WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Hortonworks
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Webinar
Conference
Learing hub | May 14, 2020
There's a lot of anticipation and expectation in business around the role of artificial intelligence (AI) and the cybersecurity benefits we can expect to gain from our diversified integrations. From website chatbots providing improved customer service, to biometric identification and cutting-edge customer data analysis, AI is set to transform the world as we know it. The topic is as hotly debated as it is shrouded in mystery, as dreams of AI leading into a brave new future collide with the p...
Cybrary | July 13, 2020
Cybrary, the world's largest online cybersecurity career development platform, today announced it is offering seven free courses for the month of July on topics ranging from threat intelligence and network security to Kali Linux and cloud. This new offering follows in the spirit of their Scholars Program announcement which was developed to support professionals impacted by COVID-19."The long-lasting effects of COVID-19 have been felt across industries and our dedication to support...
Software Security
Business Wire | November 03, 2023
Science Applications International Corp. (NYSE: SAIC) today announced new, purpose-built Zero Trust security capabilities, which provide a solution to answer the Zero Trust pillars addressing data, identity, devices, networks, applications and workloads. The new Zero Trust security capabilities have been tested and validated on an AWS Snowball Edge and AWS Snow Family device with on-...
securitymagazine | April 03, 2020
Led by Noam Rotem and Ran Locar, vpnMentor’s research team of ethical hackers, recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14 million users. Key Ring allows users to upload scans and photos of membership and loyalty cards onto a digital folder on one’s phone. However, many users also use it to store copies of IDs, driver licenses, credit cards, and more. A misconfigured Amazon Web Services (AWS) S3 bucket owned by th...
none
Whitepaper
Data Security, Enterprise Security
Video
Enterprise Security, Cloud Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE