Category: Featured

Navigating AI
Navigating AI: The do’s and don’ts for MSPs

Navigating AI: The do’s and don’ts for MSPs

There is a big problem when discussing artificial intelligence (AI) with a prospect or customer. With AI, and positioning AI, being a relatively new market with a broad coverage, navigating AI positioning without knowing a person’s level of knowledge can...

/ April 16, 2025
Tip Tuesday
Tip Tuesday: Simplify payroll for your MSP business

Tip Tuesday: Simplify payroll for your MSP business

Delivering efficiency and error reduction to your clients is key for managed service providers (MSPs) to remain competitive. At the same time, it can be challenging to maintain the same standards in your internal workflows. Payroll, in particular, is a...

/ April 15, 2025
Cybersecurity 2025
Cybersecurity 2025 trends: GenAI and supply chains top of the threat list

Cybersecurity 2025 trends: GenAI and supply chains top of the threat list

It is hard to believe that we are now over three months into 2025. With Q1 in the books, we have approached the one-third of the year mark. This is a good time to pause and survey stakeholders and cybersecurity...

/ April 15, 2025
Automated Threat Response (ATR) for firewalls
Automated Threat Response (ATR) for firewalls

Automated Threat Response (ATR) for firewalls

In the last 12 months, Barracuda Managed XDR’s Automated Threat Response (ATR) for firewalls prevented thousands of potentially serious attacks against customers. It does so by correlating advanced threat intelligence and other tools, such as AI and machine learning to...

/ April 14, 2025
Pioneers in Tech
Pioneers in Tech: Happy birthday to Ben Hammersley, who coined the term “podcast”

Pioneers in Tech: Happy birthday to Ben Hammersley, who coined the term “podcast”

Let’s all send birthday wishes to British journalist-turned-speaker-and-futurist Ben Hammersley, who turned 49 this month and is perhaps most famous for coining the term “podcast” 21 years ago. Learn how the the word came about in this edition of Pioneers...

/ April 11, 2025
Survey: Cloud spending exceeding budgets

Survey: Cloud spending exceeding budgets

A survey of 300 CIOs in the U.S. working for organizations with over 500 employees finds 83 percent are on average spending 30 percent more on cloud infrastructure and applications than what their organization initially budgeted for, even as spending...

/ April 10, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical CrushFTP vulnerability

Cybersecurity Threat Advisory: Critical CrushFTP vulnerability

A critical CrushFTP, CVE-2025-2825, with a CVSS score of 9.8, flaw has been discovered. It enables attackers to bypass authentication on CrushFTP servers, posing a high-severity risk to corporate environments. Continue reading this Cybersecurity Threat Advisory for details on how...

/ April 10, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Ivanti Connect Secure flaw

Cybersecurity Threat Advisory: Critical Ivanti Connect Secure flaw

A critical vulnerability, identified as CVE-2025-22457, has been discovered in Ivanti Connect Secure (ICS) VPN appliances. This flaw is actively exploited in the wild, allowing attackers to execute arbitrary code remotely. Review the details within this Cybersecurity Threat Advisory to...

/ April 9, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apache RCE vulnerability

Cybersecurity Threat Advisory: Apache RCE vulnerability

A critical remote code execution (RCE) vulnerability in Apache Parquet, identified as CVE-2025-30065, with a CVSS score of 10.0, has been discovered. Continue reading this Cybersecurity Threat Advisory to learn how to effectively mitigate your risks. What is the threat?...

/ April 9, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Exploited Cisco backdoor flaw

Cybersecurity Threat Advisory: Exploited Cisco backdoor flaw

CVE-2024-20439 is a critical authentication bypass vulnerability in Cisco’s Smart Licensing Utility (CSLU). Attackers exploit this backdoor to gain unauthorized administrative access to vulnerable systems. The vulnerability affects specific versions of the standalone CSLU software, which is used to manage...

/ April 5, 2025