WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > RAZORTHORN
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Webinar
Conference
Data Security
airSlate | April 15, 2021
airSlate, a pioneer partner and preferred provider of information technology and security solutions and services in the Middle East, reported today that its award-winning eSignature solution, signNow, is now available to customers of Defa3 Cyber Security. The collaboration will help to raise awareness of airSlate in the area while also increasing the importance of Defa3 Cyber Security's technology portfolio to its customers. “Knowing Defa3 Cyber Security's leadership...
Infosecurity | February 03, 2020
A major Australian freight company is experiencing operational difficulties after a cybersecurity incident caused an IT system shutdown. Toll Group announced that it had experienced a "cybersecurity incident" on Friday. The company shut down a number of IT systems at multiple sites across the country in a bid to resolve the issue."As a precautionary measure, in response to a cyber security incident on Friday, Toll deliberately shut down a number of systems across multiple sites an...
Network Threat Detection, Platform Security, Software Security
Businesswire | July 27, 2023
Coro, the modern cybersecurity platform for mid-market organizations, today announced the acquisition of Privatise, an Israeli supplier of network security solutions for in-office and remote work. The acquisition adds critical SASE capabilities to Coro’s all-in-one platform and is part of an aggressive growth strategy, fueled by Coro’s $155M funding over the last 12 months, to expand the capabilities of Coro’s cybersecurity platform both organically and through strategic ...
Data Security,Platform Security,Software Security
Neosec | November 16, 2022
Neosec, the pioneer in discovering and identifying API threats using behavioral analytics, today announced that it now tokenizes API activity data to enable organizations to fully see and store API data, removing the possibility of keeping sensitive data at-rest. Today, many organizations are blind to the threats lurking within their API traffic. Even worse, organizations are forced to implement basic logging of its API traffic that doesn't contain the meaningful information a...
Enterprise Security, Platform Security, Cloud Security
Whitepaper
Enterprise Security, Platform Security, Software Security
Data Security, Enterprise Security, Software Security
InfoSec Project Management
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE