WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Area 1 Security | October 22, 2021
Area 1 Security has been selected as the primary cloud email security provider for all customers of SolCyber, the first modern MSSP for the midmarket. Area 1's industry-first preemptive cloud email security stops phishing campaigns 24 days (on average) before they launch — keeping inboxes clean of threats that cause 95% of cybersecurity incidents.
The SolCyber and Area 1 partnership brings best-in-class email protection to midsize organizations, which are increasingly ta...
Sikich | July 23, 2020
Less than 40% of respondents in Sikich's 2020 Manufacturing and Distribution Report said they perform important data breach prevention activities, such as penetration testing, phishing exercises on employees and assessments of vendors' data security efforts. However, manufacturers and distributors remain vulnerable to breaches. Nearly half of respondents said their companies experienced cyberattacks during the past 12 months."Cybersecurity is an essential part of a company'...
Darktrace | May 10, 2021
Darktrace, a leading autonomous cybersecurity AI firm, revealed today that it has partnered with tech giant Microsoft. The collaboration provides joint customers with enterprise-scale, self-learning AI that identifies and reacts to cyber-threats autonomously.
This partnership expands Darktrace's self-learning artificial intelligence for cybersecurity within Microsoft environments, such as Microsoft 365 and cloud apps like Azure Sentinel. When companies and workforces around th...
scmagazine | March 26, 2020
Kaspersky has uncovered an highly targeted attack striking a single country using a trojan written in C++ that has not been spotted before. Dubbed Milum, the trojan shows no code similarities with known campaigns reported Kaspersky’s Threat Attribution Engine and only three instances of it have bee found and are considered all part of the same operation which received the code name operation WildPressure. When successfully installed the trojan can enable a remote attacker to gain control o...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE