Category: Featured

2025 trends for MSP marketing

2025 trends for MSP marketing

It’s that time of year again—the time when we set goals and look forward to what the new year may bring. I’ve been in the managed service provider (MSP) marketing space for a very long time – and I can...

/ January 22, 2025
MSPs opportunity
Unlocking a new opportunity: Selling cybersecurity to schools for MSPs

Unlocking a new opportunity: Selling cybersecurity to schools for MSPs

Managed service providers (MSPs) often overlook schools and other educational institutions, even though they present an excellent opportunity for new business. That is, if one is ready to handle some of their inherent challenges. According to various market research reports,...

/ January 21, 2025 / 1 Comment
The SOC case files: XDR’s automation offers rapid cloud protection

The SOC case files: XDR’s automation offers rapid cloud protection

This edition of the SOC case files showcases how Barracuda Managed XDR detects an impossible travel, indicating a user login credentials were compromised. Incident summary An employee at a telecommunications company connected as usual to their cloud account. They then...

/ January 20, 2025 / 5 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerability in Ivanti secure access solutions

Cybersecurity Threat Advisory: Vulnerability in Ivanti secure access solutions

A critical security flaw in Ivanti, CVE-2025-0283, is affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This stack-based buffer overflow vulnerability allows a locally authenticated attacker to escalate their privileges. Continue reading this Cybersecurity Threat Advisory to mitigate your...

/ January 17, 2025
Tech Time Warp
Tech Time Warp: The public learns about the SAGE air defense system

Tech Time Warp: The public learns about the SAGE air defense system

Do you know those massive computers in old movies? The ones with rows of blinking lights and lots of buttons, as featured in Dr. Strangelove and so many other films? Those weren’t the product of a Hollywood imagination—they were based...

/ January 17, 2025
Automated incident response – efficiency at scale

Automated incident response – efficiency at scale

No matter how robust your email security measures are, some threats will inevitably bypass initial defenses. Whether it’s a sophisticated phishing attack or an emerging malware variant, the ability to swiftly detect and respond to post-delivery threats is critical for...

/ January 16, 2025
cloud spending
Major 2025 spike in cloud spending bodes well for MSPs

Major 2025 spike in cloud spending bodes well for MSPs

Gartner is forecasting a 21.5 percent increase in spending on public cloud services in 2025. This increase is forecasted based on the investments in artificial intelligence (AI). The market research firm expects cloud spending to reach $723.4 billion, up from $595.7...

/ January 16, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Fortinet zero-day vulnerability

Cybersecurity Threat Advisory: Fortinet zero-day vulnerability

A critical zero-day vulnerability has been found affecting Fortinet FortiOS and FortiProxy devices. This vulnerability enables attackers to bypass authentication and gain privileges. Keep reading this Cybersecurity Threat Advisory for information to keep your environment safe. What is the threat?...

/ January 15, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Aviatrix Controller vulnerability

Cybersecurity Threat Advisory: Aviatrix Controller vulnerability

A critical security vulnerability in the Aviatrix Controller cloud networking platform has been discovered and is actively exploited by threat actors to deploy backdoors and cryptocurrency miners. Multiple cloud deployments have reported that they have been compromised following this disclosure....

/ January 15, 2025
2024
2024 by the numbers

2024 by the numbers

The threat landscape is always churning, with new threats emerging while others disappear or fade to irrelevance. Consider ALPHV, a ransomware-as-a-service (RaaS) group that provided the infrastructure, tools, and administrative services to the individual hacker who ransomed $22 million from Change Healthcare...

/ January 14, 2025