Month: August 2022
Cybersecurity Threat Advisory: Palo Alto PAN-OS vulnerability
This week, Palo Alto released a patch for PAN-OS’ vulnerability (CVE-2022-0028). This vulnerability is actively being targeted by threat actors. Firewalls running PAN-OS could permit an attacker to perform a Denial-of-Service (DoS) attack. Barracuda MSP recommends updating affected Palo Alto...
A look at back-to-school cyberthreats
As we discussed last week, back-to-school brings out hackers and cybercriminals. This week we’ll look at some of the specific threats that schools, educators, and even students face this year and what MSPs can to do help protect their education...
MSP marketing part 2: Maneuver marketing
In Part 1 of this mini-series on MSP marketing, we looked at attrition marketing, the most basic form of marketing MSP services. Now in Part 2, we’ll take a trip in the world of maneuver marketing using the example of...
Pioneers in Tech: Mina Rees, a mid-century technology trailblazer
Like so many “pioneers in tech,” Mina Rees did not let much dissuade her from her ultimate goals. Born Aug. 2, 1902, in Cleveland, Ohio, Rees grew up in New York City. After graduating summa cum laude from Hunter College...
MSSPs will be at forefront of wave of security platform consolidation
Managed security services providers (MSSPs) are going to soon be at the forefront of a wave of consolidation of cybersecurity platforms as more organizations not only look to reduce overall costs but also streamline security operations. A survey of 280...
Cutting through the complexity of MSP profitability
Do you know if any of your customers are losing you money? It is often reported that any organisation’s profits follow the Pareto principle: 80 percent the profits come from the top 20 percent of the customers. Although this is...
Hackers head back to school
Every August, across the United States orange school buses rumble from their summer slumber, school cafeteria workers put on their hairnets and march back into the kitchen, and students grab their backpacks and books and make their way to their...
Zero Trust, XDR, and digital transformation: Interview with Fleming Shi
For anyone involved in tech and security, it’s hard to avoid a blizzard of messaging and advertising around Zero Trust Network Access (ZTNA) and Extended Detection and Response (XDR). But it can be remarkably difficult to understand exactly what a...
Tech Time Warp: The truth about shatter attacks
In this week’s Tech Time Warp, we’re looking back at August 2002, when security researcher Kristin Paget published a whitepaper on the dangers of “shatter attacks,” and Microsoft had more than a few quibbles with it.
Confidential computing starts to gain traction in the cloud
A survey of 452 IT and security professionals conducted by the Cloud Service Alliance (CSA) finds more than a quarter of organizations (27 percent) surveyed are already using confidential computing platforms to better protect data, with another 55 percent planning...