Month: January 2026

3 must-know predictions shaping channel partner success in 2026

3 must-know predictions shaping channel partner success in 2026

As the channel partner and managed services landscape rapidly evolves, staying ahead of industry trends is more crucial than ever. Navigating the challenges and opportunities of 2026 will require MSPs and channel partners to anticipate technological shifts, enhance their offerings,...

/ January 19, 2026
Tech Time Warp: Happy 40th birthday to the National Center for Supercomputing Applications

Tech Time Warp: Happy 40th birthday to the National Center for Supercomputing Applications

Middle age looks good on this week’s Tech Time Warp, the National Center for Supercomputing Applications at the University of Illinois. The National Science Foundation opened NCSA on Jan. 15, 1986, in response to an unsolicited proposal from eight Illinois...

/ January 16, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Path traversal RCE in Gogs

Cybersecurity Threat Advisory: Path traversal RCE in Gogs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed active exploitation of a critical vulnerability in the self-hosted Git service Gogs, adding it to the Known Exploited Vulnerabilities (KEV) catalog. Federal Civilian Executive Branch agencies must apply mitigations or discontinue...

/ January 15, 2026
Report: Global managed services market to exceed $1 trillion by 2035

Report: Global managed services market to exceed $1 trillion by 2035

A new report from Market Research Future (MRFR) projects that the managed services market in North America will grow at a CAGR of 7.18 percent between 2025 and 2035, reaching $419.7 billion, up from $209.9 billion in 2025. Globally, the...

/ January 15, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: ServiceNow AI Platform vulnerability

Cybersecurity Threat Advisory: ServiceNow AI Platform vulnerability

ServiceNow has revealed details of a critical vulnerability—now patched—in its AI Platform that could allow an unauthenticated attacker to impersonate any user and execute actions with that user’s privileges. Review this Cybersecurity Threat Advisory now to mitigate your risk and...

/ January 15, 2026
Keeping pace in 2026: MSP essentials for success

Keeping pace in 2026: MSP essentials for success

Welcome to 2026. Are you excited to leave 2025 behind and embrace new opportunities, or do you feel apprehensive as uncertainties loom on the horizon? One thing is certain: 2026 will be challenging. The rapid pace of change—especially in AI—means...

/ January 14, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Urgent patch for Trend Micro RCE flaw

Cybersecurity Threat Advisory: Urgent patch for Trend Micro RCE flaw

Trend Micro has released security updates addressing multiple vulnerabilities in on-premises versions of Apex Central. The most critical issue, CVE-2025-69258 with a CVSS score of 9.8, is a remote code execution vulnerability in LoadLibraryEX. Two other vulnerabilities, CVE-2025-69259 with a...

/ January 14, 2026
Tip Tuesday: How to perform a compliance gap analysis for your MSP clients

Tip Tuesday: How to perform a compliance gap analysis for your MSP clients

Compliance gap analysis is a strategic tool that reduces risk across your client’s environments. By identifying where actual practices fall short of regulatory or contractual standards, you get a clearer picture of their operational vulnerabilities. These gaps often point to...

/ January 13, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Unauthenticated RCE vulnerability in n8n

Cybersecurity Threat Advisory: Unauthenticated RCE vulnerability in n8n

A severe unauthenticated remote code execution (RCE) vulnerability nicknamed “Ni8mare” has been discovered in the n8n workflow automation platform. This flaw, tracked as CVE-2026-21858, allows attackers to take full control of vulnerable n8n instances without needing credentials. Read this Cybersecurity Threat...

/ January 12, 2026
Threat Spotlight: How phishing kits evolved in 2025

Threat Spotlight: How phishing kits evolved in 2025

In 2025, 90 percent of high-volume phishing campaigns leveraged Phishing-as-a-Service (PhaaS) kits. These kits have transformed the phishing landscape, enabling even less-skilled cybercriminals to access advanced tools and automation and launch large-scale, targeted phishing campaigns, often impersonating legitimate services and...

/ January 12, 2026