your market intelligence analyst
Search Results
Edit Save
16,088 results
Security Bloggers Network 08/13/2020 11:30
The Forrester Research Top Cybersecurity Threats In 2020 report was recently published, based on data obtained from nearly 4,000 respondents as part of an extensive survey performed between April 2019 and June 2019. It analyzes common attack patterns responsible for breaches last year, and how security professionals can protect against them. PerimeterX cybersecurity evangelist Deepak.. .
Security Bloggers Network 08/13/2020 11:00
As we continue to move through 2020 it has become very clear that cyber criminals are taking advantage of the COVID-19 crisis as they continue to target new victims every day. In a recent report, the Federal Trade Commission has recorded, to date, over 59,000 coronavirus or stimulus-related complaints. These complaints have resulted in over […]. .
Security Bloggers Network 08/13/2020 10:34
Keets to Drive Global Sales Expansion as Enterprises & Government Entities Turn to Network Security Policy Management to Enable Faster Digital Transformation DALLAS – August 12th, 2020 – FireMon, the leading network security policy management company that brings visibility, control, agility and automation to enterprise cloud and hybrid network infrastructure, today announced it has appointed Brian Keets in.. .
Security Bloggers Network 08/13/2020 09:58
What is Modern Desktop Management? Desktop management is a mature administrative IT task that goes back at least 20 years, with the advent of Group Policy. It filled a key need: enabling IT administrators to enforce user and computer policies at a large scale for network-connected devices. Administrators were able to control features like desktop... . .
Security Bloggers Network 08/13/2020 06:53
Adaptive Shield emerged from stealth to address the need to better secure software-as-a-service (SaaS) applications. Fresh off raising an additional $4 million in funding, the company’s namesake platform identifies and prioritizes weaknesses in SaaS applications to enable security teams to proactively find and ultimately fix misconfigurations across a wide variety of platforms, including Microsoft Office.. .

Financial Services

Business Issues

Companies - Public

Companies - Venture Funded

Financial Results

Global Markets

Global Risk Factors

Government Agencies

Information Technologies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



  • Actions
    • Bookmark and Share: Allows you to Bookmark the page for easy future retrieval and sharing with colleagues
    • Email: Opens a pop-up window where you can write a message to the recipient of the email
    • Copy URL: Copies the URL of the requested document for pasting in an email or other document
    • Previous Versions: Only shown if essentially the same document has been republished
  • Saved Searches and Alerts
    • Save your search for later viewing & updates by clicking the blue "Save" button to the right of the search box. 

Click here for more info on Search Results.