Category: Featured
Pioneers in Tech: Frances “Poppy” Northcutt, the first woman in Mission Control
All eyes have been on Artemis 2 this week and its many firsts. These include the first woman to fly to the moon (Christina Koch) and the first female launch director of a crewed launch (Charlie Blackwell-Thompson). That’s why this...
Increased open source software reliance creates MSP opportunities
A survey of 712 IT professionals suggests that as organizations rely more on open source software, they are struggling with security updates and patches (39 percent), installations, upgrades, and configurations (30 percent), and technical support (29 percent). Nearly half (47...
What does a “right-size” incident response plan look like?
Often, when a cyber incident occurs, the response is ad hoc—a reactive, seat‑of‑the‑pants scramble. After all, every incident is different, so how can you plan for what you don’t know? But just as every building fire is different, there are...
Tip Tuesday: Adding recurring employee qualification tracking to your services
The managed service provider (MSP) landscape is moving toward proactive compliance and employee qualification management. As MSPs, you should add recurring employee qualification tracking to your service offerings to increase revenue and improve your clients’ overall satisfaction. The value of...
Cybersecurity Threat Advisory: Active exploitation of Fortinet SQL injection vulnerability
Fortinet has issued urgent security guidance following the active exploitation of a critical SQL injection vulnerability affecting FortiClient Enterprise Management Server (EMS). The flaw allows unauthenticated attackers to achieve remote code execution through specially crafted HTTP requests sent to the...
Cybersecurity Threat Advisory: Axios NPM compromised by supply chain attack
The widely used HTTP client Axios was compromised recently in an incident that many researchers are attributing to a North Korean–linked cyberattack. Attackers gained access to the NPM account of an Axios maintainer, “jasonsaayman,” and published two malicious versions of...
Cybersecurity Threat Advisory: RoadK1ll Node.js WebSocket implant
Recent reporting has identified a Node.js–based post-exploitation implant known as RoadK1ll, observed in real-world intrusions as a lateral movement and network pivoting tool. Read this Cybersecurity Threat Advisory to protect you and your clients’ environments. What is the threat? RoadK1ll...
Tech Time Warp: The Conficker case study
Conficker was a nasty piece of malware that first emerged on the scene in November 2008. By April 1, 2009, many security experts and computer users were bracing themselves for the worst: a predicted “menacing” new phase as machines infected...
What soaring cloud demand and supply constraints mean for MSPs
A report from market research firm Omdia finds that global spending on cloud infrastructure continues to accelerate, with spending in the fourth quarter of 2025 reaching $110.9 billion—a 29 percent increase year over year. Cloud providers see strong growth momentum...
