WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
HUB Security | December 17, 2021
HUB Security, a secure computing solutions provider, announced today its Docker Digital Twin product to better protect, authenticate, and verify traffic created by Docker, a highly used platform for package containment.
The HUB Security Docker Digital Twin enforces access control and provides governance processes, such as approvals for sensitive actions, on incoming Docker traffic. It blocks attack vectors involving the loss or theft of credentials, vulnerabilities, and unauthoriz...
Data Security, Platform Security, Software Security
Businesswire | May 05, 2023
Immuta, a leader in data security, today announced a new strategic investment from Databricks Ventures, the investment arm of the data and AI company and pioneer of the lakehouse. The investment builds on a longstanding partnership between the two companies and positions Immuta as one of Databricks’ trusted partners of choice for data security and access control. The investment will go towards product innovation to strengthen the integration between both platforms and new go-to-marke...
DECK7 | January 13, 2020
DECK 7 is proud to present an exciting interview with the Co-Founder & Chief Evangelist at Terminus, Sangram Vajre. He is an author, keynote speaker, 3x CMO, host of the daily #FlipMyFunnel podcast, entrepreneur and category maker. Sangram has been a driving force behind the success of Terminus and building the ABM subcategory of marketing technology. Before co-founding Terminus, Sangram was Head of Marketing at Pardot through its acquisition by ExactTarget and then Salesforce. A contributin...
BitTrap | October 05, 2021
Startup company BitTrap has announced a blockchain-based cybersecurity solution that leverages attackers' motivations to provide singular detection capabilities. This approach differs from cybersecurity paradigms that focus on trying to keep attackers from breaking in. Instead, it assumes some have already made their way inside a network, undetected, and is designed to identify them and reduce hacker dwell time in the compromised system.
The system works by deploying a vast ne...
Enterprise Security, Network Threat Detection, Software Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE