Contrast Security’s New MSSP Program Empowers Partners to Protect Customers’ Applications...

Contrast Security announced the launch of its new Managed Security Services Program (MSSP) offering to provide partners the ability to support businesses of all sizes with...

Passportal Provides Secure Password and Documentation Management for MSPs

Founded specifically by an MSP, Passportal has more than 1,000 partners in 32 countries.  Their product represents net new revenue opportunities for partners as it can...

N-Able: Security is a Team Sport

N-able recently announced a series of global compliance initiatives to help MSPs, IT Service Providers be more aware and meet growing regulatory requirements, particularly...

Threat Intelligence from Kaspersky gives you access to the intelligence you...

Expert security for your security experts Threat Intelligence from Kaspersky gives you access to the intelligence you need to mitigate cyberthreats, provided by our world-leading...

Critical Start: Managed Cyber Risk Reduction and Assessments

Critical Start, a leading provider of Managed Detection and Response (MDR) cybersecurity solutions and pioneer of Managed Cyber Risk Reduction (MCRR), recently announced the...

ProcureIT: Data Protection and AI Safeguards

Procure IT, makers of the AI-driven SaaS platform for IT procurement and optimization, has recently named Corey Whiting its Chief AI Officer (CAIO). We sat...

Mimecast: Channel Strategy and Partner Engagement Insights

Micheal McCollough talked about his role and strategies as the new Senior Vice President of Global Channels and Alliances at Mimecast, particularly in relation...

Nominet Aims for Velocity in the Channel

It’s been less than a year since Nominet (the security specialist with a history of protecting critical infrastructures in the UK for more than...

Keeper Security Forges Cybersecurity Partnership With Williams Racing

Keeper Security, joins Williams Racing as an Official Partner on the eve of the F1 Miami Grand Prix. Trusted by thousands of businesses and millions of...

Ethical hacker gets stumped by Barrier 1 technology

Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...