State of Threat Detection Investigation Response (TDIR)
Tyler Farrar, CISO at Exabeam, shared his background, including his experience as a naval officer and his journey to becoming a CISO at Exabeam....
Come Meet MSP Toolkit at IOTSSA Cybersecurity Event on Oct. 26th-27th
Len DiCostanzo can help any MSP to streamline and scale their managed service practice. He built an MSP business and sold it. He was...
Come Meet Channel Rocket at Cybersecurity Defense Ecosystem on November 16th 2023
Channel Rocket provides a platform built exclusively for channel partners. It allows to type in a business pain point & reveals all vendors and...
Secure Connections Podcast – Pax8
As 2022 comes to a close, Julian has a sobering ‘State of the Nation’ chat with Matt Lee, Senior Director of Security and Compliance...
Embracing Innovation and Managing Cyber Risks
*This will be the first in a series of cybersecurity CISO level discussions
Matthew Rosenquist is Chief Information Security Officer at Eclipz.io. He is...
Come Meet VIPRE at IOTSSA Cybersecurity Event on February 16-17th
VIPRE will launch a new Endpoint Detection Response solution. Come and find out how to operationalize this on February 16-17 at the IOTSSA Cybersecurity...
Boosting Network Security with Perimeter 81
Julian Lee discusses with Amit Bareket, Co-founder & CEO of Israeli cyber company Perimeter 81. The shift towards widespread remote work has created numerous...
Nine New Sophos XGS Firewall Appliances Feature Boosted Performance with Reduced Energy Consumption
Sophos introduced nine new XGS Series desktop firewall appliances for midmarket and smaller-sized businesses, as well as branch offices of larger organizations. The new...
Come Meet Coach Mel Reyes at Cybersecurity Defense Ecosystem Summit in El Segundo on...
Do not miss Mel Rico Reyes at the upcoming Cybersecurity Defense Ecosystem Summit in El Segundo, CA, as he will be presenting on three...
Cybersecurity in the Dark Web with Searchlight Cyber
Anonymity brings the worst behaviours in people. Most of the malicious activities occur in the dark web. It exposes the fear of the unknown...















