10.3 C
Toronto
Friday, November 7, 2025

Email Threats Spike 101%, Remains a Top Attack Vector

Trend Micro Inc. blocked over 33.6 million cloud email threats in 2021, a 101% increase on the previous year. This stark increase in attacks...

StorPool Introduces New Disaster Recovery Solution

StorPool recently announced they’ve added a Disaster Recovery engine into the StorPool Storage Platform that will empower managed storage providers and enterprises to recover virtual...

ChannelNext Central 2023: Cyber Attacks: The Good, The Bad and the Dowright Ugly

Presenter: Miles Walker, Channel Development Manager, IT Complete Kaseya. Miles follows the cybersecurity industry every day and has very good insights about what cyberattacks...

ESET predicts ransomware and fileless malware to become trends in 2021

After a year in which the COVID-19 pandemic upended the way we live, work and socialize, we are likely to see an increased threat...

Eclypsium: Firmware Cyber Attack Vector and Supply Chain Protection

Eclypsium, a digital supply chain security company protecting critical hardware, firmware, and software in enterprise IT infrastructure, recently announced the launch of the Eclypsium Global...

Control is top of mind for Canadians when it comes to online personal information,...

An Interac's survey shows that Canadians are concerned with the lack of control they have over their personal information online. According to a new...

Communicate Safely Online with Hornetsecurity

Hornetsecurity ensures efficient and secure communications by email and on the Internet – without any hardware, software and maintenance.  The German-based company offers cloud-based...

Discussion with Forcepoint’s Simon Wiseman on Current Ransomware Trends

Listen to Forcepoint's CTO Simon Wiseman’s thoughts on why ransomware remains prevalent, its favorite mechanisms used, and strategies that best prevent the attacks.A glimpse...

Barrier 1 Blocks Hacker In Microseconds

Barrier1 is already doing what all security platforms must be doing to block hacker attacks. If you cannot identify and block and attract in...