WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Cisco | May 19, 2020
Social Cybersecurity is a new and emerging concept and paradigm that basically involves how better cybersecurity behaviors can be inclined positively using social influence.
Practicing proper cyber hygiene in order to protect themselves and others, fr...
DATA SECURITY, PLATFORM SECURITY
mParticle | October 10, 2022
mParticle, a leader in customer data infrastructure, announced today that it is introducing Custom Access Roles to its platform, extending its enterprise-grade controls to enhance security and simplify compliance.
With customer data breaches in the news almost daily, there is a need for more robust data controls, especially for the world's largest brands. Modern security and compliance practices take a least privileged access approach to platform roles. To achieve true least p...
Washington Post | February 03, 2020
Outgoing National Security Agency General Counsel Glenn Gerstell says hacking threats from China and other U.S. adversaries pose as great a challenge to the country as climate change. And the government and private sector risk moving too slowly to respond. “You look at all the manifestations of technology and it has been a tsunami hitting us within a 20-year period,” said Gerstell, who retired after four years as NSA’s top legal official on Friday. “The rate of change is ...
SECURITY AUDIT AND COMPLIANCE, WIRELESS AND MOBILE SECURITY
Forescout Technologies Inc. | March 02, 2023
On March 1, 2023, Forescout Technologies, a leading automated cybersecurity solutions provider, launched Forescout XDR to enhance enterprises' investigation, detection, and response capabilities against advanced threats across their extended enterprises.
Currently, security operation centers (SOCs) are inundated with an average of 450 alerts per hour, and analysts often spend precious time correlating low-fidelity alerts and chasing false positives. Forescout XDR uses data s...
DATA SECURITY, ENTERPRISE IDENTITY, ENTERPRISE SECURITY
DATA SECURITY, ENTERPRISE IDENTITY
DATA SECURITY, SOFTWARE SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE