WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
SentinelOne | June 29, 2022
SentinelOne , an autonomous cybersecurity platform company, today announced a new integration with Torq, a no-code security automation platform. The combination of SentinelOne and Torq allows security teams to accelerate response time, reduce alert fatigue, and improve overall security posture.
“SentinelOne’s powerful intelligence and protection helps security teams protect their employees and customers – no matter how complex the environment. &ldqu...
Search Engine Journal | June 29, 2020
Hackers are using Google Analytics to steal credit cards, passwords, IP addresses... basically everything shared with a hacked site.An investigation by Kaspersky Lab has uncovered a new hacking technique that uses Google Analytics to steal credit card numbers, user agents, IP addresses, passwords… basically everything.This isn’t an exploit in Google Analytics itself.Hackers are exploiting the trusted status given to Google Analytics by all browsers in order to stea...
Evo Security | June 21, 2022
Evo Security today announced the launch of Evo Partner Identity Cloud or EPIC. Evo Partner Identity Cloud is the first all-in-one identity and access management (IAM) solution designed exclusively with the needs of managed service providers (MSPs) and their business customers in mind. The enterprise-grade cloud platform is a comprehensive identity and access management solution that gives MSPs an easy and highly secure way to protect small and medium-sized businesses and enterprises from the mos...
DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY
Neosec | November 16, 2022
Neosec, the pioneer in discovering and identifying API threats using behavioral analytics, today announced that it now tokenizes API activity data to enable organizations to fully see and store API data, removing the possibility of keeping sensitive data at-rest.
Today, many organizations are blind to the threats lurking within their API traffic. Even worse, organizations are forced to implement basic logging of its API traffic that doesn't contain the meaningful information a...
DATA SECURITY, ENTERPRISE IDENTITY, SOFTWARE SECURITY
DATA SECURITY, ENTERPRISE IDENTITY, ENTERPRISE SECURITY
DATA SECURITY, ENTERPRISE IDENTITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE