WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Veracode | March 30, 2022
Veracode, a leading global provider of application security testing solutions, has released new findings that show the public sector has the highest proportion of security flaws in its applications and maintains some of the lowest and slowest fix rates compared to other industry sectors. Analysis of data collected from 20 million scans across half a million applications revealed these sector-specific findings as part of Veracode’s annual report on the State of Software Security (SOSS).
SafeBase | March 14, 2022
SafeBase, Inc., a smart trust centre that streamlines the security assessment process for B2B SaaS companies, today announced that it has raised $18 million in a Series A round led by global venture capital firm New Enterprise Associates (NEA), with participation from Y Combinator and Comcast Ventures, the corporate venture capital arm of Comcast Corporation. SafeBase has over 100 customers, including Linkedin, Jamf, and Snyk, a cybersecurity firm. The funding will be used to expand the company ...
Tech Guide | July 18, 2020
Abrupt and unexpected are two of the adjectives most commonly used when describing the shift to working remotely that the global workforce has faced in response to the COVID-19 pandemic. No sector has been spared, including government operations, private businesses, and institutions of education.This seismic shift not only impacted the millions of people who found themselves working from home for the first time in Australia and around the globe, but it also stressed the complex technology ...
Palo Alto Networks | May 12, 2022
Palo Alto Networks , the global cybersecurity leader, today urged the industry to move to Zero Trust Network Access 2.0 (ZTNA 2.0) — the foundation for a new era of secure access. ZTNA was developed as a replacement for virtual private networks (VPNs) when it became clear that most VPNs did not adequately scale and were overly permissive, but the first-generation ZTNA products (ZTNA 1.0) are too trusting and can put customers at significant risk. ZTNA 2.0 solves these problems by removing ...
DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY
DATA SECURITY, ENTERPRISE IDENTITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE