Darktrace: The Rise of Proactive AI in Cybersecurity
In addition to a challenging geopolitical environment, the rise of AI combined with automation and cybercrime-as-a-service has increased the speed, sophistication, and success of...
How Secure is your Mobile Device?
With the rise of remote work and the growing use of mobile devices, the need for effective mobile device management has never been more...
Barrier 1 Blocks Hacker In Microseconds
Barrier1 is already doing what all security platforms must be doing to block hacker attacks. If you cannot identify and block and attract in...
Business-Grade Software Security with Sophos
Sophos has recently built a new global MSP program to address a lot of the needs that MSPs have to supply security services to...
Cloudian: Protection and Detection Are One Thing, But Recovery Is Everything
We recently had a chat with Jon Toor, Cloudian's CMO to explore the fact that ransomware remains one-step-ahead of the most advanced data security...
The battle for business buy-in: Three ways to justify your IT security spend
By Evgeniya Naumova
Proving return on investment in IT security – an almost impossible task for IT professionals. Why? Because they’re often found trying to...
What does the Solarwinds Hack mean for the Channel?
By now you have probably seen all of the stories and opinions by many as to what happened, how, why and who did the...
Deep Instinct’s Prevention Platform put to the Unit 221B Test
“100% security” is language commonly thrown around in the cybersecurity community and it’s often difficult to justify or live up to the hype. However,...
Latest SonicWall Report Reveals Stealthier Threat Actor Behaviors
SonicWall, publisher of trusted cyberattack intelligence and leader of ransomware data, released the 2023 SonicWall Mid-Year Cyber Threat Report. The bi-annual report uncovers evolving...
ESET Researchers Discover First UEFI Rootkit Used In Cyberattack
The research team based in Montreal, discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers, the first-ever in-the-wild. Dubbed...















