New & Notable
Cybersecurity risk assessment and management News
April 13, 2018
Data center security vendor GuardiCore recently enhanced its partner program to attract managed security services providers as it looks to grow its reputation in the channel.
February 23, 2018
JASK will initially target regional reseller partners and plans to eventually work with managed security service provider firms; other news from the week.
February 16, 2018
Threat management platform vendor Anomali said it will tap MSSPs for help reaching medium-sized businesses; other channel news from the week.
September 29, 2017
Channel partner companies are boosting their efforts to support Facebook Workplace, which is making headway among enterprise customers, such as Walmart.
Cybersecurity risk assessment and management Get Started
Bring yourself up to speed with our introductory content
IT teams, partners and vendors can benefit from an internal checkup when it comes to reducing the risk of a cybersecurity breach. This approach can help document security efforts. Continue Reading
Getting a cybersecurity practice up and running is no easy task. In this guide, we show how MSPs can build security practices and protect their clients from an array of threats. Continue Reading
Client education, advanced endpoint protection and image-based backups are some of the steps channel partners can encourage customers to take to thwart ransomware. Continue Reading
Evaluate Cybersecurity risk assessment and management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn about antimalware protection and how endpoint security technology prevents malware from infecting end-user computers and corporate networks. Continue Reading
Managed services providers must navigate a complex market to find the right tools for cybersecurity. Three MSPs discuss products they deem essential to their businesses. Continue Reading
Channel firms like security consultant NCC Group are pioneering vulnerability management service offerings that target bug bounty programs. Continue Reading
Manage Cybersecurity risk assessment and management
Learn to apply best practices and optimize your operations.
Channel firms and customers outside the EU are still figuring out what they need to do to comply with GDPR personal data regulations, despite the law's May 2018 enactment. Continue Reading
Enterprises can prevent insider threat incidents if they know what to look for. Peter Sullivan explains the precursors to and precipitating events for insider threat behavior. Continue Reading
While a black swan incident shut down Code Spaces, IT service providers and their customers can avoid a similar outcome, if they devise a comprehensive data protection plan. Continue Reading
Problem Solve Cybersecurity risk assessment and management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Preventing IT sabotage from insider threats can be a challenge. Peter Sullivan explains how enterprises should monitor for characteristics of insider threat behavior. Continue Reading
The scriptless Linux exploit deviates from usual methods that security tools recognize as attacks. Expert Nick Lewis explains how the exploit works and how to prevent it. Continue Reading
IPv6 atomic fragments can be dangerous for enterprises. Expert Fernando Gont explains their relation to a new denial-of-service attack vector and how to mitigate the threat. Continue Reading