Apple Rushes to Fix Zoom Security Flaw

Apple has delivered a silent update to Macs, rectifying a security flaw in its Zoom web-conferencing service.

Cisco Suffers Security Flaw With Zoom Interoperability

Cisco is beginning to lose patience with its Zoom interoperability after another Zoom security risk: access for the Zoom Connector for Cisco hosted on zoom.us did not...

HP Acquires Bromium

HP acquired Bromium, an endpoint security start-up that uses virtualization to isolate browser-based attacks, malicious downloads and applications, and email attachments...

VMware Acquires Carbon Black for $2.1 Billion

VMware acquires Carbon Black, a cloud-based endpoint protection solution, at $26 per share, representing an enterprise value of $2.1 billion.

Malwarebytes Integrates With ServiceNow to Streamline the Incident Response Process

Malwarebytes’ endpoint security solutions’ cloud integration with ServiceNow simplifies the security deployment process by streamlining and documenting the entire...

SentinelOne Partners With Pax8 to Offer Endpoint Security Services

Pax8 partners with SentinelOne to offer its clientele endpoint security protection capable of preventing, detecting, and responding to cyberattacks.

Microsoft Defender ATP Is “Generally Available” for Macs

As of June 28, Microsoft has expanded its flagship endpoint security platform, Microsoft Defender Advanced Threat Protection (ATP), to support Mac operating systems.

Avaya Releases New Firmware to Resolve Vulnerability in VoIP Phones

Avaya’s newly released firmware addresses a vulnerability that has survived for 10 years in VoIP phone models configured with H.323 signaling.

Hacker Compromises Data of 106 Million Capital One Customers

A hacker has compromised 106 million Capital One customers after a data breach. But the real story might be less to do with cloud security itself and more to do with...

Debunk Machine Learning Endpoint Security Solutions

Traditional legacy anti-virus solutions are unable to keep up with the sheer volume of new and sophisticated endpoint attacks. As a potential solution to combat this...
  • guided implementation icon
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us