Drainware

Company dedicated to the development of disruptive technology in the field of information security solutions to provide network security and endpoint to our customers. Our portfolio includes some specific services for enterprises (SMEs and large). Young and very dynamic environment, to suit market needs. Startup in the ICT sector, awarded shares in different markets, products and company have high growth potential.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

NETWORK THREAT DETECTION

RADWARE AND CHT SECURITY TEAM UP TO PROTECT NCSOFT TAIWAN’S PRODUCT LAUNCH DURING MASSIVE DDOS ATTACKS

Radware | December 02, 2021

news image

Radware a leading provider of cyber security and application delivery solutions, today announced that CHT Security, selected Radware’s DefensePro DDoS Protection solution to safeguard gaming publisher NCSoft Taiwan from massive DDoS attacks during a very popular game launch. CHT Security is Taiwan’s leading managed security service provider and a subsidiary of Chunghwa Telecom, the largest telco in Taiwan. Supported by Radware’s data center protection and CHT Sec...

Read More

HACKERS CAN USE ULTRASONIC WAVES TO SECRETLY CONTROL VOICE ASSISTANT DEVICES

The hacker news | March 02, 2020

news image

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...

Read More

NO COMPENSATION AFTER A CYBERATTACK IN THE ABSENCE OF THIRD-PARTY POLICY

Security Brief | February 10, 2020

news image

Kaspersky's report revealed that 71% of enterprises with a third party policy reported receiving monetary recompense after an incident, compared to only 22% who did not have regulations in place. Damage from incidents is estimated to cost $2.57m on aver...

Read More

PLATFORM SECURITY

DELOITTE LAUNCHES EXPANDED CLOUD SECURITY MANAGEMENT PLATFORM

Deloitte | May 10, 2022

news image

Deloitte has enhanced existing features to offer Cloud Security Management (CSM) by Deloitte to assist US executives worried about visibility into the security of their cloud workloads and apps. The platform of services and solutions involves cloud security policy orchestration (CSPO), cyber predictive analytics, attack surface management, and cyber cloud managed services (CCMS), all of which can be used independently or in multi-cloud environments on Google Cloud, Microsoft Azure, and other pub...

Read More
news image

NETWORK THREAT DETECTION

RADWARE AND CHT SECURITY TEAM UP TO PROTECT NCSOFT TAIWAN’S PRODUCT LAUNCH DURING MASSIVE DDOS ATTACKS

Radware | December 02, 2021

Radware a leading provider of cyber security and application delivery solutions, today announced that CHT Security, selected Radware’s DefensePro DDoS Protection solution to safeguard gaming publisher NCSoft Taiwan from massive DDoS attacks during a very popular game launch. CHT Security is Taiwan’s leading managed security service provider and a subsidiary of Chunghwa Telecom, the largest telco in Taiwan. Supported by Radware’s data center protection and CHT Sec...

Read More
news image

HACKERS CAN USE ULTRASONIC WAVES TO SECRETLY CONTROL VOICE ASSISTANT DEVICES

The hacker news | March 02, 2020

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...

Read More
news image

NO COMPENSATION AFTER A CYBERATTACK IN THE ABSENCE OF THIRD-PARTY POLICY

Security Brief | February 10, 2020

Kaspersky's report revealed that 71% of enterprises with a third party policy reported receiving monetary recompense after an incident, compared to only 22% who did not have regulations in place. Damage from incidents is estimated to cost $2.57m on aver...

Read More
news image

PLATFORM SECURITY

DELOITTE LAUNCHES EXPANDED CLOUD SECURITY MANAGEMENT PLATFORM

Deloitte | May 10, 2022

Deloitte has enhanced existing features to offer Cloud Security Management (CSM) by Deloitte to assist US executives worried about visibility into the security of their cloud workloads and apps. The platform of services and solutions involves cloud security policy orchestration (CSPO), cyber predictive analytics, attack surface management, and cyber cloud managed services (CCMS), all of which can be used independently or in multi-cloud environments on Google Cloud, Microsoft Azure, and other pub...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us