WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
prnewswire | September 15, 2020
Hub Security, the cyber security platform, is announcing the use of its military-grade VaultHSM to secure INX Limited's crypto services.This news comes on the heels of INX Limited's latest announcement of its initial public offering this week of up to 130 million INX Security Tokens (the "INX Tokens" or "Tokens"). Hub Security utilizes military-grade cybersecurity principles for its Vault HSM (Hardware Security Module) and handheld miniHSM devices' with FIPS Appro...
SecurityScorecard | August 23, 2021
SecurityScorecard, the global leader in security ratings, today announces a partnership with Tenable the Cyber Exposure company, to deliver a comprehensive view into an organization's risk posture by marrying Tenable's unmatched visibility and depth of analytics into enterprise environments with external cyber monitoring powered by SecurityScorecard. As a result of this partnership, CISOs, IT leaders and security teams are able to review their SecurityScorecard rating, assess their exter...
Infosecurity | January 29, 2020
A South Carolina water company is recovering from a cyber-attack that took its phone and online payment systems offline for nearly a week. The cyber-attack on Greenville Water triggered a payment system outage that began on Wednesday, January 22. Company spokesperson Emerald Clark said 500,000 customers were affected by the incident. An investigation has been launched into the cyber-attack, the exact nature of which is yet to be revealed by Greenville Water. It's not yet known who targeted t...
SafeGuard Cyber | July 13, 2021
The only SaaS platform dedicated to managing the entire lifecycle of digital risk protection, SafeGuard Cyber, has released conclusions from a survey of 100 IT security leaders about their safeguarding digital communications and digital risk processes. The finding of the survey indicates that cybersecurity leaders recognize what is required for adequate digital risk protection. But, they are still dealing with boundaries and susceptibilities in defending these communications, such asthird-party ...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE