WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > 360logica software testing services
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
SC Magazine | April 14, 2020
For the second consecutive month Microsoft rolled out a 100-plus batch of security updates for Patch Tuesday, this time including three vulnerabilities being exploited in the wild. Overall, the month saw 113 vulnerabilities addressed with 19 critical issues patched. The three currently exploited vulnerabilities are CVE-2020-1020, CVE-2020-0938, CVE-2020-0968 and CVE-2020-1027. The first two were initially disclosed on March 23 and can be found in the Adobe Font Manager Library and can lead to re...
Data Security
Optiv | August 09, 2021
Optiv Security, the leading end-to-end cybersecurity solutions partner, launched its Managed Extended Detection and Response (MXDR) offering at Black Hat USA 2021. The technology-independent offering enables clients to take rapid and decisive action against today's most critical cyberattacks and strengthen their security posture. "Optiv MXDR brings simplicity, transparency and automation to clients' environments, enhancing existing defenses to counter known and emergi...
Software Security
Keeper Security, Inc. | January 11, 2024
Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, announces Granular Sharing Enforcements will soon be available for all products in the Keeper® platform. Granular Sharing enables administrators to enforce detailed creating and sharing permissions at the user level. By implementing these permissions, organizations can ensure employees only have access to the re...
BitTrap | October 05, 2021
Startup company BitTrap has announced a blockchain-based cybersecurity solution that leverages attackers' motivations to provide singular detection capabilities. This approach differs from cybersecurity paradigms that focus on trying to keep attackers from breaking in. Instead, it assumes some have already made their way inside a network, undetected, and is designed to identify them and reduce hacker dwell time in the compromised system. The system works by deploying a vast ne...
Cloud Security
Whitepaper
Enterprise Security, Platform Security, Software Security
infographic
Enterprise Security, Platform Security
Article
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE