WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Sonata Software
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Software Security
CyCognito | December 29, 2021
CyCognito, the leader in external attack surface management and protection, today announced a strategic go-to-market alliance with Carahsoft Technology Corp., the Trusted Government IT Solutions Provider. Under the agreement, Carahsoft will serve as CyCognito’s first Public Sector Distributor. The new relationship expands and deepens CyCognito’s reach across and within the Public Sector through Carahsoft’s NASA Solutions for Enterprise-Wide Procurement (SEWP) V, Information Tec...
Dataquest | January 30, 2020
Climate change and cyber security are the top threats to humans and businesses today. These two threats have a lot in common and the policies to govern one can work well for the other. There are many parallels between the two realms. Here we take a look at the five common grounds. Everyone is affected: Like it or not, no individual is immune to changes that happen in the environment or to the cyber threats that are increasing every day. Climate change and cyber threats are now global phenomena, ...
Data Security, Enterprise Security, Software Security
Edgio | February 28, 2023
On February 27, 2023, Edgio, Inc. announced major enhancements to its security platform to enable enterprises to better identify and respond to emerging threats while ensuring the integrity, confidentiality, and availability of their data and applications. The platform's new capabilities aim to reduce the damage caused by the upsurge in the severity of Distributed Denial of Service (DDoS) and other advanced application attacks. Edgio's DDoS scrubbing solution delivers de...
CBC | March 08, 2020
Canada's cyber intelligence agency says it's working on what it calls the "Holy Grail" of data encryption to protect government information as the number of reports of privacy breaches, malware attempts and ransomware hits continues to grow. Encryption mainly works in transit — which protects data when it's being sent — or "at rest", which guards information when it's being stored. But in order to be processed and understood, that information needs...
none
Whitepaper
Enterprise Identity
Article
Enterprise Security, Platform Security, Software Security
infographic
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE