Security - Research Notes

Demisto Acquired by Palo Alto Networks for $560M

Security orchestration, automation, and response (SOAR) firm, Demisto, was acquired by Palo Alto Networks in March as Palo Alto aims to strengthen its commitment to...

TITUS Is a Top Contender for Efficiently Identifying, Classifying, and Securing Your Data

TITUS Intelligent Protection places second, winning the Silver Cybersecurity Excellence Product Award in the Data Classification category, following Spirion’s solution.

Splashtop Remote Support Partners With Bitdefender

Splashtop integrates its Remote Support with Bitdefender’s antivirus software to offer enhanced security to its customer endpoints from the Splashtop console.

HUD Sues Facebook for Housing Discrimination – All Technology Companies Beware

The US Department of Housing and Urban Development has sued Facebook, alleging the social media giant has participated in housing discrimination by allowing advertisers...

Combine Security Risk Management Components Into One Program – Executive Brief

Read this Executive Brief to understand why a highly mature security risk management program can help inform your overall security program.

Orchestration Tool Makers Set Sights on Security and Compliance

Orchestration tool makers have set their sights on security and compliance. IT professionals should remember that “compliance as code” isn’t the easy button they might...

“It’s basically AES-256 encryption on steroids”: SecurityFirst Enthusiastic About DataKeep 2.3

Do you like the security encryption provides? Are you running an NFS or AIX system? If you said yes, you may be interested in recent updates to SecurityFirst’s signature...

Embed Security Into the DevOps Pipeline – Executive Brief

Read this Executive Brief to understand DevOps and how to secure the development pipeline.

2019 Cybersecurity Excellence Awards for Security Education Organizations

The Cybersecurity Excellence Awards of 2019 have been announced. While these awards help to identify leaders in this market, we recommend using other factors to decide...

Marriott Breach – Learn From One of the Largest Breaches in History

This Info-Tech briefing will provide a synopsis of what occurred and how organizations can leverage this data breach to expand their security program.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us