J-SAS: Future of MSPs and Compliance in the Age of AI

Sase Janki, CEO of J-SAS, discussed the evolving compliance landscape for 2025, highlighting the challenges organizations will face due to increasing regulatory demands, security...

Core Security by HelpSystems Releases New Ransomware Simulator

Core Security by HelpSystems, a leading provider of cyber threat solutions, announced the addition of ransomware simulation to its penetration testing solution, Core Impact. Using an automated Rapid Pen...

30 Years of Elite Cyber Protection with ESET

Threats are only going to increase. To fit against bitcoins, phone phishing and even CDs with malware, a lot of products for endpoint are...

Kaspersky Hybrid Cloud Security protects software development tools

Kaspersky announced that the next generation of Kaspersky Hybrid Cloud Security now safeguards software development operations (DevOps) environments. The product has been enhanced to enable...

Amid Growing Ransomware Threats, Index Engines Releases Developer Kit

Index Engines released an API-based developer’s kit to support the integration of its industry-leading CyberSense software’s analytics and reporting into third-party backup and storage...

Interview with Zoho on Privacy, AI and Much More

In response to continued privacy concerns, Zoho, a leading global technology company, is launching a new privacy-centered service which builds on its industry-leading  Privacy Pledge that...

Action1 RMM Automates Security Vulnerability Mitigation and Remediation

We recently sat down with Branden Boag  Director of Sales & Alliances at Action1 Corporation, provider of remote monitoring and management (RMM) software. Action1...

Live Event: Effortless Ways to Improve your Security Posture

MSPs understand that improving the cyber security of their customers (and themselves) is mission critical. Failure here is not an option. With more than 4,000...

Axis Security Sets the Standard for Zero Trust Network Access Market

Axis Security, a leading provider of Zero Trust Network Access, is enabling leading enterprise organizations to expand beyond traditional access technologies to a more...

A Third of Suspicious Emails Reported by Employees Are Phishing

According to F-Secure, 33% of emails employees report as phishing are either malicious or highly suspect, according to new research. The finding comes from...