WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Modulo Security Solutions
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Prnewswire | April 12, 2023
Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, privileged access, secrets and remote connections, today announces a series of significant new User Interface (UI) updates to its password management platform for a friendlier and more intuitive experience. Keeper's upgraded user interface offers clearer distinctions between elements, as well as enhanced clarity and searchability, to improve the user experience and make i...
SOFTWARE SECURITY
Trend Micro Incorporated | September 07, 2021
Trend Micro Incorporated a global cybersecurity leader, today announced the launch of Trend Micro Service One, consolidating its managed services to optimize enterprise threat management. The new services bundles, which can include premium support, an early warning service, Managed XDR and incident response, help customers prevent, detect and respond to cyber threats faster by supplementing internal resources. The prevalence of cybersecurity threats and the dynamic threat landscap...
Tech Republic | February 05, 2020
Organizations received a type of holiday gift during the fourth quarter of 2019 as the volume of malware and other security threats declined. However, employees returning to work after the new year presented a fresh target for cybercriminals to launch their attacks. In its Quarterly Threat Landscape Report, the security provider Nuspire discusses the threats that marked the final quarter of 2019 and offers advice on how organizations can defend themselves against these threats. For last quarter,...
DATA SECURITY
HITRUST | December 18, 2021
HITRUST today announced it is addressing the need for a continuously-relevant cybersecurity assessment that aligns and incorporates best practices and leverages the latest threat intelligence to maintain applicability with information security risks and emerging cyber threats, such as ransomware. The design and selection of the controls for the HITRUST Implemented 1-year (i1) Assessment puts it in a new class of information security assessment that is threat-adaptive – designed to maintain...
DATA SECURITY, ENTERPRISE IDENTITY, ENTERPRISE SECURITY
Whitepaper
ENTERPRISE SECURITY
Video
DATA SECURITY, ENTERPRISE IDENTITY, SOFTWARE SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE