Lookout Announces New EDR Solution for MSSPs
Endpoint-to-cloud security company Lookout, Inc. announced the availability of Lookout Mobile Endpoint Security, the industry’s most advanced mobile endpoint detection and response (EDR) offering...
Offensive Security Introduces Global Partner Program
Offensive Security (OffSec), a leader in continuous cybersecurity workforce development, training and education, announced the launch of the Offensive Security Global Partner Program. The...
TPx Introduces Managed Inbox Detection and Response Service
TPx, a leading nationwide managed services provider delivering cybersecurity, managed networks and cloud communications, launched its Managed Inbox Detection and Response (IDR) service to...
Protect yourself against KrOOK — the vulnerability that put billions of connected devices at...
More than a billion users of wi-fi enabled devices around the wold are vulnerable to hacking due to a microchip design flaw discovered by...
Who Are Cyber Spies?
Every day we refer to those who commit cyber attacks as “hackers”. The image does not project an image of a a terrible criminal....
World Hacker Games Coming February 22nd
Let the hacker battles begin!
Hackers battle to find vital flaws in the infrastructure and cybersecurity defense systems, and PlexTrac will be there to defend...
Siemplify Unveils Industry’s First Cloud-Native SOAR Platform
Siemplify, the leading independent provider of security orchestration, automation and response (SOAR), announced Siemplify Cloud, the industry’s first cloud-native security operations platform. Reimagined for...
Amid Growing Ransomware Threats, Index Engines Releases Developer Kit
Index Engines released an API-based developer’s kit to support the integration of its industry-leading CyberSense software’s analytics and reporting into third-party backup and storage...
How to Talk to a CFO about cybersecurity
Cybersecurity has quickly evolved from being an IT problem to the most significant business risk outside of COVID-19. CFO’s and risk managers use frameworks...
Ethical hacker gets stumped by Barrier 1 technology
Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...















