Best Practices for Protecting Mobile Devices
JT Keating, SVP Strategic Initiatives of Zimperium, provided insights into the attack vectors on mobile devices, including malicious apps, network exploits, and phishing, and...
World Hacker Games Coming February 22nd
Let the hacker battles begin!
Hackers battle to find vital flaws in the infrastructure and cybersecurity defense systems, and PlexTrac will be there to defend...
Combining AI with Human Logic – Security Discovery
Julian discusses with Jeremiah Fowler, Cyber Security Researcher at Security Discovery. Jeremiah discovered a misconfigured database that contained 133 GB worth of data,...
LogMeIn: Asset Management Capabilities and MSP Efficiency
Chris Savio, Senior Director, Product Marketing at GoTo (fka LogMeIn), talked about the Resolve platform's simplicity, which stands in stark contrast to the often...
J-SAS: A Walk-Through Cybersecurity Posture Assessment
Ryan Devers, VP Product Strategy of J-SAS, discussed the challenges and opportunities for Managed Service Providers (MSPs) in Canada regarding compliance. He highlighted that...
Come Meet Panorays at IOTSSA Cybersecurity Event on March 30th
Joseph Jaghab will talk about how to automate, accelerate & scale your third-party security risk management. Find out more on March 30th at the...
Come Meet Partner Optimizer at Cybersecurity Defense Ecosystem on November 16th 2023
Partner Optimizer helps vendors in building their ecosystem as well as partners in their digital footprint. Based on targeted data, their platform identifies...
Securing Frictionless Identity Management with JumpCloud
For this podcast, we interviewed Chase Doelling, Principal Strategist at JumpCloud. He shares his insights on the findings from JumpCloud's biannual SME IT...
How are IoT Devices Vulnerable to Hackers?
Julian Lee and John Gallagher, VP at Viakoo discussed the IoT market and its security challenges. They highlighted the vulnerability of IoT devices to...















