Industry Experts Enhance CyberSense Software to Stay Ahead of Advancing Ransomware

Data integrity experts Index Engines announced the latest enhancements to its ransomware detection and recovery software, CyberSense, to help organizations win the war against...

Core Security by HelpSystems Releases New Ransomware Simulator

Core Security by HelpSystems, a leading provider of cyber threat solutions, announced the addition of ransomware simulation to its penetration testing solution, Core Impact. Using an automated Rapid Pen...

Axiad Now Integrates with Ping Identity

Axiad, a leading provider of organization-wide passwordless orchestration, announced a new integration with Ping Identity, the intelligent identity solution for the enterprise, and is now listed...

2020 Gone Phishing Tournament Phishing Benchmark Global Report Reveals Significant Rise in Phishing Simulation...

The latest edition of the Terranova Security Phishing Benchmark Global Report, drawing on results from 2020 Gone Phishing Tournament reveals a substantial year-over-year increase in...

Strengthening the weakest link in Cyber Attack Prevention

Explore the weakest link in just about every organization’s cyber security defence and how any channel partner can quickly help their customers to plug this...

How to Talk to a CFO about cybersecurity

Cybersecurity has quickly evolved from being an IT problem to the most significant business risk outside of COVID-19. CFO’s and risk managers use frameworks...

Email and Web Security with TitanHQ

TitanHQ has been working with Managed Service Providers globally since 1999 and currently partners with over 2,000 MSPs globally. Their products were built from...

Bitdefender Joins ThreatConnect Developer Partner Program

Bitdefender announce its acceptance into the ThreatConnect Developer Partner Program. As a member of the Developer Partner Program, Bitdefender can now leverage ThreatConnect’s intelligence, automation,...

Avoiding QR Code and SMS Phishing

In October 2023, SlashNext Threat Labs published a blog post detailing how threat actors leverage QR codes for various attacks and breach attempts. More recently,...

Who Are Cyber Spies?

Every day we refer to those who commit cyber attacks as “hackers”. The image does not project an image of a a terrible criminal....