WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Cogeco Peer 1
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Webinar
Conference
Software Security
GrammaTech | August 16, 2022
GrammaTech, a leading provider of application security testing products and software research services, and T.E.N., founder of the Information Security Executive® (ISE®) of the Year Awards, today announced the Product Security Executive (PSE) of the Year Awards. This annual competition will recognize individuals whose contributions have delivered advancements in security for embedded or commercial software products. Nominations are now being accepted through October 10, 2022 at Read More
Enterprise Identity,Platform Security,Identity Management
Simeio | December 27, 2022
A business needs to manage and protect the digital identities of its employees, contractors, partners, and customers. Enabling the right individuals to access the right resources at the right times for the right reasons with secure access control is needed for organizations to keep their vital information safe and secure at all times. In this regard, Simeio provides identity and access management (IAM) solutions. Using intelligent solutions, enhanced cybersecurity measures are e...
Data Security, Enterprise Security, Software Security
Businesswire | April 10, 2023
LastPass announced the expanded availability of its Security Dashboard and associated dark web monitoring and alerting, making it the only password manager providing proactive credential monitoring for all customers, including those using the product for free. The Security Dashboard is the central hub where customers can monitor the overall security of all vault credentials, including exposure to the dark web, which allows customers to better protect themselves from potential breaches....
Threatpost | February 03, 2020
Researchers said that they were able to create “phantom” images purporting to be an obstacle, lane or road sign and trick systems into believing that they are legitimate. On the scale of level 0 (no automation) to level 5 (full automation), thes...
Whitepaper
none
Software Security, API Security, Cloud Security
Video
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE