Reporting costs money. As an independent, cybersecurity news website, Security Ledger couldn’t continue to do the work we do without the generous support of our sponsor companies and organizations.
These firms underwrite our reporting because they value independent voices in the technology media. Join us in thanking them for their continuing support of The Security Ledger!

Pondurance delivers world-class managed detection and response services to industries facing today’s most pressing and dynamic cybersecurity challenges including ransomware, complex compliance requirements and digital transformation accelerated by a distributed workforce.
By combining our advanced platform with our experienced team of analysts, we continuously hunt, investigate, validate and contain threats so your own team can focus on what matters most.
By combining our advanced platform with our experienced team of analysts, we continuously hunt, investigate, validate and contain threats so your own team can focus on what matters most.

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Through its member-driven work groups, TCG enables the benefits of trust in computing devices from mobile to embedded systems, as well as networks, storage, infrastructure, and cloud security. More than a billion devices include TCG technologies.