WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Twistlock
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
eWeek | September 20, 2017
Container security startup Twistlock is set to formally announce its latest platform update on Sept. 21, providing new security features to manage and control micro-services deployments. The Twistlock 2.2 update builds on elements the company first introduced in its 2.0 update in April, including the shift to the Go programming language....
eWeek | November 13, 2018
There is a simple truism in much of IT, and that is that organizations can't manage what they're not aware of. As organizations increasingly make use of distributed teams that use cloud-native services, there is a nontrivial risk of application sprawl. On Nov. 13, container security vendor Twistlock announced its new open-source cloud-native discovery tool, in an effort to help identify and locate applications running on different public cloud services. The Cloud Discovery tool's ini...
CISO MAG | July 08, 2019
Global cybersecurity company Palo Alto Networks announced that it entered into a definitive agreement to acquire the cybersecurity startup Twistlock in a $410 million acquisition deal. Headquartered in the United States, Twistlock provides comprehensive Cloud Native Security to the enterprises. The latest acquisition integrates Twistlock’s technology, which focuses on securing IT infrastructure tools, with the Palo Alto Networks’ Prisma cloud security product. The company claims that...
abc6onyourside | January 15, 2020
A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...
Software Security
Article
Whitepaper
Data Security, Enterprise Security, Platform Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE