Canadian Small and Mid-Sized Businesses Report Decreasing Confidence in Protecting Their...

According to new research, only a quarter (26 per cent) of Canadian employees at small and mid-sized businesses (SMBs) are very confident that their...

Kaspersky supports healthcare institutions amid COVID-19 pandemic with free product licenses...

Kaspersky announce free availability of its core endpoint security products for medical organizations in order to help them stay protected from cyber threats during...

eSentire: Cyber is All About the Platform

We recently sat down again for an interview with Bob Layton, Chief Channel Officer at eSentire regarding their latest news that 'CrowdStrike and eSentire...

ChannelNext West BC 2022 – Scaling your Cybersecurity Managed Services

Panelists from left to right: Aaron Gill, Senior Director of Channel, Jolera, Stephen Nichols, Director Solutions Engineering, Acronis, Julian Lee, TechnoPlanet The majority of channel...

Cymulate Expands GTM Strategy

Cymulate, a leader in threat exposure validation, recently announced new appointments to its sales leadership team, which will allow the company to expand its...

Ingram Micro Expands Cybersecurity Capabilities with Acquisition of Cloud Harmonics

Ingram Micro Inc. announced it has acquired Cloud Harmonics, a leading U.S.-based, value-added provider of cybersecurity solutions for the U.S. and Canadian markets. The addition...

Q3 2023 Phishing and Malware Report: Phishing and Malware Threats Increase...

In Q3 2023, Vade detected a substantial increase in phishing and malware attacks. Phishing volumes increased by 173% compared to the previous quarter (493.2 million...

Defendify is Simplified Cybersecurity

Originally started as a cyber security consultancy practice, Defendify is an all-in-one security platform for small businesses.  They offer 12 unique modules that an...

Ethical hacker gets stumped by Barrier 1 technology

Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...