cybersecuritycorporate.com
Open in
urlscan Pro
88.208.240.227
Public Scan
Submitted URL: http://cybersecuritycorporate.com/
Effective URL: https://cybersecuritycorporate.com/
Submission: On February 08 via manual from IN — Scanned from GB
Effective URL: https://cybersecuritycorporate.com/
Submission: On February 08 via manual from IN — Scanned from GB
Form analysis
2 forms found in the DOMGET /Search/Results
<form action="/Search/Results" method="get"> <input name="Id" placeholder="Search: Topics, Companies, Whitepapers, Case Studies etc…" class="form-control" type="text" id="search">
<img src="/img/search.svg" alt="search icon" class="search-icon">
</form>
GET /SignUp
<form action="/SignUp" method="get">
<div id="container-sign-up" class="">
<div class="col-md-6 col-sm-12 no-padding-left-right signup-left">
<p id="sign-up-txt"> Sign up for Cyber Security Corporate </p>
<p>As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.</p> <!--Note for Dan: Needs to be plugged in-->
</div>
<div class="col-md-6 col-sm-12 no-padding-left-right center-responsive signup-right">
<div class="sign-up-container">
<input maxlength="256" name="email" placeholder="Enter your email address" class="enter-email-field">
<span class="blue-edge"></span>
<img src="/img/email-icon-blue.svg" alt="envelope icon">
<input type="submit" class="btn subscribe-submit" value="Submit">
</div>
</div>
</div>
<span class="overlay-web-banner"></span>
</form>
Text Content
Sign Up * Topics * Latest Whitepapers * Companies A-Z * Contact Us USA USA | EU | UK | ASIA * Topics * Latest Whitepapers * Companies A-Z * Contact Us USA Sign Up 2325 WHITEPAPERS FROM 182 COMPANIES Whitepapers featured from the most reputable companies in the industry See All Companies FEATURED CONTENT The Five Nastiest Security Mistakes Exposing Public Cloud Infrastructure Public cloud infrastructure has become a critical asset to enterprises that compete on innovation. Protecting that competitive edge means finding... View More Cybercrime Threatens the Digital Funnel Cybercriminals are employing new attack methods on new digital surfaces, including digital marketing. They’re using bots, or automation software,... View More A Visual Landscape Of Cybersecurity Our world has never moved faster in terms of cyber threats, security technology innovations and overall business transformation. The complexity... View More Top Threat Detections Seen Across Healthcare Organizations We consider the relationship between Healthcare and Cybersecurity today. How can healthcare security teams begin to understand attacker behavior... View More Alarming Ransomware Trend Shows No Sign of Reversing It’s no secret that ransomware threats skyrocketed – in both volume and boldness – during the pandemic. Threat actors capitalized on the sudden... View More For digital sovereignty and transparency in the cloud Shared use of infrastructure not only saves resources but also enables companies to push ahead with digitalisation with limited technical expertise... View More More resources CYBER SECURITY SPOTLIGHTS CLOUD SECURITY * API Security * Cloud Access Security Broker (CASB) * Cloud Compliance * Cloud Data Security * Cloud DDoS Mitigation CONFIDENTIALITY * Certificate Lifecycle Management * DMARC * Encryption * Proxy Network * SSL & TLS Certificates DATA SECURITY * Database Security * Data Center Security * Data-Centric Security * Data Loss Prevention (DLP) * Data Masking Software EMAIL SECURITY * Cloud Email Security * Email Anti-Spam * Email Encryption * Intelligent Email Protection * Secure Email Gateway ENDPOINT PROTECTION * Antivirus * Endpoint Detection & Response (EDR) * Endpoint Management * Endpoint Protection IDENTITY MANAGEMENT * Biometric Authentication * Cloud Directory * Customer Identity and Access Management (CIAM) * Decentralized Identity NETWORK SECURITY * DNS Security * Firewall * Intrusion Detesction and Prevention Systems (IDPS) * Microsegmentation * Network Access Control SYSTEM SECURITY * Breach and Attack Simulation * Deception technology * Digital Forensics * Incident Response * IoT Security * Malware Analysis VULNERABILITY MANAGEMENT * Attack Surface Management * Patch Management * Risk-Based Vulnerability Management * Secure Code Training * Security Aware Training WEB SECURITY * Bot Detection and Mitigation * Browser Isolation * Dark Web Monitoring * DDoS Protection * Fraud Detection * Secure Web gateways ABOUT US This site forms part of the IT Corporate Information Hub - a leading Global platform for sourcing business technology research. Headquartered in the UK and with offices in London, New York and Munich, we provide technology and business professionals with authoritative, educational and informative content helping them to assess, analyse and review their business needs within the fast paced technology matrix. Designed as an easily accessible library of whitepapers, case studies and reports we have become vital to the activities of influential business decision makers everywhere. Hosting in excess of 3,000 whitepapers from leading technology vendors, we are continually expanding and growing to meet the needs of the worldwide technology research community. 265 Websites 60 Countries 32 Languages Sign up for Cyber Security Corporate As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports. © Copyright 2023: Headley Media Technology Division Ltd. Company Number: 112774219 SITE MAP * Home * Topics * Companies A-Z * Latest Whitepapers * Privacy * Terms & Conditions CONTACT US info@headleymedia.com +44 (0) 1932 564999 Contact Us We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them