WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Trends & Technologies, Inc
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
Infosecurity Magazine | November 30, 2015
Cybercrime is no longer the only concern when it comes to data breaches, and as the landscape continues to evolve, companies must try to stay ahead of the curve and be prepared to respond to any type of security incident. Experian Data Breach Resolution has released its third annual Data Breach Industry Forecast white paper, showing that while some current issues remain relevant, there are a few emerging areas that warrant attention....
Infosecurity Magazine | November 13, 2015
Although cybersecurity incidents are daily news, with reports of escalating impacts and costs that are sometimes measured in the billions, at least one survey has identified new reasons for optimism. According to the Global State of Information Security Survey 2016 from PricewaterhouseCoopers (PwC), the vast majority of organizations—91%—have adopted a security framework or, more often, an amalgam of frameworks. The most frequently followed guidelines are ISO 27001, the US National I...
kroll | January 07, 2016
Your peers have spoken: there are a number of cyber security trends and threats that concerned them in 2015—all of which should be on your radar, too. We’ve compiled the highlights from a survey released this year by the Hartford Steam Boiler (HSB) to give you a glimpse into what risk managers across the country are currently facing...
scmagazine | January 07, 2016
Since 2009, if not earlier, investment banks have been pushing the technology envelope to achieve the absolute lowest latency for high frequency trading. This was accomplished by using state of the art switches, servers and with significant latency reductions contributed by software solutions such as operating system (OS) bypass also called user-level networking. But not all electronic trading applications need the absolute lowest latency....
PLATFORM SECURITY
Article
ENTERPRISE SECURITY
DATA SECURITY
Whitepaper
SOFTWARE SECURITY
Video
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE