Month: November 2023
The dawn of real-time defense: security transformation in the 2000s
As part of our 5-part series on the evolution of cybersecurity, check out our third article below that covers how the beginning of the 21st century witnessed a relentless battle between cybercriminals and security experts, fueled by the rapid evolution of...
The race to deliver managed generative AI services is on
While there is a massive amount of interest in all things relating to generative artificial intelligence (AI), the number of organizations that have the skills and resources required to fully exploit it remains limited. Under the hood of generative AI...
Pioneers in Tech: Gene Amdahl, “father” of mainframe computing
When you walk around with a computer in your hand or on your wrist, it’s easy to forget how much of the world still runs on mainframe computers. In this Pioneers in Tech, we look at how an estimated 10,000...
Becoming a smarter MSP with AI-powered automation
The problem with being a ‘smarter’ MSP is that it may often require investment. For those who don’t have a rainy day fund set aside, it would mean dipping into the revenue to stay competitive and maintain margin, which can...
Utilizing news resources as a cybersecurity tool
One of the best cybersecurity tools isn’t fancy software or a skilled engineer (both of which are important and have their place). Instead, it is something that doesn’t even cost a cent: news and information. “I work with a lot...
Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities
Several serious security flaws have been found in the Veeam ONE platform for analytics and IT infrastructure monitoring. These vulnerabilities may result in data breaches, illegal access, and NTLM hash theft. To fix these problems, Veeam has published security patches...
Cybersecurity Threat Advisory: HelloKitty group targets Apache
This Cybersecurity Threat Advisory discusses a new critical security flaw that was discovered in the Apache ActiveMQ open-source message broker service. This security flaw can potentially result in remote code execution, which is currently being exploited by the HelloKitty ransomware...
Globalization of IT talent starts to contract
Not too long ago, more than a few managed service providers (MSPs) would hire IT talent anywhere they could find affordable resources. But in the current geopolitical climate, those options are severely constrained. The biggest impact has been the result...
Tech Time Warp: Morris worm alerts the internet to cybersecurity risks
Back in 1988, the internet was a much smaller and friendlier place. No more than 100,000 computers were online, and no one considered the need for precautions like firewalls. In this week’s Tech Time Warp, we will see where that...