CyberQ Consulting

cyberqindia.com

CyberQ Consulting was founded in February 1997, with the objective of providing Process Improvement and Information Security Consulting Services.Over the years, CyberQ carved out a niche for itself in the areas of Process Assurance, Information Security Assurance and IT Consulting services.The company also broadened its services horizon to include Software development and Application roll-out services with special focus to e-Governance applications.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Data Security, Platform Security, Software Security

RED SIFT ACQUIRES HARDENIZE TO REDEFINE ENTERPRISE ATTACK SURFACE PROTECTION

Red Sift | October 14, 2022

news image

Red Sift today announced that it has acquired global Attack Surface Management (ASM) innovator, Hardenize. The strategic move enables Red Sift to enrich, extend, and improve its existing security solutions to also protect customers’ internet assets and infrastructure, offering a complete, best-in-class digital resilience solution. The integration of Hardenize’s unique ASM capabilities enables the Red Sift platform to gain a comprehensive view of an organization’s digital footpr...

Read More

REDCAR COUNCIL EXCLUDES PUBLIC FROM CYBER-ATTACK DISCUSSION

BBC | March 07, 2020

news image

Redcar and Cleveland Council's systems have been down since 8 February after a ransomware attack.The Local Democracy Reporting Service understands no ransom has been paid. Concerned about "sensitive" information being discussed, council officials requested not to answer councillors' questions in public. Assistant director of governance Steve Newton said: "There is still a criminal investigation ongoing and I'm not quite sure where these questions will lead." At th...

Read More

Platform Security, Software Security, API Security

TRACEABLE AI INTRODUCES WORLD’S FIRST ZERO TRUST API ACCESS (ZTAA) SOLUTION

Businesswire | April 28, 2023

news image

Traceable AI, the industry’s leading API security company, today announced the launch of its innovative solution, Zero Trust API Access, to help organizations better protect sensitive data, stop API abuse, and align data security programs with broader innovation and business objectives. As the industry’s first and only solution in the market, Traceable’s Zero Trust API Access actively reduces your attack surface by minimizing or eliminating implied and persiste...

Read More

Data Security, Platform Security, Software Security

ABSOLUTE SOFTWARE ADDS TRELLIX ENDPOINT SECURITY TO APPLICATION RESILIENCE ECOSYSTEM

Absolute Software | September 20, 2022

news image

Absolute Software™ , the only provider of self-healing, intelligent security solutions, today announced a partnership with Trellix, enabling Absolute Resilience® customers to extend its patented Absolute Persistence® technology to Trellix Endpoint Security (ENS). With this latest addition to the company’s Application Resilience™ ecosystem, joint customers can leverage the power of Absolute’s firmware-embedded connection to ensure Trellix’s leading endpoint p...

Read More
news image

Data Security, Platform Security, Software Security

RED SIFT ACQUIRES HARDENIZE TO REDEFINE ENTERPRISE ATTACK SURFACE PROTECTION

Red Sift | October 14, 2022

Red Sift today announced that it has acquired global Attack Surface Management (ASM) innovator, Hardenize. The strategic move enables Red Sift to enrich, extend, and improve its existing security solutions to also protect customers’ internet assets and infrastructure, offering a complete, best-in-class digital resilience solution. The integration of Hardenize’s unique ASM capabilities enables the Red Sift platform to gain a comprehensive view of an organization’s digital footpr...

Read More
news image

REDCAR COUNCIL EXCLUDES PUBLIC FROM CYBER-ATTACK DISCUSSION

BBC | March 07, 2020

Redcar and Cleveland Council's systems have been down since 8 February after a ransomware attack.The Local Democracy Reporting Service understands no ransom has been paid. Concerned about "sensitive" information being discussed, council officials requested not to answer councillors' questions in public. Assistant director of governance Steve Newton said: "There is still a criminal investigation ongoing and I'm not quite sure where these questions will lead." At th...

Read More
news image

Platform Security, Software Security, API Security

TRACEABLE AI INTRODUCES WORLD’S FIRST ZERO TRUST API ACCESS (ZTAA) SOLUTION

Businesswire | April 28, 2023

Traceable AI, the industry’s leading API security company, today announced the launch of its innovative solution, Zero Trust API Access, to help organizations better protect sensitive data, stop API abuse, and align data security programs with broader innovation and business objectives. As the industry’s first and only solution in the market, Traceable’s Zero Trust API Access actively reduces your attack surface by minimizing or eliminating implied and persiste...

Read More
news image

Data Security, Platform Security, Software Security

ABSOLUTE SOFTWARE ADDS TRELLIX ENDPOINT SECURITY TO APPLICATION RESILIENCE ECOSYSTEM

Absolute Software | September 20, 2022

Absolute Software™ , the only provider of self-healing, intelligent security solutions, today announced a partnership with Trellix, enabling Absolute Resilience® customers to extend its patented Absolute Persistence® technology to Trellix Endpoint Security (ENS). With this latest addition to the company’s Application Resilience™ ecosystem, joint customers can leverage the power of Absolute’s firmware-embedded connection to ensure Trellix’s leading endpoint p...

Read More

Resources

resource image

Data Security, Enterprise Identity, Software Security

Multiverse Security: Easy, Built-in, Comprehensive and Continuous

Whitepaper

resource image

Enterprise Security, Network Threat Detection, Software Security

2023's Must-Attend Networking Security Conferences for Businesses

Article

resource image

Data Security, Enterprise Identity, Software Security

Multiverse Security: Easy, Built-in, Comprehensive and Continuous

Whitepaper

resource image

Enterprise Security, Network Threat Detection, Software Security

2023's Must-Attend Networking Security Conferences for Businesses

Article

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us