As citizens of Expedia we don’t have a national anthem or a native dish (okay, maybe beer and late-night sliders), but we do have a shared sense of pride and the occasional feeling that we speak our own language. We’re quirky and confident. We like working together and on our own. We love solving problems and creating new ideas. Yet we embrace our differences in order to learn, grow and succeed. That’s what makes us one of the world's largest travel companies.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Data Security

CYBER INTELLIGENCE EXPERT'S FIRM LAUNCHES NEW SECURITY TOOL TO DETECT AND DEFEND THREATS TO CRITICAL NATIONAL INFRASTRUCTURE

The Bellwether Group | October 28, 2021

news image

Timed to coincide with the new U.S. focus on cyber security in the critical infrastructure, The Bellwether Group introduces VAULT Systems, a custom hardware and intelligent software platform capable of visualizing data and detecting, defending and mitigating cyber threats to critical national infrastructure. The announcement coincides with the July 28, 2021, National Security Memorandum issued from the White House that targets cybersecurity threats as "the most significant an...

Read More

VULCAN CYBER FIRST TO PROVIDE CUSTOMIZABLE RISK MODELING FOR TARGETED VULNERABILITY REMEDIATION

Vulcan | July 02, 2020

news image

Vulcan Cyber®, developers of the industry's only end-to-end vulnerability remediation platform, today announced customers can now add custom risk parameters to existing Vulcan Cyber vulnerability prioritization algorithms for efficient vulnerability remediation. With the addition of custom risk scripts Vulcan Cyber is first to help security and IT operations teams run more-targeted, end-to-end vulnerability remediation campaigns contextualized to the risk appetite of their business. ...

Read More

Platform Security

UPTYCS UNVEILS ADVANCED CONTAINER AND KUBERNETES CAPABILITIES

Uptycs | May 27, 2022

news image

Uptycs, the first cloud-native security analytics platform that enables both cloud and endpoint security from a single platform, today unveiled expanded container and Kubernetes security posture management (KSPM) features for its cloud workload protection platform (CWPP). These features enable real-time identification of containerized workloads, proactive scanning of container images in the CI/CD pipeline, constant compliance monitoring, and Kubernetes security policy audit and enforcement.
Read More

Data Security

DETECTIFY INTRODUCES AN OPEN SOURCE SECURITY TOOL FOR ETHICAL HACKERS

Detectify | May 19, 2021

news image

Ugly Duckling, a stand-alone application security tool specially designed for ethical hackers to make it easier for them to share their discoveries, is now available from Detectify, the SaaS security company powered by ethical hackers. To keep on top of web application security, it's important to find web vulnerabilities as soon as they appear - before attackers exploit them. By offering ethical hackers the tools to build further test modules independently, Ugly Duckling speed...

Read More
news image

Data Security

CYBER INTELLIGENCE EXPERT'S FIRM LAUNCHES NEW SECURITY TOOL TO DETECT AND DEFEND THREATS TO CRITICAL NATIONAL INFRASTRUCTURE

The Bellwether Group | October 28, 2021

Timed to coincide with the new U.S. focus on cyber security in the critical infrastructure, The Bellwether Group introduces VAULT Systems, a custom hardware and intelligent software platform capable of visualizing data and detecting, defending and mitigating cyber threats to critical national infrastructure. The announcement coincides with the July 28, 2021, National Security Memorandum issued from the White House that targets cybersecurity threats as "the most significant an...

Read More
news image

VULCAN CYBER FIRST TO PROVIDE CUSTOMIZABLE RISK MODELING FOR TARGETED VULNERABILITY REMEDIATION

Vulcan | July 02, 2020

Vulcan Cyber®, developers of the industry's only end-to-end vulnerability remediation platform, today announced customers can now add custom risk parameters to existing Vulcan Cyber vulnerability prioritization algorithms for efficient vulnerability remediation. With the addition of custom risk scripts Vulcan Cyber is first to help security and IT operations teams run more-targeted, end-to-end vulnerability remediation campaigns contextualized to the risk appetite of their business. ...

Read More
news image

Platform Security

UPTYCS UNVEILS ADVANCED CONTAINER AND KUBERNETES CAPABILITIES

Uptycs | May 27, 2022

Uptycs, the first cloud-native security analytics platform that enables both cloud and endpoint security from a single platform, today unveiled expanded container and Kubernetes security posture management (KSPM) features for its cloud workload protection platform (CWPP). These features enable real-time identification of containerized workloads, proactive scanning of container images in the CI/CD pipeline, constant compliance monitoring, and Kubernetes security policy audit and enforcement.
Read More

news image

Data Security

DETECTIFY INTRODUCES AN OPEN SOURCE SECURITY TOOL FOR ETHICAL HACKERS

Detectify | May 19, 2021

Ugly Duckling, a stand-alone application security tool specially designed for ethical hackers to make it easier for them to share their discoveries, is now available from Detectify, the SaaS security company powered by ethical hackers. To keep on top of web application security, it's important to find web vulnerabilities as soon as they appear - before attackers exploit them. By offering ethical hackers the tools to build further test modules independently, Ugly Duckling speed...

Read More

Resources

resource image

Enterprise Security, Platform Security, Software Security

FortiClient Data Sheet

Whitepaper

resource image

Enterprise Security, Software Security, Cloud Security

How VMware Uses MetaAccess to Validate and Remediate Endpoints at Scale

Video

resource image

Enterprise Security, Platform Security, Software Security

FortiClient Data Sheet

Whitepaper

resource image

Enterprise Security, Software Security, Cloud Security

How VMware Uses MetaAccess to Validate and Remediate Endpoints at Scale

Video

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us