Online Threats Retain Sky-High Levels as Pandemic-induced Cyberattacks Persist

According to Heficed (a network infrastructure solutions provider) the COVID-19 pandemic has touched virtually every aspect of human life—from health to housing to economy...

How Cybercriminals Abuse Airbnb For Fraudulent Activities

Cyberattacks are becoming increasingly common and sophisticated. One particular concern is the rising misuse of popular platforms like Airbnb. The following highlights how cybercriminals...

How Secure is your Mobile Device?

With the rise of remote work and the growing use of mobile devices, the need for effective mobile device management has never been more...

Siemplify Unveils Industry’s First Cloud-Native SOAR Platform

Siemplify, the leading independent provider of security orchestration, automation and response (SOAR),  announced Siemplify Cloud, the industry’s first cloud-native security operations platform. Reimagined for...

When was the last time you tested the strength of your cybersecurity posture?

Don Landers, Channel Lead at SpecterOps, presented the company’s main product, BloodHound Enterprise, as the first and only solution to help enterprises secure Microsoft...

Strengthening the weakest link in Cyber Attack Prevention

Explore the weakest link in just about every organization’s cyber security defence and how any channel partner can quickly help their customers to plug this...

Beachhead Solutions Launches New MSP Security Capabilities

Beachhead Solutions, provider of cloud-managed PC & mobile device encryption, security, and data access control for Managed Service Providers (MSPs), announced that the BeachheadSecure...

Industry Experts Enhance CyberSense Software to Stay Ahead of Advancing Ransomware

Data integrity experts Index Engines announced the latest enhancements to its ransomware detection and recovery software, CyberSense, to help organizations win the war against...

New Research from Lineaje Reveals Open-Source Software Security Gaps

Lineaje, a leader in software supply chain security management, released its new research report titled “What’s in Your Open-Source Software?” Compiled by the company’s...

Protect yourself against KrOOK — the vulnerability that put billions of connected devices at...

More than a billion users of wi-fi enabled devices around the wold are vulnerable to hacking due to a microchip design flaw discovered by...