Biostar security software (developed by Suprema), leaked fingerprints and other data on millions of...
Are you really that surprised that biometric data has been leaked?
Yet another example of how all of the data that companies are so busy...
Rezonate: Identity Management Reinvented
Identity security is broken across multiple tools and stakeholders in the organizations, each lacking the context or control over many parts of human and...
Ethical hacker gets stumped by Barrier 1 technology
Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...
Eclypsium: Firmware Cyber Attack Vector and Supply Chain Protection
Eclypsium, a digital supply chain security company protecting critical hardware, firmware, and software in enterprise IT infrastructure, recently announced the launch of the Eclypsium Global...
Asigra Warns of RMM Ransomware Attack Vector
Leading cloud backup, recovery and restore software provider Asigra Inc., released a bulletin to the company's global network of managed service providers warning of...
Cerby Introduces World’s First Security Platform for Rogue Applications
Cerby recently launched with the world’s first security platform for unmanageable applications and an approach that enhances security practices by empowering both employees and security...
Cloudian: Protection and Detection Are One Thing, But Recovery Is Everything
We recently had a chat with Jon Toor, Cloudian's CMO to explore the fact that ransomware remains one-step-ahead of the most advanced data security...
Lookout Announces New EDR Solution for MSSPs
Endpoint-to-cloud security company Lookout, Inc. announced the availability of Lookout Mobile Endpoint Security, the industry’s most advanced mobile endpoint detection and response (EDR) offering...
Guardz Protects and Insures Small Businesses
Tel Aviv-based company Guardz, a cybersecurity company building a safer digital world for small businesses, launched from stealth to secure and insure small companies across...
Webinar : Protecting Your Customers Starts with Protecting Yourself
As cybercriminals identify MSPs as opportunities and capitalize on the transition to remote work, it’s essential for MSPs to prioritize protecting themselves and their...















