WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Zoom Technologies
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
prnewswire | October 08, 2020
Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today released its CISO Decisions survey, an independent global study1 that examines what most influences the Board to invest in cybersecurity and the impact this has on CISO decision-making. Based on findings from more than 900 global CISOs/Senior IT decision-makers, the research shows Boardroom investments in cybersecurity are most commonly the result of an inc...
Data Security, Enterprise Security, Software Security
Edgio | February 28, 2023
On February 27, 2023, Edgio, Inc. announced major enhancements to its security platform to enable enterprises to better identify and respond to emerging threats while ensuring the integrity, confidentiality, and availability of their data and applications. The platform's new capabilities aim to reduce the damage caused by the upsurge in the severity of Distributed Denial of Service (DDoS) and other advanced application attacks. Edgio's DDoS scrubbing solution delivers de...
Data Security
RangeForce | February 23, 2022
RangeForce, a cybersecurity hiring solution that uses real-world hands-on exercises to help security leaders validate and assess candidates' actual abilities, announced RangeForce Talent. This cybersecurity hiring solution uses real-world, hands-on activities to help security leaders validate and evaluate candidates' actual skills. A recent survey says security leaders are still having trouble finding experienced personnel, with 73 percent seeing it as a source of concern....
Data Security,Platform Security,Software Security
Legit Security | December 12, 2022
Legit Security, a cyber security company with an enterprise platform that protects an organization's software supply chain from attack and ensures secure application delivery, today announced that it discovered a new class of software supply chain vulnerabilities that leverage artifact poisoning to attack underlying software development pipelines. The vulnerability was found in GitHub Actions, a platform for orchestrating and automating software development pipelines, and the vulnerability w...
Whitepaper
Data Security, Enterprise Security
Video
Enterprise Security, Platform Security, Software Security
infographic
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE