Month: November 2023

security transformation
The dawn of real-time defense: security transformation in the 2000s

The dawn of real-time defense: security transformation in the 2000s

As part of our 5-part series on the evolution of cybersecurity, check out our third article below that covers how the beginning of the 21st century witnessed a relentless battle between cybercriminals and security experts, fueled by the rapid evolution of...

/ November 14, 2023
generative AI
The race to deliver managed generative AI services is on

The race to deliver managed generative AI services is on

While there is a massive amount of interest in all things relating to generative artificial intelligence (AI), the number of organizations that have the skills and resources required to fully exploit it remains limited. Under the hood of generative AI...

/ November 13, 2023
Pioneers in tech
Pioneers in Tech: Gene Amdahl, “father” of mainframe computing

Pioneers in Tech: Gene Amdahl, “father” of mainframe computing

When you walk around with a computer in your hand or on your wrist, it’s easy to forget how much of the world still runs on mainframe computers. In this Pioneers in Tech, we look at how an estimated 10,000...

/ November 10, 2023
Becoming a smarter MSP with AI-powered automation

Becoming a smarter MSP with AI-powered automation

The problem with being a ‘smarter’ MSP is that it may often require investment. For those who don’t have a rainy day fund set aside, it would mean dipping into the revenue to stay competitive and maintain margin, which can...

/ November 9, 2023
combatting cyberattacks
Utilizing news resources as a cybersecurity tool

Utilizing news resources as a cybersecurity tool

One of the best cybersecurity tools isn’t fancy software or a skilled engineer (both of which are important and have their place). Instead, it is something that doesn’t even cost a cent: news and information. “I work with a lot...

/ November 9, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities

Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities

Several serious security flaws have been found in the Veeam ONE platform for analytics and IT infrastructure monitoring. These vulnerabilities may result in data breaches, illegal access, and NTLM hash theft. To fix these problems, Veeam has published security patches...

/ November 8, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: HelloKitty group targets Apache

Cybersecurity Threat Advisory: HelloKitty group targets Apache

This Cybersecurity Threat Advisory discusses a new critical security flaw that was discovered in the Apache ActiveMQ open-source message broker service. This security flaw can potentially result in remote code execution, which is currently being exploited by the HelloKitty ransomware...

/ November 8, 2023
Globalization of IT talent starts to contract

Globalization of IT talent starts to contract

Not too long ago, more than a few managed service providers (MSPs) would hire IT talent anywhere they could find affordable resources. But in the current geopolitical climate, those options are severely constrained. The biggest impact has been the result...

/ November 7, 2023
5 best practices for MSP email security

5 best practices for MSP email security

Email remains the primary entry point for most cyberattacks, whether phishing, ransomware, social engineering scams, or business email compromise (BEC). According to data from Barracuda, 75 percent of organizations were the victim of a successful email attack in 2022, and...

/ November 6, 2023
Tech Time Warp: Morris worm alerts the internet to cybersecurity risks

Tech Time Warp: Morris worm alerts the internet to cybersecurity risks

Back in 1988, the internet was a much smaller and friendlier place. No more than 100,000 computers were online, and no one considered the need for precautions like firewalls. In this week’s Tech Time Warp, we will see where that...

/ November 3, 2023