Category: Featured
Pioneers in Tech: Sandra Bullock, Academy award winner, actress, producer, internet pioneer
Your socials may have been buzzing in the past few days with an exciting bit of resurfaced news. One of America’s most popular actresses—known for her girl-next-door persona and rise to stardom in the 1990s—is also a pioneer in technology....
Cybersecurity in 2026: Experts predict what’s next
Over the past two weeks, we’ve reflected on 2025’s cybersecurity developments—with a few glimpses into 2026. Today, we turn our full attention to the year ahead, sharing predictions from leading experts on what’s next for cybersecurity. AI will elevate phishing...
Mergers and acquisitions: Disruptions and opportunities for MSPs
Few business events are as challenging as a merger or acquisition. Even with the best intentions, outcomes rarely align perfectly with expectations. For managed service providers (MSPs), these transactions can create significant uncertainty—but also open doors to new opportunities. Three...
If you’re an MSP owner who wants more consistent leads, start here
As someone who’s spent the last 8+ years helping hundreds of MSPs generate leads and book real sales conversations, I hear the same frustration over and over again: “We’re doing some marketing… but leads are inconsistent.” Some months are busy. ...
Cybersecurity Threat Advisory: AdonisJS Bodyparser vulnerability
A severe security flaw has been identified in the @adonisjs/bodyparser npm package, a core component of the AdonisJS TypeScript-first web framework. Tracked as CVE-2026-21440, the vulnerability stems from a path traversal issue in the multipart file handling mechanism. If exploited,...
Cybersecurity Threat Advisory: Critical n8n vulnerability
A severe vulnerability, tracked as CVE-2025-68668 with a CVSS score of 9.9, was recently discovered in n8n, an open-source workflow automation platform. The flaw enables authenticated users with create or modify workflows permissions to execute arbitrary system commands on the...
Cybersecurity Threat Advisory: Critical vulnerability in IBM API Connect
A newly disclosed security vulnerability, CVE-2025-13915, affects IBM API Connect. This flaw could allow a remote attacker to bypass authentication and gain unauthorized access to applications. Review this Cybersecurity Threat Advisory for steps to mitigate your risk. What is the...
Cybercrime in 2026: Faster, smarter and fully industrialized
Cybercrime is no longer a loose collection of hackers, tools and opportunistic attacks. As we move into 2026, it has matured into a highly industrialized ecosystem—complete with specialization, automation, affiliate networks, and even cartel-like business models. The result is a...
Tech Time Warp: HP introduces the first scientific handheld calculator
In a world where smartphones are ubiquitous, it’s worth marveling that only 54 years ago, market research indicated there would be little interest in a pocket-sized scientific calculator. However, in a stroke of bad luck for the slide rule, HP...
Customer incentives: A proven catalyst for MSP growth
Managed service providers (MSPs) have always cared about customer retention—but now IT vendors are putting real incentives behind it. Amazon Web Services (AWS), for example, is introducing two updates to its partner program next year that reward MSPs for keeping...
