WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > STG Inc
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
prnewswire | September 14, 2020
odix, an Israel-based cybersecurity leader in enterprise CDR (Content Disarm and Reconstruction) technology, has officially launched FileWall for small and medium-sized businesses (SMBs). FileWall provides effective malware-disarming capabilities against file-based attacks, leveraging cutting-edge technology previously available only for enterprises. With 62 percent of cyberattacks targeting SMBs resulting in 60 percent of them going out of business within six months, a new cybersecurity soluti...
Enterprise Security,Software Security,Identity Management
SailPoint | January 13, 2023
On January 12, 2023, SailPoint Technologies, Inc., a leading identity security enterprise, announced the acquisition of SecZetta, a prominent third-party identity risk solutions provider. With around half of today's firms comprising non-employees, organizations need to factor this rising group of identities into their identity security strategies. By incorporating SecZetta, SailPoint will be able to expand its capabilities to assist businesses in gaining greater visibility i...
Data Security
Honeywell | June 22, 2021
According to a report released today by Honeywell (Nasdaq: HON), USB-based threats that can severely impact business operations increased significantly during a disruptive year when the usage of removable media and network connectivity also grew. Data from the 2021 Honeywell Industrial USB Threat Report indicates that 37% of threats were specifically designed to utilize removable media, which almost doubled from 19% in the 2020 report. The research also highlights that 79% of cybe...
Threatpost | January 28, 2020
For any organization to protect itself from cyberattacks and data breaches, it’s critical to discover and respond to cyber threats as quickly as possible. Shutting the window of vulnerabilities promptly makes the difference between a mild compromise and a catastrophic data breach. Understanding your ability to do so gives your organization a powerful way to determine holes in your defenses and areas where your team needs to improve. While there are dozens of metrics available to determine ...
Data Security, Enterprise Security, Software Security
Whitepaper
Enterprise Security, Cloud Security
Video
Enterprise Security
Data Security, Platform Security, Software Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE