Canadians are among the least likely to use a free VPN
While the number of paid VPN users in Canada is significantly growing, Canadians are also rapidly abandoning free VPN services. With only 29% of...
Hornetsecurity Aims to Expand In North America by acquiring Zerospam
Hornetsecurity (a cloud email security vendor originating from Germany), has announced its second acquisition this year - Zerospam (a cloud email protection company headquartered...
Defining Supply Chain Defense in Cybersecurity
Julian Lee and BlueVoyant's COO of Supply Chain Defense, Brendan Conlon, discussed a survey conducted by BlueVoyant on supply chain defense, which focuses on...
Facebook Launches Third-Party Fact-Checking Program in Canada
Facebook Canada, in collaboration with Agence France-Presse (AFP), announced the launch of its third-party fact-checking program aimed at helping combat false news from spreading...
Previously known open-source Android spyware makes its debut on Google Play
ESET researchers have discovered the first known instances of spyware based on the open-source espionage tool called AhMyth. This particular spyware was posing as...
Analyst Firm GigaOm Recognizes Infinidat as the Industry Leader in Ransomware...
For ransomware protection to sell, the channel now has a more obvious choice. IT analyst firm GigaOm has named Infinidat as the industry leader...
Syncro: Redefining Data Resilience and Security for the Modern MSP
Special Guest: Krishna Tamburino, Senior Product Manager, Syncro
Krishna detailed a strategic shift in data management, urging MSPs to evolve from simple backup providers to architects of...
Nine New Sophos XGS Firewall Appliances Feature Boosted Performance with Reduced...
Sophos introduced nine new XGS Series desktop firewall appliances for midmarket and smaller-sized businesses, as well as branch offices of larger organizations. The new...
Nucleus Security’s Mission in Vulnerability Management
Chaz MacLaughlin, CRO of Nucleus Security, a leader in unified vulnerability management, described the company's risk-based vulnerability management solution aimed at simplifying the identification...
Protecting lovers against scams on Valentines’s day
On Valentine’s Day, countless red roses and other gifts are exchanged between lovers. Cybercriminals love to take advantage of this opportunity to steal your...


















