How Deep Is Your AI and Deep Learning In Your IT...
Barrier1 was formed out of experience and frustration. The group of developers of Barrier1 and the lead were part of the cyber team for...
2024 Predictions from SonicWall
Speaker: Bobby Cornwell. Vice President Strategic Partner Enablement & Integration at SonicWall
Bobby reflected on his 17-year journey in the company, discussing the industry's evolution...
Kaspersky integrates with SolarWinds to help MSPs deliver automated cybersecurity protection...
Following integration with SolarWinds N-central earlier this year, Kaspersky has now integrated its cybersecurity solutions with the SolarWinds Remote Monitoring and Management platform to...
Cybrary Welcomes New Instructor to its Cybrary Threat Intelligence Group (CTIG)
Cybrary is a leading cybersecurity training platform that combines professional development with mission-ready experiences to fully equip cyber practitioners at every stage of their...
New FinFisher surveillance campaigns: Are internet providers involved?
New surveillance campaigns utilizing FinFisher, infamous spyware known also as FinSpy and sold to governments and their agencies worldwide, are in the wild. Besides...
Mitigating Risks for MSPs – Monjur
Julian Lee discussed with Rob Scott, Co-Founder of Monjur about the increasing complexity of legal issues in the tech world, especially in relation to...
Judy Security: Deep Focus on SMB Market with a Strong Leadership
AaDya Security, a software company dedicated to making cybersecurity accessible and affordable for small and medium-sized businesses (SMBs), recently announced its transition to Judy...
VIPRE Security Group Retools Channel-First Model to Fuel Partner Success
VIPRE Security Group announced it is making significant changes to the company’s channel-first model to ensure the success of its partners, sales teams, and distributors.
“At...
It’s a Keeper – Extreme Privileged Access Management
Keeper Security, a leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, introduced two major privileged...

















