New & Notable
Cybersecurity risk assessment and management News
May 13, 2019
Cybersecurity issues, either embedded in broader digital initiatives or as an overarching IT issue, rank as the top customer concern, according to a new survey.
April 05, 2019
Cybersecurity partner programs are ramping up with vendors such as Flashpoint, Centrify and Portnox to expand or launch channel initiatives; more news from the week.
March 28, 2019
Barracuda Networks is seeking to educate its partners on the latest trends in spear-phishing email attacks. New research revealed an uptick in blackmail scams and sextortion.
April 13, 2018
Data center security vendor GuardiCore recently enhanced its partner program to attract managed security services providers as it looks to grow its reputation in the channel.
Cybersecurity risk assessment and management Get Started
Bring yourself up to speed with our introductory content
IT teams, partners and vendors can benefit from an internal checkup when it comes to reducing the risk of a cybersecurity breach. This approach can help document security efforts. Continue Reading
Getting a cybersecurity practice up and running is no easy task. In this guide, we show how MSPs can build security practices and protect their clients from an array of threats. Continue Reading
Client education, advanced endpoint protection and image-based backups are some of the steps channel partners can encourage customers to take to thwart ransomware. Continue Reading
Evaluate Cybersecurity risk assessment and management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn about antimalware protection and how endpoint security technology prevents malware from infecting end-user computers and corporate networks. Continue Reading
Managed services providers must navigate a complex market to find the right tools for cybersecurity. Three MSPs discuss products they deem essential to their businesses. Continue Reading
Channel firms like security consultant NCC Group are pioneering vulnerability management service offerings that target bug bounty programs. Continue Reading
Manage Cybersecurity risk assessment and management
Learn to apply best practices and optimize your operations.
Channel firms and customers outside the EU are still figuring out what they need to do to comply with GDPR personal data regulations, despite the law's May 2018 enactment. Continue Reading
Enterprises can prevent insider threat incidents if they know what to look for. Peter Sullivan explains the precursors to and precipitating events for insider threat behavior. Continue Reading
While a black swan incident shut down Code Spaces, IT service providers and their customers can avoid a similar outcome, if they devise a comprehensive data protection plan. Continue Reading
Problem Solve Cybersecurity risk assessment and management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Preventing IT sabotage from insider threats can be a challenge. Peter Sullivan explains how enterprises should monitor for characteristics of insider threat behavior. Continue Reading
The scriptless Linux exploit deviates from usual methods that security tools recognize as attacks. Expert Nick Lewis explains how the exploit works and how to prevent it. Continue Reading
IPv6 atomic fragments can be dangerous for enterprises. Expert Fernando Gont explains their relation to a new denial-of-service attack vector and how to mitigate the threat. Continue Reading