Tufin Launches First of Its Kind Program for MSSPs to Better Manage and Protect...
Tufin, the market-leading provider of Network Security Policy Orchestration solutions, today launched its Managed Security Service Provider (MSSP) Program, enabling MSSPs to offer “Tufin as a...
How Cybercriminals Abuse Airbnb For Fraudulent Activities
Cyberattacks are becoming increasingly common and sophisticated. One particular concern is the rising misuse of popular platforms like Airbnb. The following highlights how cybercriminals...
Cerby Introduces World’s First Security Platform for Rogue Applications
Cerby recently launched with the world’s first security platform for unmanageable applications and an approach that enhances security practices by empowering both employees and security...
Passportal: Platform for Automation and Security of Passwords & Documentation
Passportal is a password security platform with integrated documentation and automation solutions helping MSPs improve their service delivery model. Not only does it secure...
Alex Dow Presents National Cyber Threat Assessment Report
Cybersecurity Expert Alex Dow presented insights from the National Cyber Threat Assessment Report for 2025 and 2026, highlighting the exacerbation of cyber threats due...
Experts warn: travelers should avoid using hotel Wi-Fi
With traveling on the rise again, experts warn about the risks public Wi-Fi in hotels may pose. As 62% of Canadians choose to travel...
Marriott Hotels Hacked! Data of 500 Million Guests May Be Compromised
Still among the numerous Google searches today on this massive security breach story, I saw the Marriott Ad running “We’re Reinventing Travel with Innovation...
Otava Introduces Otava Cloud Backup for Microsoft 365 Services
Otava, a global leader in secure and compliant cloud solutions, has added Otava Cloud Backup for Microsoft 365. The new Software as a Service (SaaS) offering...
Ethical hacker gets stumped by Barrier 1 technology
Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...















