WELCOME TO The Information security REPORT
CST (Computer Security Technology)
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
abc6onyourside | January 15, 2020
A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...
Cengage Group | February 01, 2022
Cengage Group, a global education technology firm with millions of students, has agreed to pay $190.8 million for Infosec, a significant cybersecurity education provider. Cengage Group will expand into the cybersecurity professional training market due to this acquisition, and its fast-developing Workforce Skills business will grow significantly. Subject to usual closing conditions and regulatory clearances, the acquisition is scheduled to close in the first calendar quarter of 2022.
ITC Secure | December 16, 2021
ITC Secure (ITC), a leading advisory-led cyber security services company and a Microsoft Gold cyber security partner, and Cassava Technologies, the pan-African technology leader, announced today that they have entered into a Joint Venture (JV) to build and launch an extensive portfolio of cyber security services, powered by Microsoft Azure cloud technologies in Africa.
Hardy Pemhiwa, the CEO of Cassava Technologies said: “Digital transformation in Africa is accelerating the ...
businesswire | January 19, 2021
Digital Observer, the chief Continuous Controls Monitoring (CCM) arrangement, today declared a significant upgrade to its foundation that empowers CISOs and other security and danger the board heads to acquire new, constant, bound together perceivability into the viability of online protection instruments that are executed all through their endeavor. By ceaselessly recovering and examining Critical Security Controls (CSCs) from applications on-premises and in-cloud, Cyber Observer's CCM stag...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE