Cequence Security’s Precision Strategy for API Protection and Channel Growth
Cequence Security’s Gus Siefker and Sydney Weber outlined a mission-critical shift toward protecting global brands from the "automated arms race" of bot-driven fraud and...
Contrast Security’s New MSSP Program Empowers Partners to Protect Customers’ Applications...
Contrast Security announced the launch of its new Managed Security Services Program (MSSP) offering to provide partners the ability to support businesses of all sizes with...
Pulling up your SOC
Everyone knows that cyber security is the golden ticket if you can get it right. To go from VAR to MSP is a giant...
Are passwords becoming obsolete?
A minimum number of characters, mix of letters and numbers and must include a symbol.
Sometimes, it seems like it can be a Herculean task...
ESET extends the reach of its 2FA product, ESET Secure Authentication,...
ESET announced that it has made its smartphone-based 2FA solution, ESET Secure Authentication available via its 4000+ stron MSP Partner's Program.
ESA can be...
Pax8 Bolsters MSP Defenses with Industry-Leading Security Platform from Trend Micro
Pax8 announced Trend Micro is now available on the Pax8 Marketplace in North America and Europe. Trend Micro’s proven product and program align with...
New, Sophisticated Ransomware Exploits Dangerous Windows Vulnerability
Kaspersky researchers have uncovered a new encryption ransomware named Sodin which exploits a recently discovered zero-day Windows vulnerability to gain elevated privileges in an...
4M payment card details found on sale on the internet –...
A research from NordVPN has analyzed 4M payment card details that were found by independent researchers for sale on the dark web and belonged...
New Research Confirms Cybersecurity is Top Concern in Corporate IoT Deployments
BlackBerry Limited announced findings from a new global research whitepaper, which surveyed IT decision makers on corporate IoT deployments. Conducted by 451 Research, the...
Ethical hacker gets stumped by Barrier 1 technology
Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...
















