Category: Featured
Cybersecurity Threat Advisory: “Copy Fail” Linux vulnerability
Security researchers have disclosed CVE-2026-31431, commonly known as “Copy Fail,” a high-impact Linux local privilege escalation vulnerability affecting multiple distributions, including enterprise and cloud-optimized variants. Read this Cybersecurity Threat Advisory now to mitigate you and your clients’ risk. What is...
Cybersecurity Threat Advisory: Active exploitation of LiteLLM vulnerability
Security researchers have confirmed active exploitation of a critical SQL injection vulnerability in the LiteLLM proxy. This is an open‑source AI gateway widely used to centralize and manage API access to large language model (LLM) providers such as OpenAI, Anthropic,...
Cybersecurity Threat Advisory: Critical GitHub vulnerability
Researchers have recently disclosed details of a critical vulnerability affecting GitHub and GitHub Enterprise Server that could allow authenticated users to achieve remote code execution using a single git push command. The flaw has raised concerns about the security of millions...
Tech Time Warp: First prosecution under the Computer Fraud and Abuse Act
Does the punishment fit the crime? Let’s dive into this week’s Tech Time Warp to find out. Insiders from the nascent cybersecurity industry debated this question after the May 4, 1990, sentencing of Robert Tappan Morris, the first individual prosecuted...
How sales assessments help MSPs avoid costly hiring mistakes
Resumes and interviews rarely tell the full story. Candidates can present themselves well, but that does not mean they can prospect, reach decision-makers, or sell value. Too often that gap shows up in MSP environments after you’ve gone through the...
Cyber insurance is changing the rules and MSPs must adapt
For years, cyber insurance was sold to small and mid-sized businesses as a backstop that would take the sting out of a hack. In the beginning, that is what happened. But the landscape is changing fast. More than 40 percent...
Understanding ego states to build stronger buyer relationships
Back in the late 1950s, Eric Berne introduced a model that suggests each of us operates from three ego states: Parent, Adult, and Child (PAC). These ego states surface in different situations and are influenced by how others present their...
Tech Time Warp: Apple II Forever launches a tech mainstay—the Apple Event
The simply named “Apple Events” are a cultural touchpoint, instantly recognizable to even Android users. These product launches have taken on an identity of their own, a legacy worth revisiting in this Tech Time Warp. They even catapulted the black...
New billings for managed enterprise services increase despite challenges
Demand for managed services appears to be on the upswing once again, though signs are emerging that certain segments are coming under sustained pressure. A quarterly Information Services Group (ISG) Index tracking new bookings exceeding $5 million in value shows...
Does LinkedIn still work to generate leads for MSPs? Or is it just spam?
Back in 2017, LinkedIn felt like a hidden playground for marketers. Few MSPs used it to generate leads, and even fewer did it well. I had this vision: I was going to become the person who helped MSPs get leads...

