WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Stormshield
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
prnewswire | September 30, 2020
The Microsoft Intelligent Security Association was formed in 2018 to provide a community for premier cybersecurity companies to collaborate and better integrate their technologies with Microsoft Security products. By joining MISA, odix looks to advance its CDR solutions fluid integration into the range of widely used Microsoft software products.MISA uniquely fosters the critical relationships between innovative designers and developers creating cyber security products that integrate with Azure S...
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
PlainID | September 05, 2022
PlainID, the Authorization Company™, announces today the release of "Build vs Buy: Guide to Evaluating Authorization" in collaboration with Simon Moffatt, founder and analyst of The Cyber Hut. The increase in remote work and digital commerce has created a proliferation of digital identities which demand secure, frictionless access to applications and the underlying data. The guide is designed to address and inform on key criteria when considering whe...
SOFTWARE SECURITY
Palo Alto Networks | May 12, 2022
Palo Alto Networks , the global cybersecurity leader, today urged the industry to move to Zero Trust Network Access 2.0 (ZTNA 2.0) — the foundation for a new era of secure access. ZTNA was developed as a replacement for virtual private networks (VPNs) when it became clear that most VPNs did not adequately scale and were overly permissive, but the first-generation ZTNA products (ZTNA 1.0) are too trusting and can put customers at significant risk. ZTNA 2.0 solves these problems by removing ...
Infosecurity | February 19, 2020
Cybercriminals are aggressively ju mping into the tax season," says Proofpoint's research. Attackers use tax-themed emails with enticingly titled malicious attachments.
Whitepaper
PLATFORM SECURITY
DATA SECURITY, ENTERPRISE IDENTITY
DATA SECURITY, SOFTWARE SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE