Mary McKeown-Christie

Despite their size, SMB customers are absolutely a target of hackers, who are ‘making a ton of money off of your customers,’ Webroot executive Sarah Morgan tells solution providers at XChange 2019.

Read More

This is a great article about integrating cybersecurity solutions to address multiple endpoints, which is exactly why we designed the cloud-based EZProtect antivirus to scan both Salesforce and all connected applications handling attachments (Mulesoft for example) in real-time.

Read More

The malicious content (viruses, ransomware, malware) stays within each attachment uploaded to Salesforce and is essentially waiting to be unleashed — costing agencies millions of dollars in damages and fees. The issue is when the files are opened or forwarded to another contact for signature, what happens next.

Read More

With the addition of the EZProtect (ODS) API, any cloud-based or on-premises application with an API (such as Box.com, Sharefile, Office 365 OneDrive, Mulesoft, Boomi, etc.) may also connect to EZProtect enabling enterprise-wide virus scanning of files with centralized reporting.

Read More

Partnership established to bring industry-leading cloud-based antivirus HUB for Salesforce and other cloud-based applications to large enterprises in North America.

Read More

Adaptus is pleased to announce major product enhancements and new capabilities for EZProtect — the industry’s leading antivirus solution for Salesforce. The Spring ‘19 release lays the foundation for a centralized, cybersecurity hub for all cloud-based and on-premise applications for large enterprises.

Read More

An average of 5,000 to 7,000 new computer security threats are announced each year. Here's how to defend against them more effectively and efficiently.

Read More

Attention Hackers! Demonstrate your ingenuity at the SXSW Hackathon. The sixth annual SXSW Hackathon returns in a buzzy 24-hour marathon stretching from Tuesday, March 12 through Wednesday, March 13! Developers, coders, and tech creatives will collaborate in teams to build tech that addresses the range of media covered at SXSW,  from Music and VR/AR to AI and blockchain. Register here...

Read More

Security analytics/operations is a big data application, and big data applications are moving to the cloud. CISOs who still distrust the public cloud must face this fact. They will either figure out how to peacefully coexist with cloud-based cybersecurity analytics/operations or be left in the dust. 

Read More

For a CISO or CSO to be truly effective, they need access to the central decision-making process and the authority to participate in that process as an independent voice. To truly provide guidance to the organization around the security of its information and assets, you need to be in the executive level decision-making conversations. And not simply as an observer: you need a full vote.

Read More