Author: Maggie MacAlpine

When Vendors Become the Vulnerability: What the Marquis Software Breach Signals for Financial Institutions

When Vendors Become the Vulnerability: What the Marquis Software Breach Signals for Financial Institutions

In December 2025, a ransomware attack on Marquis Software Solutions, a data analytics and marketing vendor serving the financial sector, compromised sensitive customer information held by multiple banks and credit unions, according to Infosecurity Magazine. The attackers reportedly gained access through a known vulnerability in a firewall device connected to Marquis’s remote-access systems. The incident

Read More
Airports Under Attack: What the Recent GPS Spoofing Incidents Teach Us About Infrastructure Security

Airports Under Attack: What the Recent GPS Spoofing Incidents Teach Us About Infrastructure Security

A recent government confirmation reveals that several of India’s major airports, including hubs in Delhi (IGI), Mumbai, Kolkata, Hyderabad, and Bengaluru, were targeted by coordinated cyber attacks, involving GPS‑spoofing and GNSS interference while aircraft were using satellite‑based navigation procedures, according to Financial Express. While flight operations remained ultimately unaffected thanks to fallback navigation systems and

Read More
The Deepfake CEO Scam: A New Era of Social Engineering Threats

The Deepfake CEO Scam: A New Era of Social Engineering Threats

A recent TechRadar Pro article warns of a dramatic rise in deepfake-enabled scams targeting executive leadership—and the numbers are hard to ignore. Over half of cybersecurity professionals surveyed (51%) say their organization has already been targeted by a deepfake impersonation, up from 43% last year. The targets are high-value: CEOs, CFOs, and other senior executives

Read More
Insiders, Enhanced: How Generative AI is Changing the Threat Landscape

Insiders, Enhanced: How Generative AI is Changing the Threat Landscape

As artificial intelligence becomes more accessible, a new wave of cybersecurity risk is rising from within: insider threats enhanced by generative AI. According to a recent TechRadar report, security professionals are now more concerned about insider threats than external attackers, driven in part by the increasing use of generative AI tools. While external threats like

Read More
Drowning in Alerts: Why Cybersecurity Teams Are Struggling—and What Needs to Change

Drowning in Alerts: Why Cybersecurity Teams Are Struggling—and What Needs to Change

Security teams are under siege—not just from attackers, but from the very tools meant to protect them. A new report by TechTarget’s Enterprise Strategy Group and Opal Security reveals a growing crisis: identity-related alerts are flooding SOCs with over 11 hours of investigation time per incident on average, often with no meaningful action taken. For

Read More
When Trusted Apps Become Threat Vectors: Salesforce OAuth Breach Explained

When Trusted Apps Become Threat Vectors: Salesforce OAuth Breach Explained

Based on reporting from Cybersecurity Dive, August 21, 2025. In a newly disclosed campaign attributed to threat actor UNC6395, multiple Salesforce instances were breached through the compromise of OAuth tokens used by a third-party app, Drift. The attackers exploited these trusted tokens to harvest sensitive data from connected environments—including passwords, AWS keys, and Snowflake credentials—without

Read More
Malware Delivery Shifts: Malicious URLs Surpass Attachments as Top Threat Vector

Malware Delivery Shifts: Malicious URLs Surpass Attachments as Top Threat Vector

Cyber attackers have changed their tactics. According to a recent ITPro report, malicious URLs are now four times more common than infected email attachments when it comes to delivering malware. This shift has serious implications for defenders, especially as phishing techniques evolve to exploit trust and emerging communication channels. The Rise of Link-Based Attacks In

Read More
Global Cybersecurity Spending to Hit $213 Billion in 2025—What’s Fueling the Surge

Global Cybersecurity Spending to Hit $213 Billion in 2025—What’s Fueling the Surge

Global spending on cybersecurity is projected to soar to $213 billion in 2025, up from $193 billion in 2024, according to Gartner, as reported by ITPro. Forecasts show continued momentum with spending expected to reach $240 billion by 2026. What’s Driving the Increase? The surge in investment is being driven by three main factors: 1. Expanding Threat Landscape

Read More
Supply Chain Under Scrutiny: Asia’s New Cybersecurity Mandates for Vendors

Supply Chain Under Scrutiny: Asia’s New Cybersecurity Mandates for Vendors

A wave of cyberattacks across Asia is pushing organizations to take a harder line on supplier cybersecurity. According to Dark Reading, both public and private sector organizations are beginning to mandate stronger risk controls from vendors—marking a notable shift in regional cybersecurity expectations. In Japan, Kioxia Holdings, a major chipmaker, plans to roll out automated

Read More
The U.S. Becomes the Global Epicenter of Ransomware—Now What?

The U.S. Becomes the Global Epicenter of Ransomware—Now What?

A recent report from TechRadar Pro reveals that the United States is now the most targeted country in the world for ransomware attacks, accounting for nearly 50% of all reported incidents globally in the first half of 2025. According to data shared by threat intelligence firm Malwarebytes, this marks a 146% increase in ransomware activity

Read More
Tool Overload Is Fueling Alert Fatigue, and Missed Threats, for MSPs

Tool Overload Is Fueling Alert Fatigue, and Missed Threats, for MSPs

A new CSO Online report based on research by Heimdal and FutureSafe paints a troubling picture for the managed services industry: 89% of MSPs struggle with integrating their security tools, and more than half (56%) experience daily or weekly alert fatigue. Even more concerning, MSPs juggling seven or more security tools reported almost double the

Read More
Akira and Lynx Ransomware Surge: A Wake-Up Call for MSPs and Their Clients

Akira and Lynx Ransomware Surge: A Wake-Up Call for MSPs and Their Clients

Two ransomware groups—Akira and Lynx—are accelerating attacks at a scale that has captured the attention of both enterprises and managed service providers (MSPs). According to ChannelPro, the groups have claimed hundreds of victims across multiple sectors, exploiting stolen administrative credentials and leveraging Ransomware-as-a-Service (RaaS) models to expand their reach. Their tactics highlight a growing concern

Read More
UK to Ban Ransom Payments by Public Bodies: A Turning Point in Cyber Risk Policy

UK to Ban Ransom Payments by Public Bodies: A Turning Point in Cyber Risk Policy

The Guardian reports that the UK government has announced plans to ban public sector organizations—including the NHS, local councils, and schools—from paying ransomware demands. Under these proposals: Policy Shift: Bold Intent, Real-World Challenges On its face, the policy is a strong move to disrupt ransomware’s criminal profitability. However, it also underscores a longstanding debate in

Read More
SoupDealer Malware Targets Turkey — and Evades Major Detection Tools

SoupDealer Malware Targets Turkey — and Evades Major Detection Tools

A newly uncovered malware campaign in Turkey is raising alarms across the cybersecurity community. SoupDealer, a sophisticated Java-based loader, has been deployed in targeted attacks that bypassed every public sandbox, antivirus engine, and enterprise EDR/XDR tested against it. As reported by Cyber Security News, SoupDealer uses selective targeting—activating only when specific system language, location, and

Read More
What Salt Typhoon Teaches Us About Modern Threat Actors — and Why Detection Must Evolve

What Salt Typhoon Teaches Us About Modern Threat Actors — and Why Detection Must Evolve

In July 2025, the U.S. government publicly attributed a series of stealthy cyber operations to Salt Typhoon, a threat actor linked to the People’s Republic of China. According to CyberScoop, the group—also known as APT40—has been quietly targeting government agencies, critical infrastructure, and private enterprises through living-off-the-land techniques that evade traditional defenses. This announcement isn’t

Read More
New Data Confirms: 85% of Mid-Market Orgs Now Depend on MSPs for Security

New Data Confirms: 85% of Mid-Market Orgs Now Depend on MSPs for Security

Cybersecurity is no longer a back-office IT function—it’s a board-level priority, especially in the mid-market. New data from ITPro shows that 85% of mid-sized enterprises now rely on MSPs for cybersecurity services, and nearly all (92%) are open to paying more for advanced offerings like AI-powered threat detection and zero-trust architecture. For managed service providers

Read More
Polyworking, Gen Z, and the New Insider Threat: What Security Teams Need to Know

Polyworking, Gen Z, and the New Insider Threat: What Security Teams Need to Know

The modern workforce is undergoing a quiet transformation. According to SecurityWeek, as Gen Z professionals enter the job market, many are bringing with them a new approach to employment—polyworking, or juggling multiple jobs, gigs, or income streams at once. This trend is accelerating in digital-first industries, where side hustles, freelance work, and contract roles are

Read More
Nation-State Ransomware as a Service? What MSPs and Enterprises Need to Know About Pay2Key’s Return

Nation-State Ransomware as a Service? What MSPs and Enterprises Need to Know About Pay2Key’s Return

In early July, researchers uncovered a troubling development in the ransomware landscape: the reemergence of Pay2Key, a ransomware-as-a-service (RaaS) operation tied to the Iranian threat group known as Fox Kitten. Now rebranded and refactored as Pay2Key.I2P, this variant represents more than just another name on the threat radar—it’s a blueprint for how nation-state actors are

Read More
How Netgain’s CISO Uses Seceon to Scale Smart, Proactive Security

How Netgain’s CISO Uses Seceon to Scale Smart, Proactive Security

When you’re responsible for cybersecurity across dozens of regulated client environments, traditional tools—and traditional thinking—simply don’t scale. That’s the challenge Kshitij Kathuria, CISO of Netgain Technology, set out to solve. At Seceon’s Innovation & Certification Days, Kathuria shared how his team transformed its security operations using Seceon’s AI-powered platform to deliver streamlined, proactive protection—without increasing

Read More
How Logically Scaled Cybersecurity with Seceon: A Conversation with CEO Joshua Skeens

How Logically Scaled Cybersecurity with Seceon: A Conversation with CEO Joshua Skeens

At Seceon’s Q2 Innovation & Certification Days, one of the most anticipated sessions featured a fireside chat between Chandra Pandey, CEO of Seceon, and Josh Skeens, CEO of Logically, a leading MSSP serving organizations across sectors. Their conversation explored today’s most pressing cybersecurity challenges—scaling operations, preparing analysts for AI’s impact, and building lasting partnerships that

Read More
Partnering with Purpose: Gitesh Shah on Leadership, Trust, and Building the Future with Seceon

Partnering with Purpose: Gitesh Shah on Leadership, Trust, and Building the Future with Seceon

At Seceon’s Q2 Innovation & Certification Days, a standout moment came in the form of an open and sincere conversation between Seceon CEO Chandra Pandey and Gitesh Shah, Founder and CEO of Samay Infosolutions Pvt. Ltd. Their discussion reflected more than just business alignment—it highlighted the human side of cybersecurity leadership and the real-world value

Read More
Emerging Cyber Threats to MSPs & Enterprises: Key Takeaways from Seceon Innovation & Certification Days

Emerging Cyber Threats to MSPs & Enterprises: Key Takeaways from Seceon Innovation & Certification Days

As cybersecurity leaders look to the second half of 2025, it’s clear that defending modern infrastructure is no longer just about blocking malware or patching systems—it’s about keeping pace with a threat landscape that’s evolving faster than most organizations can respond. During Seceon’s Innovation & Certification Days, I had the opportunity to present insights drawn

Read More
From Raw Data to Real Decisions: How Seceon and Obviam Are Empowering CISOs with Outcome-Driven Metrics

From Raw Data to Real Decisions: How Seceon and Obviam Are Empowering CISOs with Outcome-Driven Metrics

Live from the Gartner Security & Risk Management Summit 2025, Seceon’s Shikha Pandey caught up with Obviam’s EVP Keith Johnson to discuss a major shift in cybersecurity leadership: the move toward outcome-driven metrics as the new standard for evaluating cybersecurity effectiveness. According to Keith, one recurring theme from the Gartner sessions was clear: CISOs are

Read More
Chandra Pandey on Why Unified Security and AI Are the Future of Cyber Resilience

Chandra Pandey on Why Unified Security and AI Are the Future of Cyber Resilience

In a recent interview with Tahawultech at GISEC Global 2025, Seceon Founder and CEO Chandra Shekhar Pandey shared his perspective on what cybersecurity needs most in this era of AI-driven threats: clarity, automation, and true platform unification. A Vision for Simplicity and Speed During the interview, Chandra outlined one of Seceon’s core beliefs: cybersecurity should

Read More
AI Is Supercharging Cybercrime — Here’s Why Threat Detection Needs to Evolve

AI Is Supercharging Cybercrime — Here’s Why Threat Detection Needs to Evolve

A new report published by Express Computer highlights a dramatic shift in the Indian cybersecurity landscape: AI is now powering a surge of faster, stealthier cyberattacks. Based on a survey by Fortinet and IDC of over 400 CISOs and CIOs across India, the findings reveal a pressing concern: organizations are facing a new generation of

Read More
Ransomware in the Supply Chain: What the DragonForce Attack Means for MSPs

Ransomware in the Supply Chain: What the DragonForce Attack Means for MSPs

In a recent report by BleepingComputer, DragonForce—a rapidly rising ransomware group—breached a managed service provider (MSP) and leveraged its SimpleHelp remote monitoring and management (RMM) platform to infiltrate downstream customers. Sophos, which investigated the attack, attributes the breach to a string of known SimpleHelp vulnerabilities (CVE-2024-57726 through CVE-2024-57728). Once inside, DragonForce actors conducted network reconnaissance,

Read More
ASUS Router Hijackings Highlight Urgent Need for Advanced Threat Detection and Response

ASUS Router Hijackings Highlight Urgent Need for Advanced Threat Detection and Response

Introduction: A Breach Beyond the EndpointA new campaign targeting ASUS routers has compromised more than 9,000 devices worldwide, exposing a hidden weakness in many organizations’ security strategies: insufficient visibility and control at the edge. The attack, dubbed ViciousTrap, exploits CVE-2023-39780—a command injection vulnerability—to deploy malware that persists even after reboots and firmware updates. (Cybersecurity Dive)

Read More
The Hidden Cost of Ignoring Threat Hunting: 184M Passwords Leaked

The Hidden Cost of Ignoring Threat Hunting: 184M Passwords Leaked

A New Class of Threat SurfacesA newly discovered, unsecured database containing over 184 million login credentials—including usernames and passwords for Google, Apple, Microsoft, Facebook, Instagram, government portals, and financial services—has brought the silent epidemic of infostealer malware into sharp focus. According to Mashable, cybersecurity researcher Jeremiah Fowler uncovered the 47GB database online, completely unprotected by

Read More
Spearphishing CFOs: The Rising Threat of Executive-Level Cyberattacks

Spearphishing CFOs: The Rising Threat of Executive-Level Cyberattacks

Introduction: A New Target for Cybercriminals A recent report by Trellix highlights a sophisticated spearphishing campaign targeting financial executives, including CFOs, at banks, investment firms, energy utilities, and insurance companies worldwide. The attackers employ well-crafted emails containing installers for remote-access tools, notably NetBird, allowing them to gain persistent access to victims’ systems. With such access,

Read More
Why Zscaler’s Acquisition of Red Canary Matters to Your Cybersecurity Strategy

Why Zscaler’s Acquisition of Red Canary Matters to Your Cybersecurity Strategy

One of the most talked-about developments in cybersecurity this month is Zscaler’s acquisition of Red Canary, a move that highlights a larger industry trend: the growing demand for unified, automated security platforms that accelerate threat detection and response. But what does this really mean for security teams looking to stay ahead of ransomware, advanced threats,

Read More
Adidas Data Breach Highlights Third-Party Risks: Why AI-Based Cybersecurity Solutions Are Essential

Adidas Data Breach Highlights Third-Party Risks: Why AI-Based Cybersecurity Solutions Are Essential

On May 23, Adidas disclosed a data breach resulting from a cyberattack on a third-party customer service provider, exposing sensitive customer information in multiple regions, including the U.S. and Europe. While Adidas did not name the vendor involved, the company emphasized that the breach impacted “a few million individuals,” and included data such as contact

Read More
Dior Cyber Attack Exposes Retail Vulnerabilities: Why Threat Detection and Response Must Be a Priority

Dior Cyber Attack Exposes Retail Vulnerabilities: Why Threat Detection and Response Must Be a Priority

Luxury fashion giant Dior has confirmed a cyberattack that compromised customer data in parts of Asia. The breach, discovered on May 7, impacted customers in China and South Korea, with attackers gaining unauthorized access to personal information, including names, contact details, and product preferences. According to ITPro, no financial data, such as banking or credit

Read More
Over 1.5 Million Indian Websites Targeted in Coordinated Attacks

Over 1.5 Million Indian Websites Targeted in Coordinated Attacks

In a significant escalation of cyber warfare, over 1.5 million Indian websites have been targeted in a series of coordinated cyberattacks attributed to seven Advanced Persistent Threat (APT) groups, primarily based in Pakistan. These attacks, following the Pahalgam terror strike and India’s subsequent Operation Sindoor, aimed at critical infrastructure and government websites across the country.

Read More
Navigating the Digital Seas: Addressing Cybersecurity Challenges in Maritime Shipping

Navigating the Digital Seas: Addressing Cybersecurity Challenges in Maritime Shipping

The maritime industry is undergoing a significant digital transformation, integrating advanced technologies to enhance efficiency and connectivity. However, this digital evolution brings forth escalating cybersecurity risks that cannot be overlooked. The Rising Tide of Cyber Threats A recent report by Thetius highlights the increasing vulnerability of maritime operations to cyber threats, while the Allianz Risk

Read More
Qatar National Bank Breach Explained: How the Attack Happened and What’s Next

Qatar National Bank Breach Explained: How the Attack Happened and What’s Next

In a significant cybersecurity incident, Qatar National Bank (QNB), Trend Micro reports that one of the Middle East’s largest financial institutions, suffered a data breach attributed to the Turkish hacker group Bozkurt Hackers. The attackers leaked a 1.5-gigabyte file containing sensitive customer information, including bank credentials, payment card details, and personal data.  The Breach Details

Read More
Cyberattacks on Long Island Schools Highlight Growing Threat

Cyberattacks on Long Island Schools Highlight Growing Threat

In a concerning development, over 20 school districts across Long Island have fallen victim to cyberattacks, compromising the personal data of more than 10,000 students. According to state education records, 28 incidents were reported in 2024 alone, affecting districts such as Great Neck, Smithtown, Brentwood, and Hewlett-Woodmere. New York Post+1New York Post+1 The Nature of

Read More
Retail in the Crosshairs: The M&S Data Breach and the Rising Cost of Customer Trust

Retail in the Crosshairs: The M&S Data Breach and the Rising Cost of Customer Trust

Retail giant Marks & Spencer (M&S) has confirmed that customer information was compromised in a recent cyberattack involving one of its third-party service providers. According to Reuters, the breach did not impact M&S’s internal systems but still resulted in the exposure of sensitive customer data. The incident is the latest in a series of supply

Read More
“Dance of the Hillary” and the Expanding Use of Malware in Regional Cyber Conflict

“Dance of the Hillary” and the Expanding Use of Malware in Regional Cyber Conflict

A recent advisory from the Punjab Police’s cybercrime wing warns of a new wave of malware attacks potentially originating from Pakistan, with a tool known as “Dance of the Hillary” at the center of the campaign. Targeting users through phishing links and malicious attachments, this strain of malware is designed to steal sensitive data and

Read More
Operation Sindoor Fallout: Lessons from the Mass Website Defacement Campaign

Operation Sindoor Fallout: Lessons from the Mass Website Defacement Campaign

A recent cyber onslaught has drawn global attention: more than 1.5 million Indian websites were defaced or disrupted in retaliation for the alleged “Operation Sindoor,” a reported counterterrorism operation. According to The Times of India, this large-scale campaign has been attributed to at least seven Pakistani hacker groups, including names like Team Insane PK and

Read More
Cybersecurity for Critical Infrastructure in the Middle East: Why a Proactive, AI-Driven Approach Is Essential

Cybersecurity for Critical Infrastructure in the Middle East: Why a Proactive, AI-Driven Approach Is Essential

Across the Middle East, energy providers, utilities, telecoms, and transportation systems form the backbone of national infrastructure. As these services digitize, integrate with cloud platforms, and rely more heavily on data, they also become attractive—and vulnerable—targets for cyber attackers. In 2024 alone, cybersecurity authorities in the UAE and across the region reported a sharp increase

Read More
Cybersecurity in Middle Eastern Healthcare: Protecting Patients in a Digital Age

Cybersecurity in Middle Eastern Healthcare: Protecting Patients in a Digital Age

The Middle East’s healthcare sector is undergoing rapid digital transformation. From electronic health records (EHRs) and telemedicine to Internet of Medical Things (IoMT) devices and cloud-based diagnostics, hospitals and healthcare providers are embracing innovation to improve outcomes and expand access. But with every new connection comes a new vulnerability. Cybercriminals are increasingly targeting healthcare institutions,

Read More
Securing the Middle East’s Financial Future: AI-Driven Cybersecurity for BFSI

Securing the Middle East’s Financial Future: AI-Driven Cybersecurity for BFSI

The Banking, Financial Services, and Insurance (BFSI) sector across the Middle East is evolving at an unprecedented pace. From mobile apps and digital wallets to AI-driven wealth management, financial institutions are embracing innovation to serve a growing, tech-savvy customer base. However, with this digital growth comes increased exposure to cyber threats. Recent findings from the

Read More
RSAC 2025 Recap: Why the Future of Cybersecurity Belongs to Unified Platforms

RSAC 2025 Recap: Why the Future of Cybersecurity Belongs to Unified Platforms

The RSAC Conference 2025 marked a pivotal shift in the cybersecurity industry’s collective mindset. From C-level leaders to frontline practitioners, there was a growing acknowledgment of what many have quietly known for years: the fragmented “best-of-breed” security stack is no longer enough. As threats grow more complex and attack surfaces expand, so too must the

Read More
Global Perspective: A GITEX Attendee Shares His Experience with Seceon

Global Perspective: A GITEX Attendee Shares His Experience with Seceon

At GITEX Global, one of the largest and most influential technology events in the world, Seceon had the pleasure of connecting with cybersecurity professionals from around the globe. Among the many insightful conversations at our booth, one in particular stood out. Mamadou KOR, CISO at BNDE (Banque Nationale pour le Développement Economique), stopped by to

Read More
Google’s $32 Billion Wiz Acquisition: What It Means for Cloud Security — and What It Doesn’t

Google’s $32 Billion Wiz Acquisition: What It Means for Cloud Security — and What It Doesn’t

In a bold move that’s shaking up the cybersecurity industry, Google announced its intent to acquire cloud security unicorn Wiz for $32 billion—one of the largest cybersecurity acquisitions in history. The deal has drawn widespread attention not just for its size, but for what it signals about the future of cloud security, competition in the

Read More
23andMe Data Breach: A Wake-Up Call for Consumer Privacy and Corporate Accountability

23andMe Data Breach: A Wake-Up Call for Consumer Privacy and Corporate Accountability

In recent months, the fallout from the 23andMe data breach has offered a sobering reminder of the real-world implications of poor data security—and the profound responsibility companies bear when entrusted with sensitive consumer information. In October 2023, 23andMe, one of the most well-known consumer genetic testing companies, disclosed a significant breach that affected nearly 7

Read More
Why Volume-Based Data Ingestion is Failing the Fight Against Modern Cyber Threats

Why Volume-Based Data Ingestion is Failing the Fight Against Modern Cyber Threats

The cybersecurity threat landscape has fundamentally changed. Attackers have become stealthier, more strategic, and increasingly reliant on automation and AI. Yet, many organizations—particularly MSPs and MSSPs supporting small and mid-market businesses—are still relying on security tools priced and architected for a different era. One of the biggest constraints holding back effective threat detection and response?

Read More
Beware of Fake CAPTCHA Scams: How Cybercriminals Are Hijacking Your Clipboard to Steal Data

Beware of Fake CAPTCHA Scams: How Cybercriminals Are Hijacking Your Clipboard to Steal Data

In a recent surge of sophisticated cyber threats, attackers are exploiting fake CAPTCHA verifications to hijack users’ clipboards, leading to the installation of information-stealing malware. According to Malwarebytes, these deceptive tactics highlight the critical need for robust cybersecurity measures to protect both individuals and organizations. Understanding the Threat Cybercriminals have developed malicious websites that mimic

Read More
Expanding Seceon’s Reach: A Strategic Partnership with Tech First Gulf

Expanding Seceon’s Reach: A Strategic Partnership with Tech First Gulf

At Seceon’s 2025 Q1 Innovation and Certification Days, Khaled Al Najjar of Seceon engaged in an insightful discussion with Tech First Gulf (TFG) leaders Ram Reddy, Dolly Lakhani, and Pratik Patel about their partnership and the expansion of Seceon’s cybersecurity solutions across the Middle East, Africa, and India. The conversation highlighted the growing demand for

Read More
Seceon’s AI-Driven Cybersecurity: Insights from Bhabani Prasad, Deeptesh Chandra, and German Moreno

Seceon’s AI-Driven Cybersecurity: Insights from Bhabani Prasad, Deeptesh Chandra, and German Moreno

At Seceon’s 2025 Q1 Innovation and Certification Days, Seceon’s Bhabani Prasad engaged in a conversation with cybersecurity experts Deeptesh Chandra and German Moreno about the evolving threat landscape and how Seceon’s AI-powered platform is setting new standards in cybersecurity. The discussion explored Seceon’s competitive strengths, AI-driven threat prevention, and the platform’s ability to consolidate multiple

Read More
Unlocking New Revenue Streams and Scalability with Seceon MT-MT

Unlocking New Revenue Streams and Scalability with Seceon MT-MT

Expanding MSSP Capabilities with Multi-Tenant, Multi-Tier Architecture The cybersecurity landscape is evolving rapidly, and Managed Security Service Providers (MSSPs) are under constant pressure to deliver robust, scalable, and cost-effective security solutions. As cyber threats grow more sophisticated, MSSPs need a solution that not only safeguards their customers but also enhances operational efficiency and revenue potential.

Read More
Seceon’s Impact on African MSSPs: A Conversation with Chandra Pandey, Mark van Vuuren, Morné Toblanche, and Rudy Davidez

Seceon’s Impact on African MSSPs: A Conversation with Chandra Pandey, Mark van Vuuren, Morné Toblanche, and Rudy Davidez

At Seceon’s 2025 Q1 Innovation and Certification Days, Seceon CEO Chandra Pandey joined premier African MSSP partners Mark van Vuuren, Morné Toblanche, and Rudy Davidez to discuss how Seceon’s cybersecurity platform has transformed security operations in the region. The Growing Demand for MSSP Cybersecurity Solutions in Africa Toblanche emphasized that Seceon’s platform has been instrumental

Read More
Leveraging AI to Stay Ahead in Cybersecurity: A Conversation with Chandra Pandey and Joshua Skeens, CEO of Logically 

Leveraging AI to Stay Ahead in Cybersecurity: A Conversation with Chandra Pandey and Joshua Skeens, CEO of Logically 

At Seceon’s 2025 Q1 Innovation and Certification Days, Seceon CEO Chandra Pandey and Joshua Skeens, CEO of Seceon’s partner Logically (www.logically.com) engaged in an insightful discussion about AI’s transformative role in cybersecurity. As cyber threats become increasingly AI-driven, organizations must evolve their security strategies to stay ahead of attackers. The Growing AI Threat Landscape Skeens

Read More
How ESW IT Built Lasting Success with Seceon’s Cybersecurity Platform

How ESW IT Built Lasting Success with Seceon’s Cybersecurity Platform

Our team at Seceon is deeply aware that MSPs and MSSPs need solutions that not only enhance security but also simplify operations. At Seceon’s 2025 Q1 Innovation and Certification Days, our VP George Fisher sat down with our partner Dan Driezen of ESW IT to discuss how his organization has leveraged Seceon’s platform to provide

Read More

Categories

Seceon Inc
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.