Deloitte Expert on Data Privacy Day

January 28 was Data Privacy Day. Our data-sharing habits have evolved rapidly over the past few years as we battle the pandemic. While some adopted...

World Hacker Games Coming February 22nd

Let the hacker battles begin!  Hackers battle to find vital flaws in the infrastructure and cybersecurity defense systems, and PlexTrac will be there to defend...

Eclypsium: Firmware Cyber Attack Vector and Supply Chain Protection

Eclypsium, a digital supply chain security company protecting critical hardware, firmware, and software in enterprise IT infrastructure, recently announced the launch of the Eclypsium Global...

Interview with Zoho on Privacy, AI and Much More

In response to continued privacy concerns, Zoho, a leading global technology company, is launching a new privacy-centered service which builds on its industry-leading  Privacy Pledge that...

Expert Panel Discussion on Cybersecurity

Listen to this panel discussion with Cyber Security Expert Joe Cummins from CybernetIQ and MSP Michael Contento from My Blue Umbrella to get their...

Amid Growing Ransomware Threats, Index Engines Releases Developer Kit

Index Engines released an API-based developer’s kit to support the integration of its industry-leading CyberSense software’s analytics and reporting into third-party backup and storage...

Digital Defense, Inc. Offering $1 Million in Free Ransomware Vulnerability Assessments

Digital Defense, Inc. announced a free, $1 million dollar offer to help healthcare organizations prevent ransomware attacks and maintain focus on important, life-saving endeavors....

Bitdefender Joins ThreatConnect Developer Partner Program

Bitdefender announce its acceptance into the ThreatConnect Developer Partner Program. As a member of the Developer Partner Program, Bitdefender can now leverage ThreatConnect’s intelligence, automation,...

Cryptocurrency mining malware wreaks havoc in 2018

Kaspersky Lab has released a new report on the global outbreak in malicious cryptocurrency mining that unfolded in 2018, which saw the number of...

Ethical hacker gets stumped by Barrier 1 technology

Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...