WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > FVC
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Webinar
Conference
Intelligentcio | February 27, 2020
With ThreatQ, the company has been enabled to offer a richer threat intelligence service that has more context and is faster. The ThreatQ platform is complementary to an existing MISP solution and allows the customer to ...
Network Threat Detection
SilverSky | January 11, 2022
SilverSky, a cybersecurity innovator offering powerful managed detection and response (MDR) services, today announced it completed the acquisition of Burlington, Massachusetts-based Cygilant. As a leading cybersecurity-as-a-service provider, Cygilant operates a security operation center (SOC) in Belfast, Northern Ireland and also boasts some of the world's most notable Ph.D.-level talent focused on cybersecurity, advanced networks and data science. The addition of Cygilant'...
Platform Security, Software Security, Cloud Security
PR Newswire | August 02, 2023
Legit Security, a cyber security company with an enterprise Application Security Posture Management platform that secures application delivery and protects an organization's software supply chain from attack, today announced a partnership with CrowdStrike, a global leader in cloud-delivered protection of endpoints, cloud workloads, identity and data protection. With this partnership, Legit Security integrates with the CrowdStrike Falcon® platform to provide extended application sec...
Data Security
Datadog | April 29, 2022
Datadog, Inc., a cloud application monitoring and security platform, today announced the official release of its Application Security Monitoring (ASM) solution. ASM utilizes distributed tracing to assist security, development, and operations teams in precisely detecting code-level vulnerabilities like server-side request forgeries (SSRFs), SQL injections, cross-site scripting (XSS) assaults, and others. Today, applications are a frequent cause of data breaches. According to Forres...
InfoSec Project Management
Whitepaper
Software Security
Article
Software Security, API Security, Cloud Security
Video
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE