WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
GTT | March 23, 2022
GTT Communications, Inc., a leading global cloud networking provider to multinational clients, has announced its new Secure Connect offering to extend and strengthen the protection of the enterprise network connecting to the internet and accessed by users from any location. The new service is based on the SASE framework and integrates with GTT Managed SD-WAN. GTT Secure Connect leverages a single cloud platform for agile and ubiquitous delivery of network security, offering a range of features t...
prnewswire | October 08, 2020
Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today released its CISO Decisions survey, an independent global study1 that examines what most influences the Board to invest in cybersecurity and the impact this has on CISO decision-making. Based on findings from more than 900 global CISOs/Senior IT decision-makers, the research shows Boardroom investments in cybersecurity are most commonly the result of an inc...
Perimeter 81 | February 28, 2022
Perimeter 81, the Zero Trust Network Access market leader, has expanded its Security Services Edge (SSE) solution to include a Secure Web Gateway component. The Secure Web Gateway (SWG) extends the organization's remarkable simplicity of use to Web filtering, ensuring that company personnel is protected from fraudulent websites and unsafe information regardless of where they work.
The Secure Web Gateway from Perimeter 81 will restrict access to specific URLs or categories of w...
Infosecurity | January 21, 2020
An American businessman who co-founded a cybersecurity company has admitted to hiring criminals to carry out cyber-attacks against others. Tucker Preston, of Macon, Georgia, confessed to having paid threat actors to launch a series of distributed denial-of-service (DDoS) attacks between December 2015 and February 2016. DDoS attacks prevent a website from functioning by bombarding it with so much junk internet traffic that it can't handle visits from genuine users. In a New Jersey court last ...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE