WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > BDCon
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
Cyware | January 28, 2020
Ransomware families that belong to Ryuk and Sodinokibi are responsible for the huge rise in the ransom payments.In Q4 of 2019, 98% of companies had received a working decryptor tool for the ransom paid.With the increase in ransomware attacks, the average ransom payment has risen to 104% in the fourth quarter of 2019. A report from Coveware reveals that the ransomware attackers had collected an average of around $84,000 from victim organizations in the Q4 of 2019 when compared to $41,198 in Q3 of...
DATA SECURITY
Synack | October 20, 2021
Synack, the premier crowdsourced platform for on-demand security expertise, today is giving customers the easiest, most flexible and most innovative approach for deploying critical cybersecurity solutions to defend against today's digital threats. Synack Campaigns empowers organizations with on-demand access to a community of 1,500 skilled and trusted ethical hackers to perform a range of tasks, from targeted security checks to cloud configuration assessments. Customers ...
prnewswire | September 28, 2020
Redscan, the Managed Detection and Response and Penetration Testing specialist, today announced the availability of its services on G-Cloud 12 – the latest iteration of the UK Government's cloud procurement platform. The Redscan services listed are ThreatDetect– Managed Detection and Response as well as CREST-accredited Penetration Testing and IT Health Checks. These services are designed to enable organisations to reliably secure their infrastructure and assets as well as rapidl...
helpnetsecurity | June 11, 2021
Version 8.1 of Protegrity, the latest version of the Protegrity Data Protection Platform, is released. This has the features such as monitoring capabilities and dynamic data masking. It provides all the customers, from a single data store, multiple data-protection methods. The company has also introduced Protegrity Cloud API and a redesigned logging architecture. Monitoring and dynamic data masking provide visibility and control for sensitive data access Read More
Article
ENTERPRISE SECURITY
Whitepaper
infographic
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE