article thumbnail

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

The Last Watchdog

Started by infosec professionals, Peerlyst takes the characteristics of B2B communications we’ve become accustomed to on Twitter and LinkedIn and directs it toward cybersecurity. Related: Automating threat feed analysis Peerlyst is another step in that direction.

InfoSec 37
article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

28, 2023 – AppDirect , the world’s leading B2B subscription commerce platform, today released key findings from its IT Business Leaders 2024 Outlook Report. San Francisco, Calif., Getting help from experts who can analyze security gaps can help IT business leaders build a strong security strategy.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: 360 Privacy secures $36M to deliver turnkey digital executive protection platform

The Last Watchdog

Serving both B2B and B2C customers, 360 Privacy remediates risk to Fortune 2000 enterprises and their executives, as well as high-net-worth families, athletes and entertainers. Protection starts faster than other industry-standard tools, with daily scans beginning at the time of enrollment.

B2C 100
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. They serve as benchmarks for upholding strong security requirements, evaluating existing tools, and assessing potential solutions.

Risk 108
article thumbnail

The story of the year: remote work

SecureList

In the B2B sector, this manifested itself either in targeted attacks imitating email from specialized organizations, such as lures using the WHO logo and name, or attempting to take advantage of the fact that companies rapidly transitioned to remote work – often without having the time to ensure that proper security measures were in place.

Scams 75