Eric Marchewitz is a field solution architect with a 23-year career in cybersecurity solutions, working for companies such as PGP Security, McAfee, Cisco and Check Point. He is also a CISSP and cloud ...
Thales today announced the Controlled Availability of Imperva for Google Cloud, bringing the industry's most trusted ...
PORTLAND, Ore.--(BUSINESS WIRE)--Orca Security, the pioneer of agentless cloud security, today announced new application security capabilities that unify security, DevOps and development teams to ...
Among its many use cases, AI technologies are now being integrated into cloud environments to bolster security. With AI, organizations can automate the detection of code generated by machine learning ...
The New CloudGuard WAF-as-a-Service offers a fully managed, scalable solution empowering businesses to navigate the digital world with confidence and resilience REDWOOD CITY, Calif., June 11, 2024 ...
SANTA CLARA, Calif., Aug. 5, 2025 /PRNewswire/ -- Palo Alto Networks (PANW) ® (NASDAQ: PANW), the global cybersecurity leader, today announced Cortex ® Cloud™ Application Security Posture Management ...
ARMO Ltd., the cloud runtime security company behind the open-source Kubernetes security platform Kubescape, today announced the launch of Behavioral Cloud Application Detection and Response, a new ...
OTTAWA, Aug. 23, 2011 /PRNewswire/ - AFORE Solutions, Inc., provider of the CloudLink(TM) cloud security and management software portfolio, today announces the acquisition of privately held Comsecware ...
The Spring Security framework is a reliable way for Java developers to secure applications. However, proper implementation is critical to prevent the most common vulnerabilities. Continue Reading ...
The Orca Cloud Security Platform bridges the gaps between cloud and application security with new Static Application Security Testing (SAST), OSS License Scanning, and AI-Driven remediation ...
To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results