WELCOME TO The Information security REPORT
ECSC Group plc
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
ECSC Group plc ECSC | December 09, 2016
With the UK set to go it alone as a trading nation after the EU Referendum, the country will need companies that are capable of growing and thriving. The Government is recognising the importance of technology companies in powering the UK economy. The Autumn Statement from Philip Hammond pledged new funding for innovation as part of a ‘Productivity Fund’. But much of the power will have to come from the companies themselves. With an initial public offering scheduled for December, Brad...
Technology Decision | January 13, 2020
Accenture’s security arm is set to get a boost with the anticipated acquisition of Symantec’s Cyber Security Services business.The professional services firm has agreed to buy Symantec’s Cyber Security Services business from Broadcom in a bid to enhance its ability to help companies prepare for, detect and respond to cyber threats, Accenture said. Symantec’s portfolio of cybersecurity services includes global threat monitoring and analysis through a network of security op...
Kotov | January 13, 2020
Computer updates can be confusing, but the newest Microsoft Windows update is vital to keep you online information safe. The end of Microsoft 7 support will actually take place on Jan.14.While may seem harmless not to update your computer, it will actually open you up to things like viruses and hacking."If you don't upgrade to Windows 10, then over time security vulnerabilities will be found in Window 7 and since Microsoft is no longer offering support they won't be making patches f...
abc6onyourside | January 15, 2020
A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
ENTERPRISE IDENTITY, ENTERPRISE SECURITY
DATA SECURITY, ENTERPRISE IDENTITY, ENTERPRISE SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE