Information Risk Management (IRM)

irmsecurity.com

IRM works to defend organisations against cyber threats. Founded in 1998, IRM provides visibility and control across entire cyber landscapes by combining consultancy with advanced software technology. By covering all aspects of cyber security from PCI compliance to automated threat intelligence, IRM supports organisations at every step of their cyber maturity journey.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

NO COMPENSATION AFTER A CYBERATTACK IN THE ABSENCE OF THIRD-PARTY POLICY

Security Brief | February 10, 2020

news image

Kaspersky's report revealed that 71% of enterprises with a third party policy reported receiving monetary recompense after an incident, compared to only 22% who did not have regulations in place. Damage from incidents is estimated to cost $2.57m on aver...

Read More

Platform Security, Software Security, Cloud Security

LEGIT SECURITY ANNOUNCES INTEGRATION WITH CROWDSTRIKE TO BRING APPLICATION SECURITY POSTURE MANAGEMENT TO CUSTOMERS

PR Newswire | August 02, 2023

news image

Legit Security, a cyber security company with an enterprise Application Security Posture Management platform that secures application delivery and protects an organization's software supply chain from attack, today announced a partnership with CrowdStrike, a global leader in cloud-delivered protection of endpoints, cloud workloads, identity and data protection. With this partnership, Legit Security integrates with the CrowdStrike Falcon® platform to provide extended application sec...

Read More

Data Security, Platform Security, Software Security

JUPITERONE RECOGNIZED AS A SAMPLE VENDOR FOR CYBER ASSET ATTACK SURFACE MANAGEMENT (CAASM) IN GARTNER® HYPE CYCLE™ FOR CYBER RISK MANAGEMENT, 2022

JupiterOne | August 19, 2022

news image

JupiterOne, the industry's leading provider of cyber asset attack surface management (CAASM) technology, today announced that it was named as a Sample Vendor for CAASM in the latest release of the Gartner Hype Cycle for Cyber Risk Management, 2022. According to Gartner, "In 2022, the global risk landscape continues to be impacted by the ongoing COVID-19 pandemic conditions, the Russian invasion of Ukraine, labor shortage, worsening climate change, and inflation. In ...

Read More

Platform Security

SECURITYSCORECARD JOINS SNOWFLAKE PARTNER NETWORK

SecurityScorecard | June 23, 2022

news image

SecurityScorecard, the global leader in cybersecurity ratings announced today that it has joined Snowflake's Partner Network, enabling mutual customers to gain instant visibility into their own security posture and that of their third and fourth party software vendors. Catching Third-Party Risks Early Snowflake customers now have access to "call" security data within Snowflake, gaining direct access to SecurityScorecard Ratings data that can b...

Read More
news image

NO COMPENSATION AFTER A CYBERATTACK IN THE ABSENCE OF THIRD-PARTY POLICY

Security Brief | February 10, 2020

Kaspersky's report revealed that 71% of enterprises with a third party policy reported receiving monetary recompense after an incident, compared to only 22% who did not have regulations in place. Damage from incidents is estimated to cost $2.57m on aver...

Read More
news image

Platform Security, Software Security, Cloud Security

LEGIT SECURITY ANNOUNCES INTEGRATION WITH CROWDSTRIKE TO BRING APPLICATION SECURITY POSTURE MANAGEMENT TO CUSTOMERS

PR Newswire | August 02, 2023

Legit Security, a cyber security company with an enterprise Application Security Posture Management platform that secures application delivery and protects an organization's software supply chain from attack, today announced a partnership with CrowdStrike, a global leader in cloud-delivered protection of endpoints, cloud workloads, identity and data protection. With this partnership, Legit Security integrates with the CrowdStrike Falcon® platform to provide extended application sec...

Read More
news image

Data Security, Platform Security, Software Security

JUPITERONE RECOGNIZED AS A SAMPLE VENDOR FOR CYBER ASSET ATTACK SURFACE MANAGEMENT (CAASM) IN GARTNER® HYPE CYCLE™ FOR CYBER RISK MANAGEMENT, 2022

JupiterOne | August 19, 2022

JupiterOne, the industry's leading provider of cyber asset attack surface management (CAASM) technology, today announced that it was named as a Sample Vendor for CAASM in the latest release of the Gartner Hype Cycle for Cyber Risk Management, 2022. According to Gartner, "In 2022, the global risk landscape continues to be impacted by the ongoing COVID-19 pandemic conditions, the Russian invasion of Ukraine, labor shortage, worsening climate change, and inflation. In ...

Read More
news image

Platform Security

SECURITYSCORECARD JOINS SNOWFLAKE PARTNER NETWORK

SecurityScorecard | June 23, 2022

SecurityScorecard, the global leader in cybersecurity ratings announced today that it has joined Snowflake's Partner Network, enabling mutual customers to gain instant visibility into their own security posture and that of their third and fourth party software vendors. Catching Third-Party Risks Early Snowflake customers now have access to "call" security data within Snowflake, gaining direct access to SecurityScorecard Ratings data that can b...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us