10.9 C
Toronto
Wednesday, April 30, 2025

Cybercriminals made it easier than ever to steal data: Expert warns of the rise...

According to NordVPN's research the cybersecurity threat posed by phishing attacks is growing more dangerous as cybercriminals increasingly rely on phishing kits — pre-made malicious packages...

Syncro: The Current State of RMM

Special Guest: Dee Zepf, Chief Product Officer, Syncro In this dicsussion, Dee talked about the evolving landscape of Remote Monitoring and Management (RMM) and...

J-SAS: A Walk-Through Cybersecurity Posture Assessment

Ryan Devers, VP Product Strategy of J-SAS, discussed the challenges and opportunities for Managed Service Providers (MSPs) in Canada regarding compliance. He highlighted that...

ESET Enhances Cybersecurity Portfolio for MSPs and Channel Partners

ESET has announced a series of updates to its business portfolio and the ESET PROTECT Platform to support MSPs and channel partners across North...

Syncro: Market Consolidation in the Tech Industry

Special Guest: Michael George, CEO, Syncro In this interview, Michael discussed the industry’s evolution/back and forth of platform vs. point solutions – how and...

SafeBreach: Providing a Cohesive Risk Management Solution

SafeBreach, a leader in enterprise security validation, announced an integrated exposure management platform that combines its breach and attack simulation (BAS) technology with a...

Is your commute safe? 73% of Canadians fear cyber threats on the go

A new survey by the cybersecurity company NordVPN revealed that as many as 73% of Canadians use their smartphones while commuting, and more than...

Ransom Detection and Recovery with Halcyon

Halcyon recently announced Halcyon Ransomware Detection and Recovery (RDR), a free integrated service now included in every Halcyon Anti-Ransomware Platform purchase Steve Salinas, Senior Director...

CardinalOps: Enhancing Cybersecurity Through Proactive Defense Strategies

SOCs are under constant fire with a barrage of cyber threats, and disparate tools leading to limited visibility make mitigating risk more difficult than...

Token Security: Machine Identities in Cybersecurity

Ido Shlomo, Co-Founder & CTO of Token Security shared insights from his transition from military cybersecurity to founding his company, emphasizing the growing challenge...