Select Page

Analysis

We do the heavy intellectual lifting to deliver targeted insights that are immediately actionable and useful to you. We provide quick and easy-to-read knowledge nuggets that are compiled and synthesized by our expert analysts. It’s all about saving time and providing useful information.
Azure Hardening – Epp’s view

Azure Hardening – Epp’s view

Before we get into the good stuff – I want to give a shout out to Microsoft 365 Nation contributor Dana Epp and his community involvement. With his well-earned successes already in-hand, Epp has never lost his community commitment and has been a security MVP at Microsoft for over ten years.

Read More

Double Authentication: Pain in the Rear?

Double Authentication: Pain in the Rear?

In a recent webinar where we held a security round-table with contributors Dana Epp and Michael Fraser, we discussed double authentication. We were able to put book ends on this conversation from 15+ years ago, when Epp pioneered some of this technology with his Vancouver, B.C.-based security ISV called Scorpion Software.

Read More

Winter Storms: Public Safety and Security

Winter Storms: Public Safety and Security

Sometimes MSPs need to step outside – literally – and see what the weather is like. Its all too easy to go inward focused on security setting, filters and the such. A real worldism is in order with Winter hitting hard in much of the US. As I write this, my hometown of Seattle is under warning for a weekend Snowmageddon and the Central US is just coming out of a polar vortex.

Read More

Will Emerging Threats Tip the Scales?

Will Emerging Threats Tip the Scales?

By Fortinet | January 14, 2019

This is a summary of an article that first appeared in SecurityWeek on December 07, 2018.

Digital devices and infrastructures continue to be woven deeper into every aspect of our lives, whether through connected homes, cars, and mobile devices, or by expanding their role in business, government, and even critical infrastructure. One outcome of this is that the stakes in the ongoing battle between cybercriminals and security professionals continues to rise. We are no longer just looking at a cyber breach impacting an organization’s reputation and bottom line. Now and into the future, there is a real potential for a successful cyberattack to disrupt interconnected economies, shut down essential services, or even result in physical harm.

Read More

Fighting the Evolution of Malware

Fighting the Evolution of Malware

By Anthony Giandomenico | January 14, 2019

Malware is becoming increasingly destructive. Below is a short history of this trend, along with steps organizations can take to combat it.

(This byline originally appeared in SC Media as a bylined article.)

We begin with Mirai that, in the summer of 2016, was responsible for the largest DDoS attack in history. It was built using millions of vulnerable IoT devices and then used to bring down a large chunk of the internet. This began a new ransomware trend where, rather than having to break in and encrypt devices without being detected, which could take weeks to accomplish, automated botnets comprised of hijacked IoT devices executed DDoS-based ransom attacks. Swarms of independent yet centrally controlled devices with no designated user, and often with no OS to patch or update, were especially difficult to combat.

Read More

Redefining the Cloud and Cloud Security

Redefining the Cloud and Cloud Security

By Lior Cohen | January 10, 2019

Migration to cloud-based compute and services platforms has allowed organizations to quickly adapt to the global transition to a digital economy. The ability to quickly spin up resources, adopt new applications, and respond in real time to end user and consumer demands allows organizations to compete effectively in today’s new digital marketplace. The result has been astounding. In just a few years, over 80% of enterprises have adopted two or more public cloud infrastructure providers, and nearly two-thirds are using three or more.

Read More

Grow Your Business by Reducing Complexity for SMB Customers

Grow Your Business by Reducing Complexity for SMB Customers

By Jon Bove | January 09, 2019

At many organizations, discussions around deploying and managing new IT and cybersecurity solutions are often met with confusion. Many companies, especially in the SMB space, do not have dedicated IT and cybersecurity teams. This means technical resources are strained when it comes to selecting, deploying, implementing, and securing infrastructure.

Read More