WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Inhance Technology
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
DATA SECURITY
SYNNEX | July 22, 2021
A leading provider of distribution, systems design, and integration services for the technology industry, SYNNEX Corporation (NYSE: SNX) has announced its expansion of networking and security portfolio with a leading cybersecurity and compliance company, Proofpoint products and services. Through SYNNEX, resellers can have access to the whole Proofpoint line. They can leverage their combined suite of cloud-based solutions, assisting companies globally to safeguard their data, stop ...
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Hillstone Networks | August 25, 2022
Hillstone Networks, an innovative and accessible cybersecurity solutions provider, today unveiled new models in the Hillstone Networks A-Series Next Generation Firewalls (NGFW), the A7600 and A6800, to help enterprises secure their expanding network edge, deliver powerful network security capabilities, and drive sustainability with solutions in a compact 1RU form factor. According to IBM’s Cost of a Breach 2022 report, 83% of organizations studied have had more than one brea...
Help net security | March 20, 2020
The global spread of the COVID-19 coronavirus has had a notable impact on workplaces worldwide, and many organizations are encouraging employees to work from home. What are the cybersecurity implications of this shift? Having a sizable amount of employees suddenly working remotely can be a major change for organizations and presents numerous problems with regard to cybersecurity. One issue involves a lack of authentication and authorization. Because people are not seeing ea...
The hacker news | March 02, 2020
Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...
Whitepaper
ENTERPRISE IDENTITY, ENTERPRISE SECURITY
Video
DATA SECURITY, ENTERPRISE IDENTITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE