Uncovering the Paradox in AI with Axonius
Daniel Trauner of Axonius talked about new data from Axonius which has uncovered a surprising paradox in the way companies are investing in AI–...
Vulcan Cyber Introduces Attack Path Graph
Vulcan Cyber, developers of the cyber risk management platform for all attack surfaces, announced the launch of the new Vulcan Cyber Attack Path Graph....
Cerby Introduces World’s First Security Platform for Rogue Applications
Cerby recently launched with the world’s first security platform for unmanageable applications and an approach that enhances security practices by empowering both employees and security...
Interview with Zoho on Privacy, AI and Much More
In response to continued privacy concerns, Zoho, a leading global technology company, is launching a new privacy-centered service which builds on its industry-leading Privacy Pledge that...
3 out of 5 people experienced a tech support scam in past year says...
Tech support scams are a problem worldwide, with 3 out of 5 people having experienced one in the past year and 1 in 5...
Cybersecurity: Give your Customers’ Employees Freedom to Perform
Well-trained employees safeguard your company
90% of cyber-incidents are caused by human error, so training employees on cybersecurity risks is now a must.
Instead of uninspiring...
Asigra Highlights Five Data Backup & Recovery Challenges Threatening SaaS Application Data
Asigra Inc., a leader in ultra-secure backup and recovery, is tackling the pressing data protection and security challenges faced by organizations utilizing the thousands...
Proofpoint Offers New Cybersecurity and Data Sovereignty to Canadian Businesses
Cybersecurity firm Proofpoint announced that in addition to providing email protection and information archiving solutions to Canadian customers, it can now also provide its full...
Expert Panel Discussion on Cybersecurity
Listen to this panel discussion with Cyber Security Expert Joe Cummins from CybernetIQ and MSP Michael Contento from My Blue Umbrella to get their...
Rezonate: Identity Management Reinvented
Identity security is broken across multiple tools and stakeholders in the organizations, each lacking the context or control over many parts of human and...















