WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > StackPath
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Software Security
Deepwatch | January 09, 2024
Deepwatch, the leading managed security platform for the cyber resilient enterprise, today announced the launch of Threat Signal, its standalone forensic-focused operations service. Deepwatch designed Threat Signal to enhance companies’ cybersecurity defenses, proactively identify and help mitigate attack vectors, and stay ahead of evolving risks to strengthen cyber resilience. ...
Info Security | January 20, 2020
The USA is considering legislation that would protect local governments by requiring the appointment of a cybersecurity leader for each state. Backers of the Cybersecurity State Coordinator Act of 2020 say the proposed law will improve intelligence sharing between state and federal governments and speed up incident response times in the event of a cyber-attack. Under the legislation, the director of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency would ...
prnewswire | September 16, 2020
RedShield, specialists in web application shielding, has announced the appointment of industry thought-leader Kate Kuehn as a board director. Based in Chicago, Kuehn's appointment is part of RedShield's strategy to accelerate growth in the U.S; a push made possible by RedShield's USD$10M Series B funding last September. Her appointment follows that of fellow industry veteran James Carrigan Jr. to Chief Revenue Officer (CRO), who recently joined the company from Verizon. Kuehn joins R...
Data Security
HITRUST | December 18, 2021
HITRUST today announced it is addressing the need for a continuously-relevant cybersecurity assessment that aligns and incorporates best practices and leverages the latest threat intelligence to maintain applicability with information security risks and emerging cyber threats, such as ransomware. The design and selection of the controls for the HITRUST Implemented 1-year (i1) Assessment puts it in a new class of information security assessment that is threat-adaptive – designed to maintain...
Data Security, Enterprise Security, Platform Security
Video
Article
none
Whitepaper
Enterprise Identity, Platform Security, Software Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE