Hack In The Box Choses Incapsula to Protect Its Conference Website

Incapsula Blocks Web Threats, While Optimizing Traffic Delivery
Incapsula Blocks Web Threats, While Optimizing Traffic Delivery
BYOD Considered a Personal Security Risk for 57% of Employees
Trustwave-s Nicholas Percoco and U.S. Secret Service Special Agent to Present "The Lifecycle of Cybercrime" at Industry-s Largest Security Event
PALO ALTO, CA — (Marketwire) — 02/13/13 — Morta Security, an early-stage start-up based in Palo Alto, CA, has closed its first round of financing. Investors participating include venture firms Andreessen Horowitz, Greylock Partners, and Norwest Venture Partners; and notable investors Data Collective, Larry Link, and Peter Wagner.Morta Security is developing a new paradigm to counter advanced cyber threats. "Sophisticated cyber threats are a significant and growing concern for both comme
Continuous Monitoring, Analytics for Risk Mitigation Mapped to Enterprise Risk and Compliance Applications
PORTLAND, OR — (Marketwire) — 10/05/12 — Tripwire, Inc., a leading global provider of IT security solutions, today announced , the Chief Technology Officer at Tripwire, Inc., will speak at the upcoming in Minneapolis. Dwayne will be serving on a panel titled "The Fortune 500 Perspective – How Companies Manage." Also serving on this panel will be Dave Notch, Former CISO Thomson Reuters; Renee Lopez-Pineda, General Manager, IT of Delta Air Lines; Wade Baker, Director, Research and I
Highlights to Include Highly Cost-Effective, Always Available Wide Area Storage and High-Speed, Automated Video Analytics Technology
RESTON, VA — (Marketwire) — 09/14/12 — , an award-winning solution, was profiled by Ant Allan in Gartner-s recently released Cool Vendors in Security: Identity and Access Management, 2012* report. According to the analysts authoring the report, the six companies covered provide highly innovative and enhanced technologies within the identity and access management (IAM) market.The report highlights the need to choose a solution that works well in the real-world and is provided by a capable au
Investment Guru Thomas Trkla Joins eCrypt-s Distinguished Board
Experts Weigh In on Fighting Cybercrimes During Cyber Security Awareness Month Panel Event