WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
cloudcomputing | September 14, 2018
The self-service and dynamic nature of cloud infrastructure creates challenges for risk and compliance professionals. Tools that worked well in the traditional data centre do not translate to the public cloud. Due to these concerns over regulatory compliance and security, as well as the complexity involved in replacing legacy systems, financial institutions are taking a more tentative approach to change – especially when it comes to implementing new technologies that could put ...
The Jewish Press | June 27, 2019
Rod Reuven Dovid Bryant and Jerry Gordon bring back Dr. Stephen Bryen to discuss the clash between the US and Iran over the downing in international waters of a US Navy MQ 4 Triton surveillance drone by Iranian air defense missiles. He questions the wisdom of disclosing the US retaliatory cyber-attack against Iranian air defense missile control systems. We review Trump’s tough sanctions against Iran’s Ayatollah Khamenei and Revolutionary Guard military officials. We switch the focus ...
Infosecurity Magazine | January 31, 2019
In its 2019 Threat Report, Sophos predicted a rise in targeted ransomware attacks. According to new research, Matrix, a copycat targeted ransomware that is flying under the radar, is one such threat that has been observed targeting single machines. The recent ransomware report, published by SophosLabs, identifies brute-force attacks on weak remote desktop protocols (RDP) as the common thread between various strains of targeted ransomware, including Matrix, BitPaymer, Dharma, SamSam and Ryuk. Mat...
abc6onyourside | January 15, 2020
A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...
Network Threat Detection
Enterprise Security, Platform Security
Data Security, InfoSec Project Management
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE