Category: Featured

The talent strategy behind the most profitable IT service providers

The talent strategy behind the most profitable IT service providers

A global survey of IT services providers finds that the most profitable organizations tend to spend less on payroll by relying more heavily on junior staff to fulfill clearly defined roles. Conducted by Service Leadership, the survey also reveals that the...

/ March 19, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: FortiCloud SSO exploitation

Cybersecurity Threat Advisory: FortiCloud SSO exploitation

Threat actors are actively exploiting CVE‑2026‑24858 to log into FortiOS and other Fortinet products via FortiCloud SSO (when enabled), create persistent local admin accounts, and steal device configuration files. Review the Cybersecurity Threat Advisory now to protect you and your...

/ March 18, 2026
Why information security matters more than ever

Why information security matters more than ever

It’s all in the information. The first recorded patent was issued to Filippo Brunelleschi in Florence in 1421, covering his invention of a barge and crane used to transport marble. Shortly afterward in 1449, John of Utynam was issued a...

/ March 18, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Veeam Backup flaws

Cybersecurity Threat Advisory: Critical Veeam Backup flaws

Veeam has released critical security updates for its Backup & Replication product to address seven high‑severity vulnerabilities that could allow attackers to take over backup servers and tamper with stored backups. Users can exploit these flaws if they have valid...

/ March 18, 2026
The quiet comeback of credential-based attacks

The quiet comeback of credential-based attacks

Stolen credentials have been around as long as email itself. This retro attack vector is making a comeback due to its low cost and simplicity. According to Barracuda’s 2025 Email Security Breach Report, credential compromise attacks are becoming both more...

/ March 17, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique

Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique

A new evasion technique known as Zombie ZIP is exposing blind spots in how security tools scan archived files. By manipulating ZIP metadata, attackers can conceal malware inside archives that appear corrupted but still deliver payloads on compromised systems. Review...

/ March 16, 2026
How AI and automation are redefining the MSP value proposition

How AI and automation are redefining the MSP value proposition

Key takeaways AI and automation are shifting MSPs from reactive problem-solvers to proactive, predictive partners who anticipate customer needs. Embedding next‑generation technologies into service delivery improves efficiency, reduces manual workload, and frees teams to focus on strategic initiatives. AI‑driven insights...

/ March 16, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apache ZooKeeper vulnerability

Cybersecurity Threat Advisory: Apache ZooKeeper vulnerability

Recently, two important‑level severity vulnerabilities were identified in Apache ZooKeeper, a service widely used for configuration management and naming in distributed applications. These issues make timely security updates critical. The vulnerabilities could allow attackers to access sensitive configuration data or...

/ March 13, 2026
Pioneers in Tech: Joan Clarke, Bletchley Park codebreaker

Pioneers in Tech: Joan Clarke, Bletchley Park codebreaker

The stories of the women of Bletchley Park—the secret British codebreaking facility during World War II—are only now becoming known, much like those of the “hidden figures” of NASA. How women helped break the unbreakable Thousands of women worked at...

/ March 13, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Malware campaign targeting HR workflows

Cybersecurity Threat Advisory: Malware campaign targeting HR workflows

A new malware campaign known as BlackSanta is actively targeting HR and recruitment personnel through realistic job‑related lures and weaponized documents. Once victims open malicious files, the malware deploys a highly capable EDR‑killer designed to disable endpoint protection before delivering...

/ March 12, 2026