Ursus, Inc Talent, Services & Solutions

ursusinc.com

Ursus, Inc. is a privately held leader in providing business and technology staffing consulting services. Our professionals bring bold, fresh thinking combined with technology, business, and industry expertise to help fuel transformation and growth for our clients and their customers. We place the highest priority on understanding unique client needs first, ensuring mutual, best-fit success and integration of people, service, and solutions.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

OPENTEXT PARTNERS WITH MAD SECURITY TO IMPROVE RESPONSE TIME TO CYBERTHREATS AND SHRINK THE ATTACK SURFACE

OpenText | October 20, 2022

news image

Today, OpenText™ , a global leader in information management with an extensive security solution portfolio, announced a partnership between OpenText Network Detection & Response (NDR) technology and MAD Security. This joint solution from OpenText and MAD Security will empower customers to cut false positive security alerts significantly and protect sensitive government data against advanced cyber threats. MAD Security, a managed security service provider (MSSP) that help...

Read More

5 CYBER SECURITY TRENDS IN 2020 BUSINESSES NEED TO KNOW

Mybusiness | March 11, 2020

news image

As Australian businesses continue to move their operations online, large corporations and small to medium enterprises (SMEs) alike are grappling with increasingly savvy cyber attacks. According to Business Victoria, such attacks can cost businesses an average of $276,000 to detect, recover, and repair. SMEs are particularly vulnerable, with some sources suggesting that as much as 43% of all cyber attacks in Australia target smaller businesses. Against this backdrop, it’s critical that busi...

Read More

CYBER-FLASHING ON UK TRAINS DOUBLES

Infosecurity | February 19, 2020

news image

British Transport Police have reported an alarming increase in the number of women being sent sexually explicit images by strangers while traveling via train. In 2018, 34 cases of cyber-flashing offenses were reported to British Transport Police. In 2019, the number of recorded cases rose to 66, almost doubling over a one-year period. Cyber-flashing occurs when a sexual predator sends an unsolicited pornographic image or video to a stranger via the iPhone file-sharing function AirDrop.&nbs...

Read More

WORK-FROM-HOME CYBER SECURITY RISKS: THREE WAYS TO PROTECT YOUR NETWORK

prnewswire | August 26, 2020

news image

Responding to the rapid increase in work-from-home cyber security incidents at small and midsized businesses (SMBs), DIGIGUARD is now focusing its Cyber Threat Protection Services on remote workforce IT security. "Managing and monitoring work-from-home (WFH) employees includes cybersecurity risk management. Controlling network access helps protect valuable business and customer data from cybercriminals," said DIGIGUARD's Harvey Yan. At a minimum, Yan urges SMBs do three things: Sec...

Read More
news image

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

OPENTEXT PARTNERS WITH MAD SECURITY TO IMPROVE RESPONSE TIME TO CYBERTHREATS AND SHRINK THE ATTACK SURFACE

OpenText | October 20, 2022

Today, OpenText™ , a global leader in information management with an extensive security solution portfolio, announced a partnership between OpenText Network Detection & Response (NDR) technology and MAD Security. This joint solution from OpenText and MAD Security will empower customers to cut false positive security alerts significantly and protect sensitive government data against advanced cyber threats. MAD Security, a managed security service provider (MSSP) that help...

Read More
news image

5 CYBER SECURITY TRENDS IN 2020 BUSINESSES NEED TO KNOW

Mybusiness | March 11, 2020

As Australian businesses continue to move their operations online, large corporations and small to medium enterprises (SMEs) alike are grappling with increasingly savvy cyber attacks. According to Business Victoria, such attacks can cost businesses an average of $276,000 to detect, recover, and repair. SMEs are particularly vulnerable, with some sources suggesting that as much as 43% of all cyber attacks in Australia target smaller businesses. Against this backdrop, it’s critical that busi...

Read More
news image

CYBER-FLASHING ON UK TRAINS DOUBLES

Infosecurity | February 19, 2020

British Transport Police have reported an alarming increase in the number of women being sent sexually explicit images by strangers while traveling via train. In 2018, 34 cases of cyber-flashing offenses were reported to British Transport Police. In 2019, the number of recorded cases rose to 66, almost doubling over a one-year period. Cyber-flashing occurs when a sexual predator sends an unsolicited pornographic image or video to a stranger via the iPhone file-sharing function AirDrop.&nbs...

Read More
news image

WORK-FROM-HOME CYBER SECURITY RISKS: THREE WAYS TO PROTECT YOUR NETWORK

prnewswire | August 26, 2020

Responding to the rapid increase in work-from-home cyber security incidents at small and midsized businesses (SMBs), DIGIGUARD is now focusing its Cyber Threat Protection Services on remote workforce IT security. "Managing and monitoring work-from-home (WFH) employees includes cybersecurity risk management. Controlling network access helps protect valuable business and customer data from cybercriminals," said DIGIGUARD's Harvey Yan. At a minimum, Yan urges SMBs do three things: Sec...

Read More

Resources

resource image

DATA SECURITY, SOFTWARE SECURITY

Cloud Privilege Broker 22.1 Security Whitepaper

Whitepaper

resource image

DATA SECURITY, PLATFORM SECURITY

Dolphin's Cyber Security Check List For Business

Video

resource image

SOFTWARE SECURITY

Cyber Security State of Tech in 2022

Whitepaper

resource image

DATA SECURITY, ENTERPRISE IDENTITY

Best Practices for Common Cybersecurity Threats

Whitepaper

resource image

DATA SECURITY, SOFTWARE SECURITY

Cloud Privilege Broker 22.1 Security Whitepaper

Whitepaper

resource image

DATA SECURITY, PLATFORM SECURITY

Dolphin's Cyber Security Check List For Business

Video

resource image

SOFTWARE SECURITY

Cyber Security State of Tech in 2022

Whitepaper

resource image

DATA SECURITY, ENTERPRISE IDENTITY

Best Practices for Common Cybersecurity Threats

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us