WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
prnewswire | September 03, 2020
Mobileum Inc. ("Mobileum"), a leading global provider of analytics-based roaming, telco security, risk management and testing and monitoring solutions, is pleased to announce that it has been recognized in Gartner's Hype Cycle for Identity and Access Management Technologies, 2020 and in the Hype Cycle for Privacy, 2020, as a Sample Vendor for 5G security. According to Gartner, "5G will increase the number and diversity of connected objects, potential DDoS attack vectors and en...
Enterprise Security, Platform Security, Software Security
Businesswire | May 03, 2023
GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, announced today that Cequence Security, the leading provider of Unified API Protection (UAP), has joined its Emerging Cyber Vendor Program. Through this partnership, Cequence Security will leverage GuidePoint’s federal expertise across sales and marketing, operations, engineering and procurement to expand their federal footprint. As part of this program, the Ceque...
Tripwire | August 18, 2020
At the outset of the global coronavirus 2019 (COVID-19) pandemic, many organizations decided to enforce social distancing by requiring that their employees begin working from home. This decision changed the fundamental way in which many employees were accustomed to working. It also created new security challenges for organizations that had larger remote workforces.
Tripwire wanted to learn the specifics of these challenges, so it commissioned Dimensional Research to 345 IT securit...
Security Magazine | February 24, 2020
Data privacy laws are evolving to allow individuals the opportunity to understand the types of data that companies are collecting about them and to provide ways to access or delete the data. The goals of data privacy law are to give some control of the data back to the individual, and to provide a transparent view on the collecting and safeguarding of that data. Prior to the GDPR and CCPA, it was difficult to understand what was being collected and how it was being used. Was the website selling ...
Data Security, Enterprise Security
Data Security, Enterprise Identity
Data Security, Platform Security, Software Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE