cybersecuritycorporate.com Open in urlscan Pro
88.208.240.227  Public Scan

Submitted URL: http://cybersecuritycorporate.com/
Effective URL: https://cybersecuritycorporate.com/
Submission: On February 08 via manual from IN — Scanned from GB

Form analysis 2 forms found in the DOM

GET /Search/Results

<form action="/Search/Results" method="get"> <input name="Id" placeholder="Search: Topics, Companies, Whitepapers, Case Studies  etc…" class="form-control" type="text" id="search">
  <img src="/img/search.svg" alt="search icon" class="search-icon">
</form>

GET /SignUp

<form action="/SignUp" method="get">
  <div id="container-sign-up" class="">
    <div class="col-md-6 col-sm-12 no-padding-left-right signup-left">
      <p id="sign-up-txt"> Sign up for Cyber Security Corporate </p>
      <p>As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.</p> <!--Note for Dan: Needs to be plugged in-->
    </div>
    <div class="col-md-6 col-sm-12 no-padding-left-right center-responsive signup-right">
      <div class="sign-up-container">
        <input maxlength="256" name="email" placeholder="Enter your email address" class="enter-email-field">
        <span class="blue-edge"></span>
        <img src="/img/email-icon-blue.svg" alt="envelope icon">
        <input type="submit" class="btn subscribe-submit" value="Submit">
      </div>
    </div>
  </div>
  <span class="overlay-web-banner"></span>
</form>

Text Content

Sign Up

 * Topics
 * Latest Whitepapers
 * Companies A-Z
 * Contact Us

USA
USA | EU | UK | ASIA
 * Topics
 * Latest Whitepapers
 * Companies A-Z
 * Contact Us

USA
Sign Up



2325 WHITEPAPERS FROM 182 COMPANIES

Whitepapers featured from the most reputable companies in the industry


See All Companies



FEATURED CONTENT

The Five Nastiest Security Mistakes Exposing Public Cloud Infrastructure

Public cloud infrastructure has become a critical asset to enterprises that
compete on innovation. Protecting that competitive edge means finding...

View More

Cybercrime Threatens the Digital Funnel

Cybercriminals are employing new attack methods on new digital surfaces,
including digital marketing. They’re using bots, or automation software,...

View More

A Visual Landscape Of Cybersecurity

Our world has never moved faster in terms of cyber threats, security technology
innovations and overall business transformation. The complexity...

View More

Top Threat Detections Seen Across Healthcare Organizations

We consider the relationship between Healthcare and Cybersecurity today. How can
healthcare security teams begin to understand attacker behavior...

View More

Alarming Ransomware Trend Shows No Sign of Reversing

It’s no secret that ransomware threats skyrocketed – in both volume and boldness
– during the pandemic. Threat actors capitalized on the sudden...

View More

For digital sovereignty and transparency in the cloud

Shared use of infrastructure not only saves resources but also enables companies
to push ahead with digitalisation with limited technical expertise...

View More
More resources


CYBER SECURITY SPOTLIGHTS


CLOUD SECURITY

 * API Security
 * Cloud Access Security Broker (CASB)
 * Cloud Compliance
 * Cloud Data Security
 * Cloud DDoS Mitigation


CONFIDENTIALITY

 * Certificate Lifecycle Management
 * DMARC
 * Encryption
 * Proxy Network
 * SSL & TLS Certificates


DATA SECURITY

 * Database Security
 * Data Center Security
 * Data-Centric Security
 * Data Loss Prevention (DLP)
 * Data Masking Software


EMAIL SECURITY

 * Cloud Email Security
 * Email Anti-Spam
 * Email Encryption
 * Intelligent Email Protection
 * Secure Email Gateway


ENDPOINT PROTECTION

 * Antivirus
 * Endpoint Detection & Response (EDR)
 * Endpoint Management
 * Endpoint Protection


IDENTITY MANAGEMENT

 * Biometric Authentication
 * Cloud Directory
 * Customer Identity and Access Management (CIAM)
 * Decentralized Identity


NETWORK SECURITY

 * DNS Security
 * Firewall
 * Intrusion Detesction and Prevention Systems (IDPS)
 * Microsegmentation
 * Network Access Control


SYSTEM SECURITY

 * Breach and Attack Simulation
 * Deception technology
 * Digital Forensics
 * Incident Response
 * IoT Security
 * Malware Analysis


VULNERABILITY MANAGEMENT

 * Attack Surface Management
 * Patch Management
 * Risk-Based Vulnerability Management
 * Secure Code Training
 * Security Aware Training


WEB SECURITY

 * Bot Detection and Mitigation
 * Browser Isolation
 * Dark Web Monitoring
 * DDoS Protection
 * Fraud Detection
 * Secure Web gateways


ABOUT US


This site forms part of the IT Corporate Information Hub - a leading Global
platform for sourcing business technology research.

Headquartered in the UK and with offices in London, New York and Munich, we
provide technology and business professionals with authoritative, educational
and informative content helping them to assess, analyse and review their
business needs within the fast paced technology matrix.

Designed as an easily accessible library of whitepapers, case studies and
reports we have become vital to the activities of influential business decision
makers everywhere.

Hosting in excess of 3,000 whitepapers from leading technology vendors, we are
continually expanding and growing to meet the needs of the worldwide technology
research community.

265

Websites

60

Countries

32

Languages

Sign up for Cyber Security Corporate

As a subscriber you will receive alerts and free access to our constantly
updated library of white papers, analyst reports, case studies, web seminars and
solution reports.




© Copyright 2023: Headley Media Technology Division Ltd.
Company Number: 112774219

SITE MAP

 * Home
 * Topics
 * Companies A-Z
 * Latest Whitepapers
 * Privacy
 * Terms & Conditions

CONTACT US

info@headleymedia.com

+44 (0) 1932 564999

Contact Us
We use cookies to improve user experience on our website. If you continue, we'll
assume you are happy for your web browser to receive all cookies from our
website. See our cookies policy for more information on cookies and how to
manage them