26.5 C
Toronto
Sunday, July 21, 2024

Eclypsium: Firmware Cyber Attack Vector and Supply Chain Protection

Eclypsium, a digital supply chain security company protecting critical hardware, firmware, and software in enterprise IT infrastructure, recently announced the launch of the Eclypsium Global Partner Program, a new program focused on...

AI: The First and Last Defense in Cyber Attacks

AgileBlue, a leading global innovator in AI-powered cybersecurity solutions, recently announced the general availability of Sapphire AI in its Cerulean XDR|SOAR platform. The advanced AI system reinforces the company’s commitment to customer excellence,...

Prioritizing Cybersecurity Risks

Uptycs, a leading cloud security platform for large hybrid cloud environments, has launched Upward, its channel-first partner program. The new program will help Uptycs and its partners bring its cloud-native application...

When was the last time you tested the strength of your cybersecurity posture?

Don Landers, Channel Lead at SpecterOps, presented the company’s main product, BloodHound Enterprise, as the first and only solution to help enterprises secure Microsoft Active Directory (the software used to manage...

Get Ready For Crowdsource Hacking!

Julian discussed with Paul Ciesielski, Chief Revenue Officer at Bugcrowd, a crowdsource security testing company. Paul provided insights into the company's background, services, and the utilization of ethical hackers in their...

Hunting for the Footprints of Cyber Criminals

With a cybersecurity workforce gap 4 million people wide and economic uncertainty plaguing budgets, cyber teams are short on resources to conduct the proactive threat hunting that is key to improving...

Is Remote Desktop Support Access Secure?

Allison Loy, Director of Channel Sales for TeamViewer Americas, shared her thoughts on the future outlook and collaboration in the digital-first space. Allison and Julian discussed the evolution of remote access...

How Secure is your Mobile Device?

With the rise of remote work and the growing use of mobile devices, the need for effective mobile device management has never been more crucial. Android Enterprise has emerged as a...

Avoiding QR Code and SMS Phishing

In October 2023, SlashNext Threat Labs published a blog post detailing how threat actors leverage QR codes for various attacks and breach attempts. More recently, they released its latest security research findings...

World Hacker Games Coming February 22nd

Let the hacker battles begin!  Hackers battle to find vital flaws in the infrastructure and cybersecurity defense systems, and PlexTrac will be there to defend and report. On February 22, when the fight...