WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > In2It Technologies Pvt. Ltd
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Data Security
Edgile | December 24, 2021
Wipro Limited, a leading global information technology, consulting and business process services company, today announced it has signed an agreement to acquire Austin, Texas headquartered Edgile, a transformational cybersecurity consulting provider that focuses on risk and compliance, information and cloud security, and digital identity. Edgile is recognized by security and risk leaders for its unique business-aligned cybersecurity capability, deep understanding of the changing re...
Data Security,Platform Security,Software Security
Legit Security | December 12, 2022
Legit Security, a cyber security company with an enterprise platform that protects an organization's software supply chain from attack and ensures secure application delivery, today announced that it discovered a new class of software supply chain vulnerabilities that leverage artifact poisoning to attack underlying software development pipelines. The vulnerability was found in GitHub Actions, a platform for orchestrating and automating software development pipelines, and the vulnerability w...
RedMonocle | April 29, 2021
RedMonocle, a leader in SaaS-based cybersecurity risk quantification software, today announced new features to its platform aimed at helping chief information security officers (CISOs) and other security leaders anticipate threats in their Technology Security Stack by helping them find, fund, and fix cybersecurity risk blind spots that leave organizations vulnerable for a breach through their Tech Stack. The acceleration of digital transformation last year brought security into th...
scmagazine | March 26, 2020
Kaspersky has uncovered an highly targeted attack striking a single country using a trojan written in C++ that has not been spotted before. Dubbed Milum, the trojan shows no code similarities with known campaigns reported Kaspersky’s Threat Attribution Engine and only three instances of it have bee found and are considered all part of the same operation which received the code name operation WildPressure. When successfully installed the trojan can enable a remote attacker to gain control o...
Whitepaper
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE