CompuCom will take a $20 Million+ financial hit for a security breach

Back on March 3, 2021 the company issued this statement: "Certain CompuCom information technology systems have been affected by a malware incident which is affecting...

Is your Backup Data Really Safe from Ransomware?

Not sure? Don’t know? Well, listen up! Hackers are again way ahead of the game as they have already found a way to plant...

Discussion with Forcepoint’s Simon Wiseman on Current Ransomware Trends

Listen to Forcepoint's CTO Simon Wiseman’s thoughts on why ransomware remains prevalent, its favorite mechanisms used, and strategies that best prevent the attacks.A glimpse...

ChannelNext West 2023: Cyber Attacks: The Good, The Bad and the Dowright Ugly

Presenter: Miles Walker, Channel Development Manager, IT Complete Kaseya. Miles follows the cybersecurity industry every day and has very good insights about what cyberattacks...

CIOSO Global: Empowering the Community in the Fight Against Cyber Threats

Greg Sullivan, Founding Partner of CIOSO Global, shared his extensive background in the field, detailing his transition from software development to cybersecurity roles, including...

Introducing First Double Extortion Ransomware Prevention Solution

Rubrik and Zscaler announced a new partnership and technology integration to streamline data protection and compliance and boost cyber resilience. With this new integration, valuable...

Google has gone passwordless: Interview with Google Cloud partner Wursta

Google recently announced a passwordless solution for all Google accounts. Google users will now be able to more easily access their accounts without having to remember...

Quorum Cyber – Microsoft cyber solutions to help fight Cyber Bullies

Quorum Cyber, founded in the UK in 2016 to help organizations defend themselves in an increasingly hostile digital landscape - has announced it has strengthened its North...

Kaspersky Lab Report: Data Breaches in North America Can Lead to C-Level Job Loss

New research from the Kaspersky Lab 2018 B2B Survey shows that North America is the top region where a data breach is most likely...

Ethical hacker gets stumped by Barrier 1 technology

Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...