WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Greystone Technology
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Webinar
Conference
PLATFORM SECURITY,SOFTWARE SECURITY
Vijilan Security | January 17, 2023
Vijilan, a leading provider of cybersecurity services, announced that it had become a CrowdStrike Powered Service Provider (CPSP) partner. As a CPSP partner, Vijilan will offer managed observability services and managed endpoint detection and response (EDR) powered by the CrowdStrike Falcon platform to its partner communities of managed service providers and IT professionals. CrowdStrike has transformed security with the CrowdStrike Falcon platform, a unified security platform w...
DATA SECURITY
Radiflow | May 31, 2021
Radiflow has received extensive industry appreciation for its one-of-a-kind, fully IEC62443-compliant Cyber Industrial Automated Risk Analysis Platform (CIARA), enabling CISOs to optimize their cybersecurity expenditure non-intrusively simulating breach attempts in industrial automation networks and prioritizing the most effective mitigation measures. In accordance with Radiflow's ongoing mission of "Taking the guesswork out of OT cybersecurity," the latest edition o...
CREDENCE SECURITY | June 03, 2021
The demand for leading cybersecurity and digital forensics solutions is higher than ever. For over 20 years, Credence Security, a PAN-EMEA specialty distributor, has led in these areas along with governance, risk, and compliance, based in Dubai and regional presence in Johannesburg, London, Nairobi, New Delhi, and Saudi Arabia. Credence Security provides cybersecurity and digital forensics solutions to both public and private sector enterprises through a select network of specialist resellers. Read More
Threatpost | February 03, 2020
Researchers said that they were able to create “phantom” images purporting to be an obstacle, lane or road sign and trick systems into believing that they are legitimate. On the scale of level 0 (no automation) to level 5 (full automation), thes...
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Video
DATA SECURITY, ENTERPRISE IDENTITY
Whitepaper
DATA SECURITY, ENTERPRISE SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE