WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Robo Shadow | September 27, 2021
UK based Cyber Security start-up, Robo Shadow, have launched their initial product set as they attempt to take on the big guns in Cyber Security. The Platform boasts a range of features including Vulnerability Scanning, Hardware and Software reporting for all your devices, reporting on Windows Defender centrally (removing the need for third-party Anti-virus) and much more.
We want to democratise Cyber Security, by removing the cost and the complexity.The Robo Shadow ...
Infosecurity | February 17, 2020
New figures tabled in Canada's House of Commons have revealed that at least 144,000 Canadians have had their personal information mishandled by federal departments and agencies over the past two years. The figures were part of an 800-page document written in response to an Order Paper question filed last month by Conservative MP Dean Allison. No information as to how the data came to be mishandled was included in the federal government's lengthy answer.In total, 7,992 breaches were found...
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Radware | August 30, 2022
Radware® , a leading provider of cyber security and application delivery solutions, announced the launch of a new cloud security center in Taiwan. The facility will enable customers in Taiwan to secure their datacenters, networks, web and mobile applications, and their APIs with minimal latency, as well as mitigate compliance processes involved in offshore routing.
The new security center will protect customers against denial-of-service attacks, web application attacks, malici...
Datadog | April 29, 2022
Datadog, Inc., a cloud application monitoring and security platform, today announced the official release of its Application Security Monitoring (ASM) solution. ASM utilizes distributed tracing to assist security, development, and operations teams in precisely detecting code-level vulnerabilities like server-side request forgeries (SSRFs), SQL injections, cross-site scripting (XSS) assaults, and others.
Today, applications are a frequent cause of data breaches. According to Forres...
DATA SECURITY, PLATFORM SECURITY, SECURITY AUDIT AND COMPLIANCE
DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY
DATA SECURITY, ENTERPRISE SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE