TBG Security

tbgsecurity.com

TBG provides a portfolio of services including security, compliance and continuity solutions. TBG helps professionals and executives in industries including: health care; banking, financial and insurance services; retail and consumer goods; business and technology services. TBG's customer driven approach to solving security compliance and continuity (SCC) problems is an unbiased approach that provides truly objective recommendations and solutions.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

PLATFORM SECURITY

PALO ALTO NETWORKS ACHIEVES FEDRAMP AUTHORIZATION FOR IOT SECURITY SOLUTION

Palo Alto Networks | April 22, 2022

news image

Palo Alto Networks , the global cybersecurity leader, today announced that its IoT Security solution has achieved Federal Risk and Authorization Management Program (FedRAMP) Moderate Authorization. The company's sponsoring agency is the United States Department of Veterans Affairs (VA). U.S. federal agencies are increasingly focused on adopting a Zero Trust architecture to ensure their IoT devices meet federal security compliance requirements. With this authorization, Palo Alt...

Read More

PLATFORM SECURITY

UPTYCS UNVEILS ADVANCED CONTAINER AND KUBERNETES CAPABILITIES

Uptycs | May 27, 2022

news image

Uptycs, the first cloud-native security analytics platform that enables both cloud and endpoint security from a single platform, today unveiled expanded container and Kubernetes security posture management (KSPM) features for its cloud workload protection platform (CWPP). These features enable real-time identification of containerized workloads, proactive scanning of container images in the CI/CD pipeline, constant compliance monitoring, and Kubernetes security policy audit and enforcement.
Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

ATTACKERS USE AUTOMATION TO SPEED FROM EXPLOIT TO COMPROMISE ACCORDING TO LACEWORK LABS CLOUD THREAT REPORT

Lacework | October 14, 2022

news image

Lacework®, the data-driven cloud security company, today released the fourth Lacework Labs Cloud Threat Report and subsequently launched a new, open source tool for cloud hunting and security efficacy testing. The new tool, known as Cloud Hunter, will help customers keep pace with ever-improving adversarial tradecraft through advanced environmental analysis and improved incident response time. Developed in response to new types of sophisticated threat models uncovered through ...

Read More

GARMIN FACING U.S. INVESTIGATION OVER PAYMENTS TO TERRORISTS BY THIRD PARTY FOLLOWING CYBER ATTACK

channelnews | August 05, 2020

news image

Garmin is believed to be under investigation by US authorities, for paying cyber terrorists millions of dollars via a third party after their data operations were taken down in a major hack attack by an organisation called Evil Corp.The US Company who like to present themselves as a squeaky-clean Company appears to have had no hesitation in paying Evil Corp who has been sanctioned by the US Treasury as a terrorist organisation....

Read More
news image

PLATFORM SECURITY

PALO ALTO NETWORKS ACHIEVES FEDRAMP AUTHORIZATION FOR IOT SECURITY SOLUTION

Palo Alto Networks | April 22, 2022

Palo Alto Networks , the global cybersecurity leader, today announced that its IoT Security solution has achieved Federal Risk and Authorization Management Program (FedRAMP) Moderate Authorization. The company's sponsoring agency is the United States Department of Veterans Affairs (VA). U.S. federal agencies are increasingly focused on adopting a Zero Trust architecture to ensure their IoT devices meet federal security compliance requirements. With this authorization, Palo Alt...

Read More
news image

PLATFORM SECURITY

UPTYCS UNVEILS ADVANCED CONTAINER AND KUBERNETES CAPABILITIES

Uptycs | May 27, 2022

Uptycs, the first cloud-native security analytics platform that enables both cloud and endpoint security from a single platform, today unveiled expanded container and Kubernetes security posture management (KSPM) features for its cloud workload protection platform (CWPP). These features enable real-time identification of containerized workloads, proactive scanning of container images in the CI/CD pipeline, constant compliance monitoring, and Kubernetes security policy audit and enforcement.
Read More

news image

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

ATTACKERS USE AUTOMATION TO SPEED FROM EXPLOIT TO COMPROMISE ACCORDING TO LACEWORK LABS CLOUD THREAT REPORT

Lacework | October 14, 2022

Lacework®, the data-driven cloud security company, today released the fourth Lacework Labs Cloud Threat Report and subsequently launched a new, open source tool for cloud hunting and security efficacy testing. The new tool, known as Cloud Hunter, will help customers keep pace with ever-improving adversarial tradecraft through advanced environmental analysis and improved incident response time. Developed in response to new types of sophisticated threat models uncovered through ...

Read More
news image

GARMIN FACING U.S. INVESTIGATION OVER PAYMENTS TO TERRORISTS BY THIRD PARTY FOLLOWING CYBER ATTACK

channelnews | August 05, 2020

Garmin is believed to be under investigation by US authorities, for paying cyber terrorists millions of dollars via a third party after their data operations were taken down in a major hack attack by an organisation called Evil Corp.The US Company who like to present themselves as a squeaky-clean Company appears to have had no hesitation in paying Evil Corp who has been sanctioned by the US Treasury as a terrorist organisation....

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us