Sophos Introduces Lateral Movement Protection to XG Firewall

Sophos, a global leader in network and endpoint security, announced that its next-generation Sophos XG Firewall now includes lateral movement protection to prevent targeted,...

ESET Researchers Discover First UEFI Rootkit Used In Cyberattack

The research team based in Montreal, discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers, the first-ever in-the-wild. Dubbed...

Darktrace: The Rise of Proactive AI in Cybersecurity

In addition to a challenging geopolitical environment, the rise of AI combined with automation and cybercrime-as-a-service has increased the speed, sophistication, and success of...

Jamf Launches Jamf Safe Internet for Student Safety

Jamf announced that Jamf Safe Internet, a comprehensive content filtering and web security solution optimized for education, is now available on Chromebook. Jamf Safe...

RevealSecurity Detects Malicious Insiders and Imposters

RevealSecurity is a developer of AI platform intended to give cybersecurity against the insider threat to enterprises. The company's product is powered by a...

Axis Security Sets the Standard for Zero Trust Network Access Market

Axis Security, a leading provider of Zero Trust Network Access, is enabling leading enterprise organizations to expand beyond traditional access technologies to a more...

SKOUT Finds Trouble Before It Finds You

SKOUT was launched in 2006, after his CEO saw a lack in cyber security and a lack in organizations to provide this service to...

Core Security by HelpSystems Releases New Ransomware Simulator

Core Security by HelpSystems, a leading provider of cyber threat solutions, announced the addition of ransomware simulation to its penetration testing solution, Core Impact. Using an automated Rapid Pen...

How to Prepare and Protect your Digital Legacy

As we know in today’s world, the Internet and digital applications is woven into every day life. From our personal lives to our careers, our...

J-SAS: A Walk-Through Cybersecurity Posture Assessment

Ryan Devers, VP Product Strategy of J-SAS, discussed the challenges and opportunities for Managed Service Providers (MSPs) in Canada regarding compliance. He highlighted that...