurity leader, today urged the industry to move to Zero Trust Network Access 2.0 (ZTNA 2.0) — the foundation for a new era of secure access. ZTNA was developed as a replacement for virtual private networks (VPNs) when it became clear that most VPNs did not adequately scale and were overly permissive, but the first-generation ZTNA products (ZTNA 1.0) are too trusting and can put customers at significant risk. ZTNA 2.0 solves these problems by removing ...
SmartSens | July 27, 2020
SmartSens Technology today announced the SC500AI widescreen advanced image sensor, the latest product in the company's Advanced Imaging (AI) family.The majority of 5MP security camera sensors offer a 4:3 aspect ratio that is not optimized for the widescreen format of modern LCD displays. The SmartSens SC500AI addresses this shortcoming with 1620P 16:9 5MP video output in the same form factor. This next-generation sensor presents a marked improvement over previous designs — narrow...
Data Security
Arctic Wolf | November 09, 2021
-Arctic Wolf®, a leader in security operations, today announced the global expansion of its industry-leading cloud-native platform, the Arctic Wolf Security Operations Cloud, to provide customers and partners with unified visibility, protection, and automation, through a growing number of technical integrations. With the establishment of a European Security Operations Center (SOC) in Frankfurt, Germany, Arctic Wolf customers in any location, will have full flexibility in how their native sec...
Enterprise Security, Platform Security, Software Security
Businesswire | June 12, 2023
TuxCare, a global innovator in enterprise-grade cybersecurity, today announced general availability of its new SecureChain for Java service. With 76% of open source code used in the commercial code bases, threat groups see it as an ever-growing opportunity to exploit the software supply chain to access a vast number of targets. Cybercriminals understand that open source supply chains are often complex, with software often relying on numerous third-party open source libraries tha...
Whitepaper
Video
Cloud Security
Article
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE