article thumbnail

Kingston Technology Wins Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

the flash memory affiliate of Kingston Technology Company, Inc., We carry a full range of portable encrypted solutions for customers of all levels when data needs to go outside the firewall,” said Richard Kanadjian, encrypted USB business manager, Kingston. “We About CDM InfoSec Awards. FOUNTAIN VALLEY, Calif.–(

InfoSec 40
article thumbnail

Top Web Application Firewall (WAF) Vendors

eSecurity Planet

Web application firewalls (WAFs) are a critical component for robust application security. At the same time, WAF technology is increasingly a part of more comprehensive security solutions like next-generation firewalls (NGFW), unified threat management (UTM), and more. Best Web Application Firewalls (WAFs). Checkpoint.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize.

article thumbnail

News alert: Traceable celebrates winning the prestigious SINET16 Innovator Award for 2023

The Last Watchdog

The SINET16 Innovator Award recognizes the most innovative companies and technologies addressing today’s top cybersecurity threats and vulnerabilities. San Francisco, Calif., In just a few months, Traceable’s innovative solutions have been consistently acknowledged.

InfoSec 100
article thumbnail

Business Must Change: InfoSec in 2019

The Falcon's View

Consider, if you will, that fundamentally we in infosec want people to make better decisions. No matter how you look at it, DevOps is the way that business should operate, and that is - interestingly enough - exactly matched to the org management model that Laloux describes (without ever getting into technology or DevOps!).

InfoSec 40
article thumbnail

Spotlight on Cybersecurity Leaders: Steve Naphy

SecureWorld News

A : I have worked in information technology (IT) and networking for more than 20 years in the retail, distribution, and legal industries. When I started, networking owned the firewalls. My goals in InfoSec are similar: to teach the organization how to protect itself. A : Reconnecting with the Philadelphia InfoSec community.

article thumbnail

GUEST ESSAY: How and why ‘pen testing’ will continue to play a key role in cybersecurity

The Last Watchdog

When we look at society today, we can see that we are moving further and further ahead with technology. In fact, there is evidence that technology grows exponentially fast. Since we are quickly putting out large technologies, security risks always come with this. Related: Integrating ‘pen tests’ into firewalls.