WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > SecBI
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
PC Mag | February 27, 2020
The security-focused RSA Conference has often been used by US government officials to explain policy positions and connect with the industry, and Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs made a similar pitch on Tuesday: collaborate to protect the US from cyber attacks. Officially, Krebs’ job is “to defend civilian networks, manage systemic risk to National Critical Functions, and work with stakeholders to raise the security baseline of the na...
Data Security
S2W | January 03, 2022
Data Intelligence company S2W announced that INTERPOL has recently signed a contribution agreement introducing S2W's cyber threat intelligence (CTI) solution "S2-XARVIS ENTERPRISE" to strengthen its ability to analyze new cyber threats such as dark web and ransomware. S2W has been supporting INTERPOL to identify and prevent "third-world dark web crimes" as part of its "binding the gap among member countries for a safer world," and recently conduct...
The Bellwether Group | October 28, 2021
Timed to coincide with the new U.S. focus on cyber security in the critical infrastructure, The Bellwether Group introduces VAULT Systems, a custom hardware and intelligent software platform capable of visualizing data and detecting, defending and mitigating cyber threats to critical national infrastructure. The announcement coincides with the July 28, 2021, National Security Memorandum issued from the White House that targets cybersecurity threats as "the most significant an...
Data Security,Platform Security,Software Security
Legit Security | December 12, 2022
Legit Security, a cyber security company with an enterprise platform that protects an organization's software supply chain from attack and ensures secure application delivery, today announced that it discovered a new class of software supply chain vulnerabilities that leverage artifact poisoning to attack underlying software development pipelines. The vulnerability was found in GitHub Actions, a platform for orchestrating and automating software development pipelines, and the vulnerability w...
Platform Security, Software Security, Cloud Security
Whitepaper
none
Data Security, Enterprise Security, Software Security
Enterprise Identity, Platform Security, Software Security
Article
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE