Corporate Technologies

For over 20 years CTI has provided critical data analytics, data protection and cyber security solutions essential for the complex business of leveraging IT innovation while reducing risk. Life Sciences, Health Care, Financial Services, Retail and Higher Education organizations from 50 to 50,000 employees depend on CTI for industry expertise, solutions, leadership, and managed services.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

NETWORK THREAT DETECTION

SILVERSKY ANNOUNCES ACQUISITION OF CYGILANT, GAINS UK PRESENCE AND RENOWNED DATA RESEARCH TALENT

SilverSky | January 11, 2022

news image

SilverSky, a cybersecurity innovator offering powerful managed detection and response (MDR) services, today announced it completed the acquisition of Burlington, Massachusetts-based Cygilant. As a leading cybersecurity-as-a-service provider, Cygilant operates a security operation center (SOC) in Belfast, Northern Ireland and also boasts some of the world's most notable Ph.D.-level talent focused on cybersecurity, advanced networks and data science. The addition of Cygilant'...

Read More

ARIA INTEGRATES SDS SOLUTION WITH SUMO LOGIC TO COUNTER NETWORK-BORNE ATTACKS

CSP Inc. | February 25, 2020

news image

ARIA Cybersecurity Solution delivers a software defined approach for improved cyberattack incident response. The ARIA™ Software-Defined Security (SDS) solution was engineered to work seamlessly with other security tools. Read More

DATA SECURITY

TO DEFEND AGAINST CYBER ATTACKS, MITRE LAUNCHED ENGAGE FRAMEWORK

MITRE | March 03, 2022

news image

MITRE introduced MITRE Engage™, a communication, and planning framework for cyber adversary engagement, deception, and denial efforts. Engage assists chief information security officers (CISOs), cyber defenders, and vendors in implementing protection methods based on real-world adversary behavior. Adversary engagement and deception operations can halve the cost of a data breach, waste an adversary's time, and make attackers more challenging to discover. Engage is mapped ...

Read More

UNCOVERING AGGRESSIVE METHODS USED BY RANSOMWARE OPERATORS TO DISRUPT REPUTATION OF VICTIMS

Cyware | March 07, 2020

news image

Ransomware has been one of the most prolific cyber threats in recent years and it is unlikely that the menace due to this malware will stop any time soon. The first ransomware attack The first instance of ransomware was observed in December 1989. Tracked as AIDS trojan, the ransomware was introduced to the world after it infected 20,000 floppy disks of delegates who had attended the World Health Organization’s AIDS conference in Stockholm.The disk contained malicious code that hid f...

Read More
news image

NETWORK THREAT DETECTION

SILVERSKY ANNOUNCES ACQUISITION OF CYGILANT, GAINS UK PRESENCE AND RENOWNED DATA RESEARCH TALENT

SilverSky | January 11, 2022

SilverSky, a cybersecurity innovator offering powerful managed detection and response (MDR) services, today announced it completed the acquisition of Burlington, Massachusetts-based Cygilant. As a leading cybersecurity-as-a-service provider, Cygilant operates a security operation center (SOC) in Belfast, Northern Ireland and also boasts some of the world's most notable Ph.D.-level talent focused on cybersecurity, advanced networks and data science. The addition of Cygilant'...

Read More
news image

ARIA INTEGRATES SDS SOLUTION WITH SUMO LOGIC TO COUNTER NETWORK-BORNE ATTACKS

CSP Inc. | February 25, 2020

ARIA Cybersecurity Solution delivers a software defined approach for improved cyberattack incident response. The ARIA™ Software-Defined Security (SDS) solution was engineered to work seamlessly with other security tools. Read More

news image

DATA SECURITY

TO DEFEND AGAINST CYBER ATTACKS, MITRE LAUNCHED ENGAGE FRAMEWORK

MITRE | March 03, 2022

MITRE introduced MITRE Engage™, a communication, and planning framework for cyber adversary engagement, deception, and denial efforts. Engage assists chief information security officers (CISOs), cyber defenders, and vendors in implementing protection methods based on real-world adversary behavior. Adversary engagement and deception operations can halve the cost of a data breach, waste an adversary's time, and make attackers more challenging to discover. Engage is mapped ...

Read More
news image

UNCOVERING AGGRESSIVE METHODS USED BY RANSOMWARE OPERATORS TO DISRUPT REPUTATION OF VICTIMS

Cyware | March 07, 2020

Ransomware has been one of the most prolific cyber threats in recent years and it is unlikely that the menace due to this malware will stop any time soon. The first ransomware attack The first instance of ransomware was observed in December 1989. Tracked as AIDS trojan, the ransomware was introduced to the world after it infected 20,000 floppy disks of delegates who had attended the World Health Organization’s AIDS conference in Stockholm.The disk contained malicious code that hid f...

Read More