Your Supply Chain Can’t Keep a Good Secret – Assessing the Cyber Threats
If it wasn’t clear before SolarWinds, it’s definitely clear now - cybercriminals don’t need to attack your business directly to take over your network....
Axis Security Sets the Standard for Zero Trust Network Access Market
Axis Security, a leading provider of Zero Trust Network Access, is enabling leading enterprise organizations to expand beyond traditional access technologies to a more...
CIOSO Global: Empowering the Community in the Fight Against Cyber Threats
Greg Sullivan, Founding Partner of CIOSO Global, shared his extensive background in the field, detailing his transition from software development to cybersecurity roles, including...
ChannelNext West 2023: Cyber Attacks: The Good, The Bad and the Dowright Ugly
Presenter: Miles Walker, Channel Development Manager, IT Complete Kaseya.
Miles follows the cybersecurity industry every day and has very good insights about what cyberattacks...
Google has gone passwordless: Interview with Google Cloud partner Wursta
Google recently announced a passwordless solution for all Google accounts. Google users will now be able to more easily access their accounts without having to remember...
ZeroFox: What’s Out There Can Hurt your Cyber Game!
Interview with Jason Sumpter, Senior Director of Product Management, and Joel Vinocur, Director of Channel – Americas, of ZeroFox
Organizations are tasked with managing a never-ending list...
Amid Growing Ransomware Threats, Index Engines Releases Developer Kit
Index Engines released an API-based developer’s kit to support the integration of its industry-leading CyberSense software’s analytics and reporting into third-party backup and storage...
Personal Information Of Almost 3 Million Desjardins Customers Were Stolen
When Alphonse Desjardins started his business on December 6th, 1900, I am sure he never dreamed that 120 years later the company could lose...
ESET Researchers Discover First UEFI Rootkit Used In Cyberattack
The research team based in Montreal, discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers, the first-ever in-the-wild. Dubbed...
eSentire Launches Integrated MDR and SIEM Platform for Full Threat Visibility and Rapid Response
eSentire, Inc., the largest pure-play Managed Detection and Response (MDR) provider, today announced a partnership with Sumo Logic, the leading cloud-native machine data...















