CLOs on the Move

The Wireless Alliance

www.thewirelessalliance.com

 
www.TheWirelessAlliance.com | @TWArecycle on Twitter! The Wireless Alliance is a cell phone recycling company. We work with wireless retail stores, e-waste recyclers, schools, universities, state and local government, large corporations and ...
  • Number of Employees: 0-25
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

Beanfield Technologies

Beanfield Technologies Inc. is a Toronto, ON-based company in the Computers & Electronics sector.

ShiftLeft

Shipping secure code is painful and time-consuming – slowing down development teams and AppSec teams alike. ShiftLeft is on a mission to make vulnerabilities history. Our revolutionary Code Property Graph (CPG) enables us to seamlessly insert 10x faster code analysis, prioritized OSS vulnerability findings and real-time security education in one single SaaS platform integrated directly into modern development workflows. Combining our OWASP-benchmark dominating NG-SAST, Intelligent SCA, instant secrets detection, and contextual security education, ShiftLeft CORE code security platform turns every developer into an AppSec expert.

Future Link of Illinois

Future Link of Illinois is a Carol Stream, IL-based company in the Computers and Electronics sector.

MindSharp

MindSharp is a Maple Grove, MN-based company in the Computers and Electronics sector.

CyberCatch

CyberCatch Holdings, is a cybersecurity company that provides a proprietary, artificial intelligence-enabled (AI) Software-as-a-Service (SaaS) solution that enables continuous compliance and cyber risk mitigation to organizations in critical segments, so they can be safe from cyber threats. The CyberCatch platform focuses on solving the root cause of why cyberattacks are successful: security holes from control deficiencies. It first helps implement all mandated and necessary controls, then the platform automatically and continuously tests the controls from three dimensions (outside-in, inside-out and social engineering) to find control failures so one can fix them promptly to stay compliant and safe from attackers.