WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > DarkTower
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Web Security Tools
Star Atlas | May 25, 2022
Star Atlas, a next-gen metaverse with triple-A game design and Unreal Engine 5 graphics built on the Solana blockchain, today announced an expanded focus on security to ensure consumer protection and digital safety in the metaverse. This multi-pronged initiative includes signing Kudelski Security, the cybersecurity division of the Kudelski Group - the world leader in digital security, and the forefront leader in providing security solutions for major blockchain-based applications, exchanges, and...
Data Security
NHC | April 08, 2021
New Horizon Communications Corp. (NHC), THE Communications STACK Provider™ supporting SMB and Enterprise organizations in North America with their VoIP, UCaaS, Contact Center, Collaboration, SD-WAN, Security, Network conglomeration and Managed Services needs, has joined forces with Check Point Software Technologies® (CHKP), settled in Tel Aviv Israel, to dispatch NHC's cloud-first Security Suite. In 2020, Gartner® named Check Point Software Technologies a pioneer...
International Airport View | January 24, 2020
ACI World and A-ISAC to work together on cyber-security Improving airports’ access to cyber-threat intelligence and actionable data is the goal of this new collaboration in the aviation industry. Collaborating to improve cyber-security awareness Airports Council International (ACI) World and the Aviation Information Sharing and Analysis Centre (A-ISAC) have announced the signing of an agreement that will better enable ACI members to join the A-ISAC for access to airport-specific cyber-thre...
Threatpost | January 28, 2020
For any organization to protect itself from cyberattacks and data breaches, it’s critical to discover and respond to cyber threats as quickly as possible. Shutting the window of vulnerabilities promptly makes the difference between a mild compromise and a catastrophic data breach. Understanding your ability to do so gives your organization a powerful way to determine holes in your defenses and areas where your team needs to improve. While there are dozens of metrics available to determine ...
MARKETING DATA
Whitepaper
none
Enterprise Security, Platform Security, Software Security
Video
Network Threat Detection, Platform Security, Software Security
Article
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE