WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Skyhigh Security | March 22, 2022
Symphony Technology Group (“STG”), a leading Menlo Park-based private equity firm focused on the software, data, and analytics sectors, today announced the launch of Skyhigh Security. The new portfolio company was created to satisfy the growing cloud security requirements for large and small organizations. Skyhigh Security’s unique approach extends security beyond data access to securing how the data is used. Its data-aware Security Service Edge (SSE) is built to meet the needs...
Tech Republic | February 05, 2020
Organizations received a type of holiday gift during the fourth quarter of 2019 as the volume of malware and other security threats declined. However, employees returning to work after the new year presented a fresh target for cybercriminals to launch their attacks. In its Quarterly Threat Landscape Report, the security provider Nuspire discusses the threats that marked the final quarter of 2019 and offers advice on how organizations can defend themselves against these threats. For last quarter,...
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Synack | September 13, 2022
Synack, a premier platform for on-demand security expertise, announced that it has joined the Microsoft Intelligent Security Association (MISA) and is available through integration with Microsoft Sentinel, giving enterprises globally seamless access to a worldwide network of top security researchers working around the clock to protect their cloud assets.
Becoming part of MISA, an ecosystem of independent software vendors and managed security service providers, builds on a gr...
CISOMAG | January 20, 2020
As reported by ZDNet, a hacker who seems to be a DDoS-for-hire (DDoS booter) service operator, has published a massive list of 515,000 Telnet credentials consisting passwords of servers, home routers, and IoT (Internet of Things) devices. The published list also includes IP address of each device along with a username and password of its Telnet service. Telnet is a remote access protocol that can be used to control devices over the internet. The hacker compiled the leaked list by scanning the in...
ENTERPRISE IDENTITY, NETWORK THREAT DETECTION
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE