WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Hub Security | July 01, 2022
HUB Cyber Security (Israel) Limited, a developer of Confidential Computing cybersecurity solutions and services, announced today an agreement to sell HUB's Confidential Compute solutions to US enterprises and telecommunications companies with one of the largest US cyber security system integrators. In the United States, the integrator focuses on supplying equipment and services for 5G networks and edge computing.
The engagement is for two years and can be extended by mutual co...
NetSPI | May 17, 2021
NetSPI, the pioneer in big business infiltration testing and assault surface administration, today reported it has brought $90 million up in development subsidizing drove by KKR, with investment from Ten Eleven Ventures. The venture will be utilized to additionally speed up NetSPI's fast development by extending the organization's digital protection and customer experience groups, putting resources into item advancement, and extending tasks across U.S. what's more, worldwide business...
Tech Guide | July 18, 2020
Abrupt and unexpected are two of the adjectives most commonly used when describing the shift to working remotely that the global workforce has faced in response to the COVID-19 pandemic. No sector has been spared, including government operations, private businesses, and institutions of education.This seismic shift not only impacted the millions of people who found themselves working from home for the first time in Australia and around the globe, but it also stressed the complex technology ...
SC Magazine | March 23, 2020
Attackers are exploiting unpatched Windows zero day flaws, Microsoft said in a Monday security advisory. The company said “limited targeted attacks” could leverage two unpatched remote code executive (RCE) vulnerabilities in Windows “when the Windows Adobe Type Manager Library improperly handles a specially crafted multi-master font – Adobe Type 1 PostScript format.” Among the ways a hacker could exploit the flaws is convincing users to open “a specially craft...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE