Mosyle: Apple Security Made Easy!

Mosyle recently launched a new product for MSPs that integrates five critical management and security applications into a single Apple-only offering. As part of...

Eclypsium: Firmware Cyber Attack Vector and Supply Chain Protection

Eclypsium, a digital supply chain security company protecting critical hardware, firmware, and software in enterprise IT infrastructure, recently announced the launch of the Eclypsium Global...

AI: The First and Last Defense in Cyber Attacks

AgileBlue, a leading global innovator in AI-powered cybersecurity solutions, recently announced the general availability of Sapphire AI in its Cerulean XDR|SOAR platform. The advanced AI system...

Prioritizing Cybersecurity Risks

Uptycs, a leading cloud security platform for large hybrid cloud environments, has launched Upward, its channel-first partner program. The new program will help Uptycs...

When was the last time you tested the strength of your cybersecurity posture?

Don Landers, Channel Lead at SpecterOps, presented the company’s main product, BloodHound Enterprise, as the first and only solution to help enterprises secure Microsoft...

Get Ready For Crowdsource Hacking!

Julian discussed with Paul Ciesielski, Chief Revenue Officer at Bugcrowd, a crowdsource security testing company. Paul provided insights into the company's background, services, and...

Hunting for the Footprints of Cyber Criminals

With a cybersecurity workforce gap 4 million people wide and economic uncertainty plaguing budgets, cyber teams are short on resources to conduct the proactive...

Is Remote Desktop Support Access Secure?

Allison Loy, Director of Channel Sales for TeamViewer Americas, shared her thoughts on the future outlook and collaboration in the digital-first space. Allison and...

How Secure is your Mobile Device?

With the rise of remote work and the growing use of mobile devices, the need for effective mobile device management has never been more...

Avoiding QR Code and SMS Phishing

In October 2023, SlashNext Threat Labs published a blog post detailing how threat actors leverage QR codes for various attacks and breach attempts. More recently,...