WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Motiv Inc
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
chamberbusiness | May 06, 2020
In recent weeks reveal the need for businesses to double down on security to ensure their networks are protected, a leading cyber security expert said. . Many of the attacks were ransomware, holding companies’ network systems hostage until a payout was mad...
Enterprise Security, Platform Security, Software Security
Absolute Software | March 14, 2023
Absolute SoftwareTM, the only provider of self-healing, intelligent security solutions, recently announced the continued addition to the Absolute Application Resilience ecosystem with the introduction of the latest product. Joint clients can now utilize Absolute's proprietary Persistence® technology and unbreakable device connection to improve the resiliency and health of over 70 mission-critical security and business solutions, such as eClinicalWorks, HCL BigFix, IMTLaz...
Software Security
Involta | August 08, 2022
Involta, an award-winning data center, hybrid IT, and cloud-forward consulting firm, announces today a partnership with HacWare, an AI-driven cybersecurity awareness and training SaaS (Software-as-a-Service) product that combines threat intelligence with user behavior to help lean IT teams combat today's most advanced phishing attacks. "Today, email phishing attacks remain the number one source of security breaches, causing over 90% of data breaches," states Tiffany ...
The hacker news | March 02, 2020
Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...
Application Security
Article
Whitepaper
Data Security, Enterprise Security, Software Security
Cloud Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE