WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Cyware | January 28, 2020
Ransomware families that belong to Ryuk and Sodinokibi are responsible for the huge rise in the ransom payments.In Q4 of 2019, 98% of companies had received a working decryptor tool for the ransom paid.With the increase in ransomware attacks, the average ransom payment has risen to 104% in the fourth quarter of 2019. A report from Coveware reveals that the ransomware attackers had collected an average of around $84,000 from victim organizations in the Q4 of 2019 when compared to $41,198 in Q3 of...
Turing AI | June 16, 2022
Turing AI has added people attribute search, a game changing feature in AI Security, to their flagship AI-powered video security platform Turing Vision. Whereas other camera-based security system depends on facial recognition and object detection alone to safeguard facilities and locate events, people attribute search adds several factors to identification, enhancing speed and accuracy of finding and recognizing people at the scene of events.
With the inclusion of individuals attr...
ProtectedBy.A | June 09, 2021
A world leader in artificial intelligence driven solutions, ProtectedBy.AI, is launching CodeLock. This has been designed as its patented revolutionary approach to prevent insertion attacks that may occur in a software supply chain.
The recent cyberattacks with Colonial Pipeline, with SolarWinds, and JBS have destroyed many organizations globally. Globally, including the attacks on multiple U.S. government agencies could have prevented by using CodeLock™.
Morganfranklin | June 14, 2022
MorganFranklin Consulting, a management consulting business located in Washington, DC, has opened a new cybersecurity innovation center (CIC).
Customers will be able to obtain insight into how security technologies will perform in their environment and how cyberattacks will influence their systems thanks to the bespoke, interactive lab environment.
“As ever-increasing and more sophisticated attacks combine with rapid digital transformation, cyber...
DATA SECURITY, ENTERPRISE IDENTITY
SECURITY AUDIT AND COMPLIANCE
DATA SECURITY, PLATFORM SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE