WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Cybertonica Ltd
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
Data Security
prnewswire | December 21, 2020
Pattern Micro Incorporated , the pioneer in cloud security, today declared the victors of its worldwide Capture the Flag (CTF) rivalry, a yearly occasion that exhibits the absolute most noteworthy cybersecurity ability on the planet in a straight on fight. The previous year has prompted an exceptional degree of corporate computerized presence because of monetary and social movements identified with the COVID-19 pandemic. With this move comes an interest for expanded cybersecurity,...
SentinelOne | February 17, 2022
SentinelOne, a self-contained cybersecurity platform, today announced the debut of DataSet, the company's data analytics solution. DataSet goes beyond cybersecurity use cases with the purchase of Scalyr, providing an unlimited enterprise data platform for live data queries, analytics, insights, and preservation. The Singularity XDR platform from SentinelOne was created to automatically defend against security attacks by treating cybersecurity as a data problem. AI models use d...
Software Security
GrammaTech | August 16, 2022
GrammaTech, a leading provider of application security testing products and software research services, and T.E.N., founder of the Information Security Executive® (ISE®) of the Year Awards, today announced the Product Security Executive (PSE) of the Year Awards. This annual competition will recognize individuals whose contributions have delivered advancements in security for embedded or commercial software products. Nominations are now being accepted through October 10, 2022 at Read More
Palo Alto Networks | May 12, 2022
Palo Alto Networks , the global cybersecurity leader, today urged the industry to move to Zero Trust Network Access 2.0 (ZTNA 2.0) — the foundation for a new era of secure access. ZTNA was developed as a replacement for virtual private networks (VPNs) when it became clear that most VPNs did not adequately scale and were overly permissive, but the first-generation ZTNA products (ZTNA 1.0) are too trusting and can put customers at significant risk. ZTNA 2.0 solves these problems by removing ...
Data Security, Enterprise Security
Video
Data Security, Enterprise Identity, Software Security
Whitepaper
Data Security, Enterprise Security, Software Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE