-1.1 C
Toronto
Sunday, January 11, 2026
Home Cybersecurity Defense Ecosystem

Cybersecurity Defense Ecosystem

Best Practices for Protecting Mobile Devices

JT Keating, SVP Strategic Initiatives of Zimperium, provided insights into the attack vectors on mobile devices, including malicious apps, network exploits, and phishing, and...

World Hacker Games Coming February 22nd

Let the hacker battles begin!  Hackers battle to find vital flaws in the infrastructure and cybersecurity defense systems, and PlexTrac will be there to defend...

Combining AI with Human Logic – Security Discovery

Julian discusses with Jeremiah Fowler, Cyber Security Researcher at Security Discovery. Jeremiah discovered a misconfigured database that contained 133 GB worth of data,...

LogMeIn: Asset Management Capabilities and MSP Efficiency

Chris Savio, Senior Director, Product Marketing at GoTo (fka LogMeIn), talked about the Resolve platform's simplicity, which stands in stark contrast to the often...

J-SAS: A Walk-Through Cybersecurity Posture Assessment

Ryan Devers, VP Product Strategy of J-SAS, discussed the challenges and opportunities for Managed Service Providers (MSPs) in Canada regarding compliance. He highlighted that...

Come Meet Panorays at IOTSSA Cybersecurity Event on March 30th

Joseph Jaghab will talk about how to automate, accelerate & scale your third-party security risk management. Find out more on March 30th at the...

Come Meet Partner Optimizer at Cybersecurity Defense Ecosystem on November 16th 2023

Partner Optimizer helps vendors in building their ecosystem as well as partners in their digital footprint. Based on targeted data, their platform identifies...

Securing Frictionless Identity Management with JumpCloud

For this podcast, we interviewed Chase Doelling, Principal Strategist at JumpCloud. He shares his insights on the findings from JumpCloud's biannual SME IT...

How are IoT Devices Vulnerable to Hackers?

Julian Lee and John Gallagher, VP at Viakoo discussed the IoT market and its security challenges. They highlighted the vulnerability of IoT devices to...