-6.4 C
Toronto
Monday, January 19, 2026

Interview with Zoho on Privacy, AI and Much More

In response to continued privacy concerns, Zoho, a leading global technology company, is launching a new privacy-centered service which builds on its industry-leading  Privacy Pledge that...

XM Cyber Introduces First Exposure Management Solution Working Across Environments

XM Cyber, a leader in hybrid cloud exposure management, announced new capabilities that provide complete and continuous visibility into risks and vulnerabilities in Kubernetes...

Otava Introduces Otava Cloud Backup for Microsoft 365 Services

Otava, a global leader in secure and compliant cloud solutions, has added Otava Cloud Backup for Microsoft 365. The new Software as a Service (SaaS) offering...

Third Annual MSP Day Highlights Global MSP Opportunities

This year marks the third annual MSP Day, a movement Barracuda MSP started in 2018 to celebrate and champion the managed services industry and...

Webinar : Protecting Your Customers Starts with Protecting Yourself

As cybercriminals identify MSPs as opportunities and capitalize on the transition to remote work, it’s essential for MSPs to prioritize protecting themselves and their...

Aptum Study Reveals Security is the Main Barrier to Cloud Transformation

While 91 per cent of organizations were successful in increasing security as a result of adopting cloud services, it remains a top concern for...

New Research from Lineaje Reveals Open-Source Software Security Gaps

Lineaje, a leader in software supply chain security management, released its new research report titled “What’s in Your Open-Source Software?” Compiled by the company’s...

SafeBreach: Providing a Cohesive Risk Management Solution

SafeBreach, a leader in enterprise security validation, announced an integrated exposure management platform that combines its breach and attack simulation (BAS) technology with a...

Cyber-attacks set to become more targeted in 2021, according to HP Inc.

HP released its 2021 predictions on how security threats – such as human-operated ransomware, thread hijacking, unintentional insider threats, business email compromise and...