Introducing Sophos Managed Risk, Powered by Tenable
Exploited unpatched vulnerabilities are the leading root cause of successful attacks, as reported in Sophos’ 2024 Ransomware Report.
The modern attack surface has expanded beyond traditional on-premises IT...
Hornetsecurity – The IT Security Manager
Hornetsecurity is providing comprehensive security solutions in the fields of email security and data storage worldwide. As traditional virus scanning solutions are no longer...
Datto is hosting its quarterly MSP Tech Day
Datto is hosting its quarterly MSP Tech Day on March 24, 2022. Entitled “Elevate your SaaS Security - Defend, Backup, Recover,” the event focuses...
Cisco, Apple, Aon, Allianz Introduce a First in Cyber Risk Management
Cisco, Apple, Aon and Allianz announced a new cyber risk management solution for businesses, comprised of cyber resilience evaluation services from Aon, the most...
Asigra Announces Deep MFA Backup System Cyber Defenses
Asigra Inc. announced general availability of Asigra Cloud Backup with Deep MFA, making it among the most heavily defended backup platforms on the market....
ESET Canada Researchers Discover Thousands of Email Servers Under Seige
ESET researchers in Canada have discovered a potential threat to 5,000 Microsoft Exchange business and government email servers around the world.
Although the exact number...
Hornetsecurity Aims to Expand In North America by acquiring Zerospam
Hornetsecurity (a cloud email security vendor originating from Germany), has announced its second acquisition this year - Zerospam (a cloud email protection company headquartered...
FedEx Files 10-K with Additional Disclosure on Cyber-Attack Affecting TNT Express...
FedEx announced that the worldwide operations of TNT were significantly affected by the cyber-attack known as Petya, which involved the spread of an information...
Canadian Cyber Security Firm Expands Incident Response to New Standalone Service
ISA, a Toronto-based cyber security firm with over 20 years of experience helping organizations of all sizes solve complex challenges relating to IT security,...


















