StatusCake.com - Website Uptime Monitoring

statuscake.com

With premium website monitoring you get more features, more regular monitoring. Whether you want your website checked for downtime every 30 seconds, or want it monitored from a particular location you decide. Paid plans start from just £3.49 ($4.99) per month.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

NETWORK THREAT DETECTION

DETECTIFY TEAMS UP WITH HACKERS FOR CHANGE TO BENEFIT SECURITY AND ETHICAL HACKING COMMUNITIES, BOLSTER SECURITY FOR NON-PROFIT ORGANIZATIONS

Detectify | August 19, 2021

news image

Detectify, the SaaS security company powered by ethical hackers, today announced its partnership with Hackers for Change. The collaboration will equip non-profit organizations with the tools required to strengthen security and decrease the likelihood of cyber-attacks, supporting the mission of Hackers for Change to provide charities and nonprofits with industry-quality cybersecurity services at no cost. By combining each organizations' experience and hacking knowledge, the partnership aims t...

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

SECURITY COMPASS RELEASES NEW STUDY: 2022 DEVELOPER PERSPECTIVES ON APPLICATION SECURITY

Security Compass | August 26, 2022

news image

Security Compass, a leading cybersecurity solution provider, has published the results of a research study examining developer views on application security, including the challenges and opportunities they face in their secure development efforts. The report, “2022 Developer Perspectives on Application Security,” provides a deep dive into security maturity, threats, requirements, tools, resources, and training. In order for software developers and security teams to eff...

Read More

IT SECURITY LEADERS ENGAGE IN RISKY SECURITY, PASSWORD HABITS

Helathitsecurity | February 25, 2020

news image

IT security practitioners routinely engage in risky password and authentication practices. And there’s a misalignment between expectations and reality when it comes to the implementation of usable security tools, according to a recent report from Yubico and conducted by the Ponemon Institute. Researchers surveyed 2,507 global IT and IT security leaders, as well as 563 individual users. They found that while most IT leaders have strong awareness of best practice authentication and password ...

Read More

DATA SECURITY

HYAS INFOSEC ANNOUNCES GENERAL AVAILABILITY OF CYBERSECURITY SOLUTION FOR PRODUCTION ENVIRONMENTS

HYAS | August 10, 2022

news image

Leading security technology firm HYAS Infosec — whose proactive solutions ensure that businesses can keep moving full forward in our ever-changing world — today announced the general release of its newest product, HYAS Confront, a cybersecurity solution offering complete visibility into every corner of a production environment. HYAS will be demoing Confront at Black Hat USA in Las Vegas from August 8 to August 11. Production environments are increasingly becoming a tar...

Read More
news image

NETWORK THREAT DETECTION

DETECTIFY TEAMS UP WITH HACKERS FOR CHANGE TO BENEFIT SECURITY AND ETHICAL HACKING COMMUNITIES, BOLSTER SECURITY FOR NON-PROFIT ORGANIZATIONS

Detectify | August 19, 2021

Detectify, the SaaS security company powered by ethical hackers, today announced its partnership with Hackers for Change. The collaboration will equip non-profit organizations with the tools required to strengthen security and decrease the likelihood of cyber-attacks, supporting the mission of Hackers for Change to provide charities and nonprofits with industry-quality cybersecurity services at no cost. By combining each organizations' experience and hacking knowledge, the partnership aims t...

Read More
news image

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

SECURITY COMPASS RELEASES NEW STUDY: 2022 DEVELOPER PERSPECTIVES ON APPLICATION SECURITY

Security Compass | August 26, 2022

Security Compass, a leading cybersecurity solution provider, has published the results of a research study examining developer views on application security, including the challenges and opportunities they face in their secure development efforts. The report, “2022 Developer Perspectives on Application Security,” provides a deep dive into security maturity, threats, requirements, tools, resources, and training. In order for software developers and security teams to eff...

Read More
news image

IT SECURITY LEADERS ENGAGE IN RISKY SECURITY, PASSWORD HABITS

Helathitsecurity | February 25, 2020

IT security practitioners routinely engage in risky password and authentication practices. And there’s a misalignment between expectations and reality when it comes to the implementation of usable security tools, according to a recent report from Yubico and conducted by the Ponemon Institute. Researchers surveyed 2,507 global IT and IT security leaders, as well as 563 individual users. They found that while most IT leaders have strong awareness of best practice authentication and password ...

Read More
news image

DATA SECURITY

HYAS INFOSEC ANNOUNCES GENERAL AVAILABILITY OF CYBERSECURITY SOLUTION FOR PRODUCTION ENVIRONMENTS

HYAS | August 10, 2022

Leading security technology firm HYAS Infosec — whose proactive solutions ensure that businesses can keep moving full forward in our ever-changing world — today announced the general release of its newest product, HYAS Confront, a cybersecurity solution offering complete visibility into every corner of a production environment. HYAS will be demoing Confront at Black Hat USA in Las Vegas from August 8 to August 11. Production environments are increasingly becoming a tar...

Read More

Resources

resource image

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Cyber security considerations 2022

Whitepaper

resource image

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Find and Fix API Vulnerabilities Before They're Exploited

Video

resource image

DATA SECURITY, ENTERPRISE SECURITY, PLATFORM SECURITY

Brivo Access Information Security White Paper

Whitepaper

resource image

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Cyber security considerations 2022

Whitepaper

resource image

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Find and Fix API Vulnerabilities Before They're Exploited

Video

resource image

DATA SECURITY, ENTERPRISE SECURITY, PLATFORM SECURITY

Brivo Access Information Security White Paper

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us