WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Sopra Steria
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
Cyware | January 28, 2020
Ransomware families that belong to Ryuk and Sodinokibi are responsible for the huge rise in the ransom payments.In Q4 of 2019, 98% of companies had received a working decryptor tool for the ransom paid.With the increase in ransomware attacks, the average ransom payment has risen to 104% in the fourth quarter of 2019. A report from Coveware reveals that the ransomware attackers had collected an average of around $84,000 from victim organizations in the Q4 of 2019 when compared to $41,198 in Q3 of...
prnewswire | October 07, 2020
CyberSecure IPS and Tellabs have announced a global, go-to-market partnership with far-reaching consequences for the network technology and security industries. As part of the alliance, CyberSecure's Unified Cyber-Physical Protection will be added to the portfolio of Enterprise, Broadband and Network products and services offered by Tellabs. Tellabs clients, including service providers, government agencies, hospitals, schools, and residences, will now have the option to complement indu...
business2community | February 25, 2020
This interesting piece from McKinsey made me think and deserves some comments: “The risk-based approach to cybersecurity”. The risk-based approach itself which it promotes has solid foundations, and in fact is nothing new. Actually, it echoes in many ways the model we – at Corix Partners – have been developing and delivering with clients and associates for the past 10 years .But I don’t think it makes sense – or indeed helps the industry move forward – t...
DATA SECURITY
BitTrap | October 05, 2021
Startup company BitTrap has announced a blockchain-based cybersecurity solution that leverages attackers' motivations to provide singular detection capabilities. This approach differs from cybersecurity paradigms that focus on trying to keep attackers from breaking in. Instead, it assumes some have already made their way inside a network, undetected, and is designed to identify them and reduce hacker dwell time in the compromised system. The system works by deploying a vast ne...
Article
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE