WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Balbix | November 02, 2021
Balbix, provider of the world's leading platform for cybersecurity posture automation, announced today the general availability of the Balbix Connector for AWS. As a result of the new offering, customers gain a comprehensive inventory of their assets spanning on-premises and cloud as well as the ability to discover, prioritize and mitigate unseen risks, including unpatched software vulnerabilities, weak credentials, missing or poor encryption, trust issues and cloud infrastructure misconfigu...
Unisys | July 21, 2020
Unisys Corporation (NYSE: UIS) today announced the availability of Unisys Stealth(identity)™ Software-as-a-Service (SaaS) 2.0 and Stealth(identity) 2.7, the latest versions of the company's biometric identity management software. Stealth(identity) is highly scalable and brings flexible biometric authentication and strong security to enterprises of any size, while the SaaS offering means protection capabilities are available either on premises or in the cloud.Stealth(identity) str...
BlackBerry | July 27, 2021
BlackBerry Limited (NYSE: BB; TSX: BB) has announced the release of the latest edition of the company's flagship software composition analysis tool, BlackBerry Jarvis 2.0.
A SaaS version of the original Jarvis capabilities is introduced in the BlackBerry Jarvis 2.0. This provides integrators and developers a more focused and user-friendly feature set around the three most important areas, which those building mission-critical applications want to authenticate to confirm the su...
Cyware | March 07, 2020
Ransomware has been one of the most prolific cyber threats in recent years and it is unlikely that the menace due to this malware will stop any time soon. The first ransomware attack
The first instance of ransomware was observed in December 1989. Tracked as AIDS trojan, the ransomware was introduced to the world after it infected 20,000 floppy disks of delegates who had attended the World Health Organization’s AIDS conference in Stockholm.The disk contained malicious code that hid f...
DATA SECURITY,ENTERPRISE IDENTITY,ENTERPRISE SECURITY
DATA SECURITY,PLATFORM SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE