Shodan is the world's first search engine for the Internet of Things and premier provider of Internet intelligence. The Shodan platform allows organizations to monitor their network, assess 3rd-party cyber risk, gather market intelligence and understand the global Internet landscape in real-time. Our data feeds are consumed by 70 of the Fortune 100 companies, thousands of universities and millions of users around the world.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

DATA SECURITY

HERJAVEC GROUP, A GLOBAL CYBERSECURITY LEADER, ACCELERATES GROWTH WITH ACQUISITION OF SEGMENTECH

Herjavec Group | October 14, 2021

news image

Robert Herjavec, Founder & CEO of global cybersecurity firm Herjavec Group and a leading investor on the Emmy Award-winning show Shark Tank, proudly announces the strategic acquisition of SEGMENTECH, a North American cybersecurity services firm specializing in Identity and Access Management (IAM) & Privileged Access Management (PAM) solutions for enterprise customers. This acquisition further expands and accelerates Herjavec Group's leading IAM practice by adding world...

Read More

SOFTWARE SECURITY

HUB SECURITY SIGNS AGREEMENT WITH LEADING CYBER SYSTEM INTEGRATORS

Hub Security | July 01, 2022

news image

HUB Cyber Security (Israel) Limited, a developer of Confidential Computing cybersecurity solutions and services, announced today an agreement to sell HUB's Confidential Compute solutions to US enterprises and telecommunications companies with one of the largest US cyber security system integrators. In the United States, the integrator focuses on supplying equipment and services for 5G networks and edge computing. The engagement is for two years and can be extended by mutual co...

Read More

HACKERS CAN USE ULTRASONIC WAVES TO SECRETLY CONTROL VOICE ASSISTANT DEVICES

The hacker news | March 02, 2020

news image

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...

Read More

TACKLING THE CYBER SECURITY CHALLENGES OF THE CLOUD TO MAXIMISE ITS POTENTIAL

Information age | February 05, 2020

news image

Cloud computing has become a prevalent force, bringing economies of scale and breakthrough technological advances to modern organisations, but it is more than just a trend. Cloud computing has evolved at an incredible speed and, in many organisations, is now entwined with the complex technological landscape that supports critical daily operations. This ever-expanding cloud environment gives rise to new types of risk. Business and security leaders already face many challenges in protecting their ...

Read More
news image

DATA SECURITY

HERJAVEC GROUP, A GLOBAL CYBERSECURITY LEADER, ACCELERATES GROWTH WITH ACQUISITION OF SEGMENTECH

Herjavec Group | October 14, 2021

Robert Herjavec, Founder & CEO of global cybersecurity firm Herjavec Group and a leading investor on the Emmy Award-winning show Shark Tank, proudly announces the strategic acquisition of SEGMENTECH, a North American cybersecurity services firm specializing in Identity and Access Management (IAM) & Privileged Access Management (PAM) solutions for enterprise customers. This acquisition further expands and accelerates Herjavec Group's leading IAM practice by adding world...

Read More
news image

SOFTWARE SECURITY

HUB SECURITY SIGNS AGREEMENT WITH LEADING CYBER SYSTEM INTEGRATORS

Hub Security | July 01, 2022

HUB Cyber Security (Israel) Limited, a developer of Confidential Computing cybersecurity solutions and services, announced today an agreement to sell HUB's Confidential Compute solutions to US enterprises and telecommunications companies with one of the largest US cyber security system integrators. In the United States, the integrator focuses on supplying equipment and services for 5G networks and edge computing. The engagement is for two years and can be extended by mutual co...

Read More
news image

HACKERS CAN USE ULTRASONIC WAVES TO SECRETLY CONTROL VOICE ASSISTANT DEVICES

The hacker news | March 02, 2020

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...

Read More
news image

TACKLING THE CYBER SECURITY CHALLENGES OF THE CLOUD TO MAXIMISE ITS POTENTIAL

Information age | February 05, 2020

Cloud computing has become a prevalent force, bringing economies of scale and breakthrough technological advances to modern organisations, but it is more than just a trend. Cloud computing has evolved at an incredible speed and, in many organisations, is now entwined with the complex technological landscape that supports critical daily operations. This ever-expanding cloud environment gives rise to new types of risk. Business and security leaders already face many challenges in protecting their ...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us