Darktrace: The Rise of Proactive AI in Cybersecurity

In addition to a challenging geopolitical environment, the rise of AI combined with automation and cybercrime-as-a-service has increased the speed, sophistication, and success of...

How Secure is your Mobile Device?

With the rise of remote work and the growing use of mobile devices, the need for effective mobile device management has never been more...

Barrier 1 Blocks Hacker In Microseconds

Barrier1 is already doing what all security platforms must be doing to block hacker attacks. If you cannot identify and block and attract in...

Business-Grade Software Security with Sophos

Sophos has recently built a new global MSP program to address a lot of the needs that MSPs have to supply security services to...

Cloudian: Protection and Detection Are One Thing, But Recovery Is Everything

We recently had a chat with Jon Toor, Cloudian's CMO to explore the fact that ransomware remains one-step-ahead of the most advanced data security...

The battle for business buy-in: Three ways to justify your IT security spend

By Evgeniya Naumova Proving return on investment in IT security – an almost impossible task for IT professionals. Why? Because they’re often found trying to...

What does the Solarwinds Hack mean for the Channel?

By now you have probably seen all of the stories and opinions by many as to what happened, how, why and who did the...

Deep Instinct’s Prevention Platform put to the Unit 221B Test

“100% security” is language commonly thrown around in the cybersecurity community and it’s often difficult to justify or live up to the hype. However,...

Latest SonicWall Report Reveals Stealthier Threat Actor Behaviors

SonicWall, publisher of trusted cyberattack intelligence and leader of ransomware data, released the 2023 SonicWall Mid-Year Cyber Threat Report. The bi-annual report uncovers evolving...

ESET Researchers Discover First UEFI Rootkit Used In Cyberattack

The research team based in Montreal, discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers, the first-ever in-the-wild. Dubbed...