Ovum Report Recognizes IGEL for Enhancing Thin Client Security and Driving...
IGEL announced it was featured in a recent Ovum report for its focus on enhancing thin client security and growing software-based thin client adoption....
Endor Labs: Next Level in Application Development Security
Endor Labs announced a new way for organizations to remediate application security risks, solving a critical industry problem and accelerating vulnerability remediation:
Jenn Gile, VP...
Trend Micro Opens Cybersecurity Research Centre in Canada to Expand Global...
With the dynamic and global nature of today’s cyber threat landscape, enterprises are faced with ever-increasing challenges. To help customers remain ahead of cyber...
J-SAS: Compliance-as-a-Service for SMBs
Sase Janki, the founder of J-SAS, talked about his background in the MSP industry and the evolution of the managed services market. He emphasized...
Cymulate Expands GTM Strategy
Cymulate, a leader in threat exposure validation, recently announced new appointments to its sales leadership team, which will allow the company to expand its...
Cybrary Welcomes New Instructor to its Cybrary Threat Intelligence Group (CTIG)
Cybrary is a leading cybersecurity training platform that combines professional development with mission-ready experiences to fully equip cyber practitioners at every stage of their...
Syncro: Microsoft 365 Security: Essentials to Strengthen Your Posture
Special Guest: Rich Dean, Senior Director of Product Management, Syncro
Richard highlighted Microsoft's role in the cybersecurity sector, particularly through their MCP servers that enable small and...
Interview with Kipling Secure at ChannelCon 2025
Guest: Saurabh Sandhir, CEO & Co-Founder, Kipling Secure, a cybersecurity company that provides an AI-based platform to help businesses protect, detect, and respond to...
CybeReady Unveils CISO Training Toolkit for Defense Against Cybersecurity Threats
CybeReady announced the CISO Toolkit to support organizational security defenses. With the availability of the CISO Toolkit, the company is utilizing its expertise in...



















