FirstWave Cloud Technology

firstwavecloud.com

FirstWave Cloud Technology was born in the early 2000’s to address the burgeoning cloud security needs in the market. We delivered our first managed Security as a Service (SaaS) solutions in 2004 in a form similar to what we call “cloud” today. The journey started with a significant focus and investment in research and development with a vision to build a secure, highly accessible, and intelligent portal to quickly adapt to the ever-changing threat landscapes.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Data Security

IN ONE OF THE LARGEST FUNDING ROUNDS IN CYBERSECURITY, CYE PAVES ITS WAY TO HYPER-GROWTH, SECURING $100 MILLION

prnewswire | February 10, 2021

news image

CYE, the business chief in cybersecurity streamlining arrangements, declared today that it has brought more than $100 million up in a financing round, drove by the worldwide venture association EQT, with cooperation from existing financial backer, 83North. The venture - follows 5 years of organization and will be utilized to proceed with CYE's hyper-development in the worldwide market. Since its origin in 2012, CYE has been focused on aiding its clients assume full responsibil...

Read More

DATA BREACH REPORT: POPULAR DIGITAL WALLET APP KEY RING EXPOSES 14 MILLION USERS

securitymagazine | April 03, 2020

news image

Led by Noam Rotem and Ran Locar, vpnMentor’s research team of ethical hackers, recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14 million users. Key Ring allows users to upload scans and photos of membership and loyalty cards onto a digital folder on one’s phone. However, many users also use it to store copies of IDs, driver licenses, credit cards, and more. A misconfigured Amazon Web Services (AWS) S3 bucket owned by th...

Read More

5 CYBER SECURITY TRENDS IN 2020 BUSINESSES NEED TO KNOW

Mybusiness | March 11, 2020

news image

As Australian businesses continue to move their operations online, large corporations and small to medium enterprises (SMEs) alike are grappling with increasingly savvy cyber attacks. According to Business Victoria, such attacks can cost businesses an average of $276,000 to detect, recover, and repair. SMEs are particularly vulnerable, with some sources suggesting that as much as 43% of all cyber attacks in Australia target smaller businesses. Against this backdrop, it’s critical that busi...

Read More

CISA RELEASES FIRST OF ITS SERIES OF SIX CYBERSECURITY ESSENTIALS TOOLKITS

CISA | June 02, 2020

news image

This is a starting point for small businesses and government agencies to understand and address cybersecurity risk as they do other risks, CISA’s toolkits will provide greater detail. Improve cybersecurity practices, the six cyber essentials toolkits will a...

Read More
news image

Data Security

IN ONE OF THE LARGEST FUNDING ROUNDS IN CYBERSECURITY, CYE PAVES ITS WAY TO HYPER-GROWTH, SECURING $100 MILLION

prnewswire | February 10, 2021

CYE, the business chief in cybersecurity streamlining arrangements, declared today that it has brought more than $100 million up in a financing round, drove by the worldwide venture association EQT, with cooperation from existing financial backer, 83North. The venture - follows 5 years of organization and will be utilized to proceed with CYE's hyper-development in the worldwide market. Since its origin in 2012, CYE has been focused on aiding its clients assume full responsibil...

Read More
news image

DATA BREACH REPORT: POPULAR DIGITAL WALLET APP KEY RING EXPOSES 14 MILLION USERS

securitymagazine | April 03, 2020

Led by Noam Rotem and Ran Locar, vpnMentor’s research team of ethical hackers, recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14 million users. Key Ring allows users to upload scans and photos of membership and loyalty cards onto a digital folder on one’s phone. However, many users also use it to store copies of IDs, driver licenses, credit cards, and more. A misconfigured Amazon Web Services (AWS) S3 bucket owned by th...

Read More
news image

5 CYBER SECURITY TRENDS IN 2020 BUSINESSES NEED TO KNOW

Mybusiness | March 11, 2020

As Australian businesses continue to move their operations online, large corporations and small to medium enterprises (SMEs) alike are grappling with increasingly savvy cyber attacks. According to Business Victoria, such attacks can cost businesses an average of $276,000 to detect, recover, and repair. SMEs are particularly vulnerable, with some sources suggesting that as much as 43% of all cyber attacks in Australia target smaller businesses. Against this backdrop, it’s critical that busi...

Read More
news image

CISA RELEASES FIRST OF ITS SERIES OF SIX CYBERSECURITY ESSENTIALS TOOLKITS

CISA | June 02, 2020

This is a starting point for small businesses and government agencies to understand and address cybersecurity risk as they do other risks, CISA’s toolkits will provide greater detail. Improve cybersecurity practices, the six cyber essentials toolkits will a...

Read More

Resources

resource image

Cloud Security

ESG Passwordless in the Enterprise

Whitepaper

resource image

Cloud Security

Securing Remote Access

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us