New & Notable
Cybersecurity risk assessment and management News
October 18, 2019
A DigiCert study highlights a role for channel partner in preparing customers for quantum computing security threats; other channel news from the week.
October 10, 2019
As customers increasingly question the cybersecurity postures of MSPs, MSPAlliance aims to give firms a way to show they are proactively dealing with threats.
June 26, 2019
Stellar Cyber, a security analytics vendor, launched Starlight 3.1 as its first unified security analytics platform, using AI and machine learning to detect and thwart attacks.
May 13, 2019
Cybersecurity issues, either embedded in broader digital initiatives or as an overarching IT issue, rank as the top customer concern, according to a new survey.
Cybersecurity risk assessment and management Get Started
Bring yourself up to speed with our introductory content
IT teams, partners and vendors can benefit from an internal checkup when it comes to reducing the risk of a cybersecurity breach. This approach can help document security efforts. Continue Reading
Getting a cybersecurity practice up and running is no easy task. In this guide, we show how MSPs can build security practices and protect their clients from an array of threats. Continue Reading
Client education, advanced endpoint protection and image-based backups are some of the steps channel partners can encourage customers to take to thwart ransomware. Continue Reading
Evaluate Cybersecurity risk assessment and management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn about antimalware protection and how endpoint security technology prevents malware from infecting end-user computers and corporate networks. Continue Reading
Managed services providers must navigate a complex market to find the right tools for cybersecurity. Three MSPs discuss products they deem essential to their businesses. Continue Reading
Channel firms like security consultant NCC Group are pioneering vulnerability management service offerings that target bug bounty programs. Continue Reading
Manage Cybersecurity risk assessment and management
Learn to apply best practices and optimize your operations.
Channel firms and customers outside the EU are still figuring out what they need to do to comply with GDPR personal data regulations, despite the law's May 2018 enactment. Continue Reading
Enterprises can prevent insider threat incidents if they know what to look for. Peter Sullivan explains the precursors to and precipitating events for insider threat behavior. Continue Reading
While a black swan incident shut down Code Spaces, IT service providers and their customers can avoid a similar outcome, if they devise a comprehensive data protection plan. Continue Reading
Problem Solve Cybersecurity risk assessment and management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Digital transformation projects and other sophisticated tech initiatives call for integrated security. IT service firms are addressing the gap between security and business teams. Continue Reading
Preventing IT sabotage from insider threats can be a challenge. Peter Sullivan explains how enterprises should monitor for characteristics of insider threat behavior. Continue Reading
The scriptless Linux exploit deviates from usual methods that security tools recognize as attacks. Expert Nick Lewis explains how the exploit works and how to prevent it. Continue Reading