Simplifying CISO Security: SureStack’s AI-Driven Vulnerability Strategy

Adam Bennett, CO-Founder and CEO of Surestack, discussed his company's competitive advantages, including strong connections in the Department of Defense and large enterprises, as...

Syncro: The Current State of RMM

Special Guest: Dee Zepf, Chief Product Officer, Syncro In this dicsussion, Dee talked about the evolving landscape of Remote Monitoring and Management (RMM) and...

Syncro: Microsoft 365 Security: Essentials to Strengthen Your Posture

Special Guest: Rich Dean, Senior Director of Product Management, Syncro Richard highlighted Microsoft's role in the cybersecurity sector, particularly through their MCP servers that enable small and...

Gigamon & WWT: Cybersecurity Strategies and Partnerships

Julian Lee had a discussion with Shane Buckley, CEO of Gigamon, and Chris Konrad, Vice President of Global Cyber at WWT. Shane outlined Gigamon's...

Channel Veteran Joe Sykora Joins Coro as General Manager of The Americas

Coro, one of North America's fastest-growing cybersecurity companies, announced the recent appointment of Joe Sykora as its first GM of The Americas. Joe brings executive...

Is your commute safe? 73% of Canadians fear cyber threats on the go

A new survey by the cybersecurity company NordVPN revealed that as many as 73% of Canadians use their smartphones while commuting, and more than...

J-SAS: A Walk-Through Cybersecurity Posture Assessment

Ryan Devers, VP Product Strategy of J-SAS, discussed the challenges and opportunities for Managed Service Providers (MSPs) in Canada regarding compliance. He highlighted that...

ESET Enhances Cybersecurity Portfolio for MSPs and Channel Partners

ESET has announced a series of updates to its business portfolio and the ESET PROTECT Platform to support MSPs and channel partners across North...

SafeBreach: Providing a Cohesive Risk Management Solution

SafeBreach, a leader in enterprise security validation, announced an integrated exposure management platform that combines its breach and attack simulation (BAS) technology with a...

Reveal Security: Enhancing Anomaly Detection in Cybersecurity

Christy Lynch, GTM Leader with Reveal Security, highlighted Reveal's capabilities in monitoring identity behavior across critical applications, addressing both human and non-human identities. This...