Category: Security
To tackle the data breach epidemic, we need to get the basics right
A lot is said in security circles about cyber hygiene. It can amount to different things depending on which vendor or security practitioner you’re talking to. But a common thread is getting the basics right — whether it’s via user...
Demand for cloud data migration expertise will soon increase
Managed service providers (MSPs) have over the last 10 years racked up a significant amount of revenue helping organizations move data into the cloud. However, a new survey suggests that there is now an opportunity starting to emerge to help...
Cybersecurity Threat Advisory: Palo Alto PAN-OS vulnerability
This week, Palo Alto released a patch for PAN-OS’ vulnerability (CVE-2022-0028). This vulnerability is actively being targeted by threat actors. Firewalls running PAN-OS could permit an attacker to perform a Denial-of-Service (DoS) attack. Barracuda MSP recommends updating affected Palo Alto...
A look at back-to-school cyberthreats
As we discussed last week, back-to-school brings out hackers and cybercriminals. This week we’ll look at some of the specific threats that schools, educators, and even students face this year and what MSPs can to do help protect their education...
MSSPs will be at forefront of wave of security platform consolidation
Managed security services providers (MSSPs) are going to soon be at the forefront of a wave of consolidation of cybersecurity platforms as more organizations not only look to reduce overall costs but also streamline security operations. A survey of 280...
Hackers head back to school
Every August, across the United States orange school buses rumble from their summer slumber, school cafeteria workers put on their hairnets and march back into the kitchen, and students grab their backpacks and books and make their way to their...
Zero Trust, XDR, and digital transformation: Interview with Fleming Shi
For anyone involved in tech and security, it’s hard to avoid a blizzard of messaging and advertising around Zero Trust Network Access (ZTNA) and Extended Detection and Response (XDR). But it can be remarkably difficult to understand exactly what a...
Confidential computing starts to gain traction in the cloud
A survey of 452 IT and security professionals conducted by the Cloud Service Alliance (CSA) finds more than a quarter of organizations (27 percent) surveyed are already using confidential computing platforms to better protect data, with another 55 percent planning...
IBM’s Annual Cost of Breach Report shows rising risks
As a self-professed cybersecurity data nerd, I look forward each year to IBM’s annual Cost of Data Breach report. It’s a “fun” read if you like this sort of thing. And just in time for summer beach reading, the report...
Why MSPs are attractive cyberattack targets
Once again, government watchdogs have issued an alert to managed service providers (MSPs), encouraging them to implement new security guidance in response to increasing levels of cyberattacks. MSPs are a prime target for cybercriminals – they have direct access to...

