CompuCom will take a $20 Million+ financial hit for a security breach
Back on March 3, 2021 the company issued this statement:
"Certain CompuCom information technology systems have been affected by a malware incident which is affecting...
Tufin Launches First of Its Kind Program for MSSPs to Better Manage and Protect...
Tufin, the market-leading provider of Network Security Policy Orchestration solutions, today launched its Managed Security Service Provider (MSSP) Program, enabling MSSPs to offer “Tufin as a...
Cynet Announces Free Cybersecurity Threat Assessment for Midsize and Large Organizations
Cynet, pioneers of the automated threat discovery and mitigation platform, announced the Cynet Threat Assessment program. The free offering for organizations with 500 or...
Kaspersky integrates with SolarWinds to help MSPs deliver automated cybersecurity protection to their customers
Following integration with SolarWinds N-central earlier this year, Kaspersky has now integrated its cybersecurity solutions with the SolarWinds Remote Monitoring and Management platform to...
Webinar : Protecting Your Customers Starts with Protecting Yourself
As cybercriminals identify MSPs as opportunities and capitalize on the transition to remote work, it’s essential for MSPs to prioritize protecting themselves and their...
Hacked Out of Business — Why the Industry Should Focus More on SMB Security
Small and medium businesses (SMBs) comprise over 99 percent of U.S. firms, which might explain why they often find themselves in hackers’ crosshairs. However,...
Kaseya: COVID-19 and the unknown threat to cybersecurity
Beginning this week, many companies asked their workforces to work remotely, including SMBs, a segment that saw a 424% increase in cyberattacks in 2018....
Bitdefender Joins ThreatConnect Developer Partner Program
Bitdefender announce its acceptance into the ThreatConnect Developer Partner Program.
As a member of the Developer Partner Program, Bitdefender can now leverage ThreatConnect’s intelligence, automation,...
Ethical hacker gets stumped by Barrier 1 technology
Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...
Sophos Introduces Lateral Movement Protection to XG Firewall
Sophos, a global leader in network and endpoint security, announced that its next-generation Sophos XG Firewall now includes lateral movement protection to prevent targeted,...














