Gigamon & WWT: Cybersecurity Strategies and Partnerships
Julian Lee had a discussion with Shane Buckley, CEO of Gigamon, and Chris Konrad, Vice President of Global Cyber at WWT. Shane outlined Gigamon's...
Oasis Security: Understanding Non-Human Identities in Cybersecurity
Sam Hahm, Channel and Alliances Leader of Oasis Security, talked about the challenges and implications of non-human identities (NHIs) in cybersecurity, highlighting that NHIs...
Interview with Dell Technologies at Ingram Micro ONE 2024
Anthony Martiniello, Senior Channel Sales Manager at Dell Technologies
At the Ingram Micro ONE event, Anthony discussed the company's substantial growth and its holistic approach...
ISA Cybersecurity: Understanding Cybersecurity Investment Decisions in SMBs
Kevin Dawson, President of ISA Cybersecurity discussed the company's commitment to serving Canadian enterprise clients and emphasized that all investments and operations are localized...
Wallarm: API Security Breaches and Vulnerabilities
Wallarm, a global leader in API security, recently released its 2025 API ThreatStats Report, revealing that APIs have emerged as the predominant attack surface...
2025 Predictions from Syncro
Kristen Costagliola is Chief Technology Officer at Syncro, a leading platform provider of IT management and MSP solutions.
Kristen provided insights into the evolving landscape...
Syncro: Microsoft 365 Security: Essentials to Strengthen Your Posture
Special Guest: Rich Dean, Senior Director of Product Management, Syncro
Richard highlighted Microsoft's role in the cybersecurity sector, particularly through their MCP servers that enable small and...
Reasonable Risk: Legal Defensibility in Cybersecurity
Rosanna Pellegrino, CRO of Reasonable Risk, discussed her company's platform exclusively for channel partners to assist organizations in building risk management programs. She highlighted...
SonicWall Redefines Cybersecurity, Sets New Standard with Next Generation Network Security Solutions Built for...
SonicWall unveiled a full suite of products and services purpose-built to empower and meet the evolving needs of Managed Service Providers (MSPs) and their...
Reveal Security: Enhancing Anomaly Detection in Cybersecurity
Christy Lynch, GTM Leader with Reveal Security, highlighted Reveal's capabilities in monitoring identity behavior across critical applications, addressing both human and non-human identities. This...















