"Surfacing Critical Cyber Threats Through Security Intelligence"

"It’s almost quaint and more than a bit naive to look back on the days when an enterprise felt it could install a few firewalls and some anti-virus software and feel confident that the organization was well defended against cyber threats. Those days weren’t so long ago, but much has changed in a few short years."

Spotlight

tapestry technologies, Inc.

The basic foundation of Tapestry Technologies is built on our cyber defense capabilities. Tapestry personnel have provided support to key cyber programs that have evolved how the DoD handles security. Tapestry Technologies is a woman-owned small business under the $27.5 million size standard. Our size enables us to remain nimble and react quickly to rapid requirements in a ever changing environment. As a services company we understand that our people are our most valuable asset. We provide a casual work place and each employee has the opportunity to grow and learn through an annual training allowance. To be at the forefront of evolving technology, we fund a corporate research and development lab that enables us to learn and test new technologies so we can take innovating and tested solutions to our customers.

OTHER WHITEPAPERS
news image

2022 Global Cybersecurity Awareness Training Study

whitePaper | August 31, 2022

The benefit awareness cybersecurity awareness training, particular phishing simulations, have gained wide acceptance in business and the public sector.

Read More
news image

How Healthcare Can Boost Cyber Security and Close Its Defense Gaps

whitePaper | May 22, 2022

Hackers have made healthcare a top target. As a result, the healthcare industry experienced the highest number of ransomware attacks during Q3 2022, with one in 42 healthcare organizations suffering an attack – in spite of an 8 percent drop in ransomware attacks in Q3.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

Cloud Privilege Broker 22.1 Security Whitepaper

whitePaper | September 15, 2022

There is complete end-to-end encryption from BeyondInsight with Cloud Privilege Broker through to the Cloud Platform Infrastructure. Cloud Privilege Broker services communicate with each other through distributed queues over TLS encryption.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Open RAN MoU progress update on maturity, security and energy efficiency

whitePaper | September 29, 2022

As the momentum behind Open RAN continues to grow, it is natural that relevant experts and decision makers want to understand its progress and how the Open RAN industry has risen to the challenges, in particular relating to maturity, security and energy efficiency. Over the course of 2022, Open RAN MoU Operators encouraged an open dialogue about Open RAN and have taken steps to understand concerns and address valid questions. This paper represents a progress report that helps to showcase the gains and set the agenda for 2023. In summary:

Read More

Spotlight

tapestry technologies, Inc.

The basic foundation of Tapestry Technologies is built on our cyber defense capabilities. Tapestry personnel have provided support to key cyber programs that have evolved how the DoD handles security. Tapestry Technologies is a woman-owned small business under the $27.5 million size standard. Our size enables us to remain nimble and react quickly to rapid requirements in a ever changing environment. As a services company we understand that our people are our most valuable asset. We provide a casual work place and each employee has the opportunity to grow and learn through an annual training allowance. To be at the forefront of evolving technology, we fund a corporate research and development lab that enables us to learn and test new technologies so we can take innovating and tested solutions to our customers.

Events