WELCOME TO The Information security REPORT
Sangram Vajre, Co-Founder & Chief Evangelist at Terminus is also an author and host of the podcast FlipmyFunnel. He is one of the leading minds in B2B marketin...
prnewswire | September 17, 2020
IT-Harvest, an independent research firm covering the cybersecurity industry, has published a "Cyber Threat Intelligence Market Research Report 1H 2020" – Richard Stiennon and Ron Moritz on the cyber threat intelligence (CTI) sector. The report includes 61 vendors that provide threat intelligence to the enterprise or collect and manage threat intelligence. These include, Recorded Future acquired by Insight Partners in 2019, Anomali, LookingGlass Cyber Solutions, ZeroFOX, and Ints...
prnewswire | September 16, 2020
RedShield, specialists in web application shielding, has announced the appointment of industry thought-leader Kate Kuehn as a board director. Based in Chicago, Kuehn's appointment is part of RedShield's strategy to accelerate growth in the U.S; a push made possible by RedShield's USD$10M Series B funding last September. Her appointment follows that of fellow industry veteran James Carrigan Jr. to Chief Revenue Officer (CRO), who recently joined the company from Verizon. Kuehn joins R...
Napatech, the leading provider of reconfigurable computing platforms, today announced a new design win with a US-headquartered provider of analytics for roaming, security, and risk management. Napatech's SmartNIC hardware and software will be used by the original equipment manufacturer (OEM) in their signaling firewall to improve the performance, scalability, and security of mobile networks. Network security vulnerabilities are magnified in 5G networks with more operator types, access points...
prnewswire | September 15, 2020
Hub Security, the cyber security platform, is announcing the use of its military-grade VaultHSM to secure INX Limited's crypto services.This news comes on the heels of INX Limited's latest announcement of its initial public offering this week of up to 130 million INX Security Tokens (the "INX Tokens" or "Tokens"). Hub Security utilizes military-grade cybersecurity principles for its Vault HSM (Hardware Security Module) and handheld miniHSM devices' with FIPS Appro...
Enterprise Security, Platform Security, Software Security
Data Security, Enterprise Security, Platform Security
Data Security, Platform Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE