WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Deloitte | July 12, 2022
To help organizations adopt zero trust more quickly and efficiently, Deloitte is launching a new managed service – Zero Trust Access— that offers a cloud-native approach to securing communications between users, on any device, and enterprise applications, wherever they may reside.
The Zero Trust concept commits to removing implicit trust within an information technology (IT) ecosystem and replacing it with a risk-based approach to accessing organizational resources acr...
Blu Venture Investors | May 24, 2021
Blu Venture Investors, a primary source risk capital firm, today announced the launch of the BVI Cyber Fund, a $25M fund targeted at Series A growth companies in cybersecurity. This fund builds on the success and momentum Blu Ventures has established in supporting the cybersecurity ecosystem within the Mid-Atlantic region and beyond.
"With over 800 cybersecurity firms within the Washington, D.C. region, Blu Ventures is seated at the middle of the cyber/intelligence ecosystem,...
Futurex | October 12, 2021
Futurex’s key management technology and Google Cloud EKM give customers more control over encryption keys to maximize data security, privacy, and compliance
BULVERDE, Texas, October 12, 2021 — Futurex, a leader in hardened, enterprise-class data security solutions, today announced support for Google Cloud External Key Manager (EKM), giving customers more control over encryption keys. Google Cloud EKM gives users full...
DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY
Malwarebytes | November 28, 2022
Malwarebytes, a global leader in real-time cyber protection, today announced a new partnership with Stellar Cyber, an industry-leading Open XDR platform that delivers comprehensive, unified security without complexity. The partnership helps resource-constrained teams produce consistent security outcomes across all environments; on-premises, cloud and anything in between.
The partnership comes at a critical time in the cybersecurity landscape, as security products become more compl...
DATA SECURITY, ENTERPRISE SECURITY, SOFTWARE SECURITY
WEB SECURITY TOOLS
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE