23.9 C
Toronto
Friday, July 26, 2024

Come Meet Liongard at IOTSSA Cybersecurity Event on Oct. 26th-27th

Liongard will be at the IOTSSA Cybersecurity channel conference on Oct 26-27 to show how they can help MSPs streamline operations on many levels. They will be showcasing their new Microsoft...

Improving Data Security and Governance with Egnyte

Julian discusses with Kris Lahiri, Co-Founder and Chief Security Officer at Egnyte, a Silicon Valley startup that's raised $137 million to help 20,000+ organizations better govern their data. They discussed...

Come Meet Channel Rocket at Cybersecurity Defense Ecosystem on November 16th 2023

Channel Rocket provides a platform built exclusively for channel partners. It allows to type in a business pain point & reveals all vendors and resources that match that pain point. Through...

ChannelNext West 2023: Introduction to Cybersecurity Defense Ecosystem

Host: Julian Lee Panelists: Shane Gibson, Randal Wark, Michael Becce and Jaap Mantel YOU ARE NOT ALONE! Introducing the on-stop resource for building and scaling effective cybersecurity managed services and business practices. The...

Secure Connections Panel – Dark Cubed and High Wire Networks

Julian has a sobering conversation with Dark Cubed, Founder, Vince Crisler and High Wire Networks, CTO, David Barton about the depths of vulnerabilities we face today with more and more reliance...

Cybersecurity Defense Ecosystem Podcast Episode 7 – Crosshair Cyber: What is the Right Incident...

Presenter: Adam Bennett, CEO at Crosshair Cyber Julian Lee and Adam Bennett highlighted the significance of practicing and testing the incident response plan through realistic scenarios to identify and address any gaps....

Come Meet MSP Toolkit at IOTSSA Cybersecurity Event on Oct. 26th-27th

Len DiCostanzo can help any MSP to streamline and scale their managed service practice. He built an MSP business and sold it. He was there when PSA platforms got started. He...

Building a Culture of Security Awareness with Fortra

Humans are by far the most neglected link in cybersecurity and threat actors use social engineering attacks to exploit this. They prey on human error, and it only takes one click...