Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance

Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance

WATERLOO, ONTARIO and EDEN PRAIRIE, MINNESOTA – December 16, 2024 – Arctic Wolf® and BlackBerry Limited (NYSE: BB; TSX:BB), two global leaders in security software and services, today announced they have entered into a definitive agreement for Arctic Wolf to acquire BlackBerry’s Cylance® endpoint security assets. Cylance is the pioneer of AI-based endpoint protection trusted by thousands of organizations around the world. With this acquisition, Arctic Wolf ushers in a new era of simplicity, flexibility, and outcomes to the endpoint security market, delivering the security operations results customers have been asking for.

Understanding the Anatomy of a Breach and How to Protect Your Firm

Understanding the Anatomy of a Breach and How to Protect Your Firm

Join Cornerstone.IT & Arctic Wolf, ILTA technology leaders, for an engaging and informative session as we discuss the cybersecurity landscape and how to ensure you are being proactive with your firm’s security posture in 2025. As cyberattacks continue to evolve, it’s critical to understand the strategies bad actors use and how to protect sensitive client data and your firm’s reputation.

Cybersecurity Basics: How to Safeguard Your Firm in an Evolving Digital Landscape

Cybersecurity Basics: How to Safeguard Your Firm in an Evolving Digital Landscape

The digital world is constantly evolving and some parts of it are scary. What can a firm or company do to protect itself when it seems like the barbarians are constantly at the proverbial gate?

There are actually several basic steps you can do to protect your data and the data of your clients, not to mention your well-earned reputation.

Future-Proofing Your Law Firm: Key IT Investments for 2025

Future-Proofing Your Law Firm: Key IT Investments for 2025

As a law firm CIO or COO, planning your 2025 information technology budget involves anticipating future needs, addressing current challenges, and leveraging technology to enhance attorney productivity and security. Firms will need to continue to invest in their cloud migration and hybrid-work plans, but here are some other critical areas to focus on.

Why Do a Tech Assessment?

Why Do a Tech Assessment?

Whether you do them yourself or get some help, taking stock of your technology, your team’s skills and your processes is never a bad thing.  Many firms do them every few years as a self-check.  They help you identify gaps that need to be addressed and points the way to solutions that may not be evident until you see everything summarized in one place.

MOVEit Transfer Zero-day Vulnerabiity

MOVEit Transfer Zero-day Vulnerabiity

If you have been watching the vulnerability space, you know by now about the MOVEit utility security issues. Just today, the news is breaking that several US government agencies have been affected.

We are strongly encouraging everyone to remediate this risk.

Cornerstone.IT