Month: December 2022

Cloud security will finally be in the spotlight for 2023

Cloud security will finally be in the spotlight for 2023

After more than a decade of varying levels of irrational exuberance in terms of deploying application workloads in the cloud, there is now a greater appreciation for cloud security. In fact, a survey of 350 IT leaders from large enterprises...

/ December 20, 2022
MSPs under greater scrutiny in financial services sector

MSPs under greater scrutiny in financial services sector

The financial services market used to be dominated by legacy banks, limiting the role of MSPs. However, as more direct-to-consumer financial services become available outside traditional banking (online banks, cash advances, brokerages, etc.), MSPs are seeing increased demand for their...

/ December 19, 2022
Tech Time Warp: The Kriz virus was no Kris Kringle

Tech Time Warp: The Kriz virus was no Kris Kringle

Even cybercriminals get into the holiday spirit. Over the years, network administrators have dealt with the likes of the CHRISTMA EXEC, the Father Christmas worm, and the Santy worm when they would have rather been drinking eggnog. In December 2000,...

/ December 16, 2022
Demystifying Barracuda XDR with Shani Mahler

Demystifying Barracuda XDR with Shani Mahler

The evolving cyberthreat landscape and the volume of cyberattacks have heightened the need for MSPs to adopt a holistic cybersecurity approach to provide the protection their customers need. The emergence of XDR (eXtended visibility, Detection & Response) has become a...

/ December 15, 2022
Cybersecurity Threat Advisory: Apple zero-day vulnerability

Cybersecurity Threat Advisory: Apple zero-day vulnerability

This week, Apple has released security updates to iOS, iPadOS, macOS, tvOS, and Safari web browser to address a new zero-day vulnerability that could result in the execution of malicious code. This vulnerability could potentially allow threat actors to bypass...

/ December 15, 2022
MSPs need to lean into zero-trust IT

MSPs need to lean into zero-trust IT

There’s a lot of hype surrounding zero-trust IT as a buzzword, but at the most fundamental level it’s all about ensuring security based on a known identity of an end user, application, or device. Forrester Research analyst John Kindervag is...

/ December 14, 2022
Cybersecurity Threat Advisory: Citrix Zero-Day Vulnerability

Cybersecurity Threat Advisory: Citrix Zero-Day Vulnerability

Today, Citrix has released a critical security update to address a zero-day vulnerability. Upon a successful exploitation, an unauthenticated remote attacker could perform code execution leading to system takeover. Both Citrix and the NSA stated they are aware of targeted...

/ December 13, 2022
Cybersecurity Threat Advisory: New FortiOS patches available

Cybersecurity Threat Advisory: New FortiOS patches available

Today, Fortinet disclosed information regarding a vulnerability that allows a remote attacker to execute code without authentication. The vulnerability, tracked as CVE-2022-42475, has a severity score of 9.3. Fortinet mentioned that they are aware of an instance where it has...

/ December 12, 2022
End-of-year “office cyber-cleaning”

End-of-year “office cyber-cleaning”

The end of the year is an opportune time for MSPs to do some office “cyber-cleaning” for clients. But what exactly is an “office cyber-cleaning?” “Cyber-cleaning is the fortification of office space to make them as immune from cyberattacks as...

/ December 12, 2022
Pioneers in Tech: John Backus makes programming accessible with FORTRAN

Pioneers in Tech: John Backus makes programming accessible with FORTRAN

If you ever feel like the chips are down, consider the story of A.M. Turing Award recipient John Backus, who overcame academic difficulties, expulsion due to poor attendance, and a cranial bone tumor to develop the ground-breaking FORTRAN programming language....

/ December 9, 2022