-0.5 C
Toronto
Monday, January 25, 2021

How to Prepare and Protect your Digital Legacy

As we know in today’s world, the Internet and digital applications is woven into every day life. From our personal lives to our careers, our digital footprint has become a big piece...

Crypto Mining Malware On The Rise

As the use of Bitcoin and other crypto currency continues to grow, cyber criminals are learning how to capture a portion of the transaction. Through continuous innovation, cyber criminals are accomplishing...

Bitdefender Joins ThreatConnect Developer Partner Program

Bitdefender announce its acceptance into the ThreatConnect Developer Partner Program. As a member of the Developer Partner Program, Bitdefender can now leverage ThreatConnect’s intelligence, automation, orchestration, and analytics with the goal of...

Ethical hacker gets stumped by Barrier 1 technology

Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities they do it to help organizations better...

Business-Grade Software Security with Sophos

Sophos has recently built a new global MSP program to address a lot of the needs that MSPs have to supply security services to their customers.  This new program focuses on...

Interac Corp. reveals new insights into consumer behaviour and online activity

As we commence Cybersecurity month, Interac Corp. is revealing new insights into consumer behaviour and online activity, in particular when it comes to consumer confidence and cybersecurity literacy. According to the...

Sophos Adds Endpoint Detection and Response to Intercept X Advanced

Sophos, a global leader in network and endpoint security, announced that it has added Endpoint Detection and Response (EDR) to its Intercept X endpoint protection portfolio. Intercept X Advanced with EDR...

Understanding the Dark Web with ID Agent

Everyone should be aware of the Dark Web.  A few years ago, the US Government launched a different network which became known as the Deep Web, a massive portion of the...

RDP Cyber Attacks In The Rise?

Cyber Attacks using RDP (Remote Desktop Protocol) are not new but they are on the rise. When you review why and what RDP was first developed for and then how it...

Kaspersky Hybrid Cloud Security protects software development tools

Kaspersky announced that the next generation of Kaspersky Hybrid Cloud Security now safeguards software development operations (DevOps) environments. The product has been enhanced to enable protection for containers, add containers, image and...