11.1 C
Toronto
Thursday, April 18, 2024

Google Chrome and ESET collaborate in fight against online threats

ESET announced it is continuing to partner with Google to protect Google Chrome users. ESET’s award-winning technology is used by Google to scan, identify...

Navigating the Complex World of Cybersecurity Compliance

Compliance Scorecard (fka Compliance Risk) and ConnectSecure have launched a joint solution for MSPs to automate asset governance. With the IoT continuing to increase attack surfaces, the...

How secure is your phone’s lock screen?

ESET shares tips for keeping your personal device secure. As people become more sensitive about the privacy and security of their data, Canadians across the...

Sophos Adds Deep Learning Capabilities to Intercept X Early Access Program

Sophos announced that deep learning driven malware detection is available through its Intercept X early access program. This deep learning capability has been developed...

IGEL Extends Skype for Business Support to VMware Horizon Virtual Desktops

IGEL, a world leader in endpoint management software for the secure enterprise announced that it has optimized the IGEL OS, adding support for Skype...

Axis Security Accelerates Growth with Series C Funding Led by Spark...

Axis Security announced a $50 million Series C round, bringing its total raised to date to $100 million in the first year. The funding...

2024 Predictions from Kyndryl

Speaker: Denis Villeneuve. Cybersecurity and Resilience Practice Leader - Canada at Kyndryl Watch our discussion with Kyndryl, the world's largest managed infrastructure services company. The...

Zimperium Adds No-Code Application Shielding to its Mobile-First Security Platform

Continuing its commitment to protecting all mobile endpoints and mobile apps from a single platform, Zimperium announced the expansion of its award-winning application shielding...

High Wire Networks Ranks Among Top Cybersecurity Providers in Frost &...

High Wire Networks Inc. received a top ranking in the new Frost & Sullivan (F&S) report on the cybersecurity industry, Frost Radar: Americas Managed...

Ethical hacker gets stumped by Barrier 1 technology

Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...