WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Sify Technologies Limited
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
Info security | February 17, 2020
A local authority in the north-east of England appears to have suffered a major ransomware attack, leaving online public services down for 135,000 locals, for over a week. At the time of writing, the website of Redcar & Cleveland Borough Council was still down. An update on the council’s official Twitter account as of February 13 said: “We are still experiencing issues with our IT systems, which means we are working with a reduced capacity. We are able to receive and answer limit...
DATA SECURITY
Trend Micro | August 03, 2021
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced its participation at virtual Black Hat USA 2021, July 31st - August 5th. Attendees can visit the virtual booth to test their skills in the Exploit Elimination Challenge, as well as see how threat intelligence fuels Trend Micro's platform security and attend sessions with Trend Micro's industry experts. Trend Micro Research is at the heart of the company's ongoing innovation ...
HUB Security | December 17, 2021
HUB Security, a secure computing solutions provider, announced today its Docker Digital Twin product to better protect, authenticate, and verify traffic created by Docker, a highly used platform for package containment. The HUB Security Docker Digital Twin enforces access control and provides governance processes, such as approvals for sensitive actions, on incoming Docker traffic. It blocks attack vectors involving the loss or theft of credentials, vulnerabilities, and unauthoriz...
Google | April 27, 2020
Google says it has blocked 18 million daily malware and phishing emails related to COVID-19 over the past week. Majority of malware and phishing emails involve impersonation. Read More
Article
SOFTWARE SECURITY
Video
none
Whitepaper
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE