Month: August 2022

MSP marketing part 2: Maneuver marketing

MSP marketing part 2: Maneuver marketing

In Part 1 of this mini-series on MSP marketing, we looked at attrition marketing, the most basic form of marketing MSP services. Now in Part 2, we’ll take a trip in the world of maneuver marketing using the example of...

/ August 15, 2022
Pioneers in Tech: Mina Rees, a mid-century technology trailblazer

Pioneers in Tech: Mina Rees, a mid-century technology trailblazer

Like so many “pioneers in tech,” Mina Rees did not let much dissuade her from her ultimate goals. Born Aug. 2, 1902, in Cleveland, Ohio, Rees grew up in New York City. After graduating summa cum laude from Hunter College...

/ August 12, 2022
MSSPs will be at forefront of wave of security platform consolidation

MSSPs will be at forefront of wave of security platform consolidation

Managed security services providers (MSSPs) are going to soon be at the forefront of a wave of consolidation of cybersecurity platforms as more organizations not only look to reduce overall costs but also streamline security operations. A survey of 280...

/ August 11, 2022
Cutting through the complexity of MSP profitability

Cutting through the complexity of MSP profitability

Do you know if any of your customers are losing you money? It is often reported that any organisation’s profits follow the Pareto principle: 80 percent the profits come from the top 20 percent of the customers.  Although this is...

/ August 10, 2022 / 1 Comment
Hackers head back to school

Hackers head back to school

Every August, across the United States orange school buses rumble from their summer slumber, school cafeteria workers put on their hairnets and march back into the kitchen, and students grab their backpacks and books and make their way to their...

/ August 9, 2022
Zero Trust, XDR, and digital transformation: Interview with Fleming Shi

Zero Trust, XDR, and digital transformation: Interview with Fleming Shi

For anyone involved in tech and security, it’s hard to avoid a blizzard of messaging and advertising around Zero Trust Network Access (ZTNA) and Extended Detection and Response (XDR). But it can be remarkably difficult to understand exactly what a...

/ August 8, 2022
Tech Time Warp: The truth about shatter attacks

Tech Time Warp: The truth about shatter attacks

In this week’s Tech Time Warp, we’re looking back at August 2002, when security researcher Kristin Paget published a whitepaper on the dangers of “shatter attacks,” and Microsoft had more than a few quibbles with it.

/ August 5, 2022
Confidential computing starts to gain traction in the cloud

Confidential computing starts to gain traction in the cloud

A survey of 452 IT and security professionals conducted by the Cloud Service Alliance (CSA) finds more than a quarter of organizations (27 percent) surveyed are already using confidential computing platforms to better protect data, with another 55 percent planning...

/ August 4, 2022 / 6 Comments
IBM’s Annual Cost of Breach Report shows rising risks

IBM’s Annual Cost of Breach Report shows rising risks

As a self-professed cybersecurity data nerd, I look forward each year to IBM’s annual Cost of Data Breach report. It’s a “fun” read if you like this sort of thing. And just in time for summer beach reading, the report...

/ August 3, 2022
Why MSPs are attractive cyberattack targets

Why MSPs are attractive cyberattack targets

Once again, government watchdogs have issued an alert to managed service providers (MSPs), encouraging them to implement new security guidance in response to increasing levels of cyberattacks. MSPs are a prime target for cybercriminals – they have direct access to...

/ August 2, 2022