ESET extends the reach of its 2FA product, ESET Secure Authentication,...
ESET announced that it has made its smartphone-based 2FA solution, ESET Secure Authentication available via its 4000+ stron MSP Partner's Program.
ESA can be...
Symmetry Systems Achieves Amazon Web Services (AWS) Security Competency Status
Symmetry Systems, a modern data security company has achieved Amazon Web Services (AWS) Security Competency status in the Data Protection category. This designation recognizes Symmetry...
Ovum Report Recognizes IGEL for Enhancing Thin Client Security and Driving...
IGEL announced it was featured in a recent Ovum report for its focus on enhancing thin client security and growing software-based thin client adoption....
Password Authentication is secure – Password Management is a security nightmare
Security pundits want to blame passwords for all the cyber breaches. They love chanting “Kill Passwords” and “Go Passwordless.” Passwords are secure and will...
Syncro: Leveraging M365 to Build Your Business
Special Guest: Lee Ramse, Senior Product Manager, Syncro
Lee talked about the challenges faced by Managed Service Providers (MSPs) in adapting to Microsoft 365 (M365) and the...
Prophet Security: Alert Investigation and Response Times
Prophet Security, an agentic AI SOC platform provider, released its inaugural State of AI in SecOps 2025 Survey Report.
Based on the findings from this survey,...
ESET Voted Best Security Vendor for the Second Year in a...
Last week at the 12th annual Reseller Choice Awards – which took place on February 7th – ESET was honoured with seven award nominations and four...
Cybrary Welcomes New Instructor to its Cybrary Threat Intelligence Group (CTIG)
Cybrary is a leading cybersecurity training platform that combines professional development with mission-ready experiences to fully equip cyber practitioners at every stage of their...
Exploring The Malicious Usage of QR Codes
Discover the history, types, and threats of QR codes, including quishing and QRLJacking. Learn why QR phishing is effective and how it exploits user...


















