pro-report

Want to know more about a cybersecurity product or market space in an easy-to-digest report you can read in 5 minutes? Read the only independent research focused on the cybersecurity market from both a vendor and operator perspective.

Security, Funded - October 2021 Roll-up
Members Public

The October 2021 roll-up of the "Security, Funded" newsletter from Return on Security.

Mike P
Mike P
pro-report

Security, Funded - September 2021 Roll-up
Members Public

The September 2021 roll-up of the "Security, Funded" newsletter from Return on Security.

Mike P
Mike P
pro-report
How do you keep your data on lock?

CMI #11 - Data Loss Prevention (DLP)
Members Public

Businesses run on sensitive data. Protecting and limiting the loss or misuse of that data is an ever-evolving challenge.

Mike P
Mike P
pro-report

Security, Funded - August 2021 Roll-up
Members Public

The August 2021 roll-up of the "Security, Funded" newsletter from Return on Security.

Mike P
Mike P
pro-report

Security, Funded. - July 2021 Roll-up
Members Public

The July 2021 roll-up of the "Security, Funded." newsletter from Return on Security.

Mike P
Mike P
pro-report
CMI #10 - Deception Technologies

CMI #10 - Deception Technologies
Members Public

The best offense is a good defense. Purposefully misleading or deceiving would-be attackers with traps and decoys is a way to have a canary in the coal mine.

Mike P
Mike P
pro-report
CMI #9 - Breach & Attack Simulation

CMI #9 - Breach & Attack Simulation
Members Public

Security is point-in-time. It’s not a matter of if you get hacked, but when. Why not simulate hacking yourself to get better at attack detection and response?

Mike P
Mike P
pro-report
CMI #8 - Data Access Governance

CMI #8 - Data Access Governance
Members Public

Data is the currency of business, and as trends in privacy and cybersecurity grow, it becomes increasingly important to govern access to that data.

Mike P
Mike P
pro-report