Trick or Treat Windows XP

Watch out for the zombies this Halloween! Windows XP systems, like zombies, are hard to kill. In many medium-sized companies, computers with the outdated...

2023 IT Security Trends Interview with Park Place Technologies

John Parlee of Park Place Technologies provides his outlook on EOY and 2023 trends as it pertains to IT security, and how he is ensuring...

Kaspersky Lab Report: Data Breaches in North America Can Lead to C-Level Job Loss

New research from the Kaspersky Lab 2018 B2B Survey shows that North America is the top region where a data breach is most likely...

Email and Web Security with TitanHQ

TitanHQ has been working with Managed Service Providers globally since 1999 and currently partners with over 2,000 MSPs globally. Their products were built from...

Protect yourself against KrOOK — the vulnerability that put billions of connected devices at...

More than a billion users of wi-fi enabled devices around the wold are vulnerable to hacking due to a microchip design flaw discovered by...

Cyber Risk Management Company Vulcan Cyber Joins Microsoft Intelligent Security Association

Vulcan Cyber, developers of the cyber risk management platform for infrastructure, application, and cloud security, announced the company has joined the Microsoft Intelligent Security...

Protegrity: LLMs in Banking

Sameer Tiwari, Chief Technology Officer. at Protegrity, talked about the company's mission to safeguard sensitive data, particularly for banks and healthcare providers. Protegrity's strategy...

CYE’s “Hyver” analyses cyber risk in real-time adding a monetary value to the business...

CYE, a leader in cybersecurity optimization platforms, announced a new capability in its Hyver platform that calculates dynamic risk in real-time. Hyver sets a new...

Ethical hacker gets stumped by Barrier 1 technology

Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...