Searchlight Security Launches New Multi-Tenancy Capability

Searchlight Security, the dark web intelligence company, has announced new multi-tenancy capabilities for DarkIQ, its powerful dark web monitoring solution. DarkIQ utilizes the most comprehensive...

Kaspersky Report: Employee Awareness of Cyberthreats in the Healthcare Industry

According to a new survey report from Kaspersky Lab, employees of healthcare organizations in the U.S. and Canada, who admit their awareness of a...

Kaspersky Shuts Down U.S. Operations Good or Bad For Cybersecurity?

Following the recent US Commerce Department's decision to prohibit the sale of Kaspersky software in the U.S. due to concerns about the company's Russian...

SonicWall Drives Growth in Managed Security Services and Cloud Secure Edge...

SonicWall announced significant business momentum fueled by increasing demand for its Managed Security Services (MSS) and Cloud Secure Edge (CSE) / Zero Trust Network...

ESET Becomes Founding Member of Google’s App Defense Alliance; ESET to...

ESET announced it has become a founding member of the App Defense Alliance to protect the Google Play Store. ESET will provide its award-winning...

Augment Your Monitoring with Logz.io Cloud SIEM

As you know, one of the biggest buzzwords in cybersecurity recently is XDR (extended detection and response). Originally posed in 2018 by an executive...

Protecting Clients’ Executives from Data Breaches

By Media Sonar Recent research found that 99% of executives have personally identifiable information (PII) on over three-dozen data broker websites. There were more than three...

Canada’s anti-spam legislation: Education still needed!

More than 3 years after coming into force, Canada's anti-spam legislation (CASL) remains unclear for more than 1 in 2 of email marketing users....

Ivanti to Acquire Cherwell to Enable End‑to‑End Service and Asset Management

Ivanti, Inc., today announced it has signed a definitive agreement to acquire Cherwell Software, a global leader in enterprise service management solutions. The terms...

Ethical hacker gets stumped by Barrier 1 technology

Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...