The quest to get rid of passwords

With average total cost of a data breach continuing its way up year over year, the Big Tech companies are focusing on privacy, data protection and information security policies implemented by default. While businesses are looking to add new security layers and protect against all risks associated with a breach.In a joint effort to make[…] Read

Published by Helena Vorschepoth, Cloudtango

Best Defense? Good Cloud Offense

Ever since cybersecurity began in the 70s, the focus was always building a good defense as part of the main strategy. The problem with conventional security has traditionally been its reactive nature to security, such as patching software, finding and fixing system vulnerabilities and other type of responsive actions to protect the infrastructure. As years[…] Read

Published by Jordi Vilanova, Cloudtango

AiTM phishing bypasses multi-factor authentication

Microsoft has recently published details of a massive phishing attack that targeted more than 10,000 organizations. The worrying details about this particular attack is how it manages to bypass 2-factor authentication by using adversary-in-the-middle (AiTM) phishing sites to steal passwords and session data. The malicious actors used adversary-in-the-middle (AiTM) phishing sites to steal passwords and[…] Read

Published by Jordi Vilanova, Cloudtango

Is the Public Cloud Secure?

For as many years as the public cloud has been around, so has been the debate over whether or not it’s secure. When AWS launched in 2006 and Azure shortly thereafter in 2008, the public cloud was considered uncharted territory. IT professionals didn’t know whether to trust it or be weary. This was much like[…] Read

Published by Otto Aulicino, WatServ

Managed IT Services: Is It Time For A Secure Alternative?

Managed IT Services: Is It Time For A More Automated, Secure Alternative? Technology has made businesses more competitive than before. This is because businesses have moved to a digital realm where they can connect to customers, place and respond to orders, and even communicate with stakeholders from one place. While the benefits of technology are[…] Read

Published by Carla Kaine, Kaine Mathrick Tech (KMT)

Log4j: Vulnerability Diagram

Great diagram of the vulnerability and how to prevent it on each of the stages. Full article here.

Published by Jordi Vilanova, Cloudtango

Top 5 Most Offered Services by MSPs

Predicting the future is tricky. You only need to look at Covid, who saw that coming, right? So, in this article instead of guessing the future, we decided to go the easy way and look back into what has happened in 2021 so far. By digging some solid data that can help understand which of[…] Read

Published by Jordi Vilanova, Cloudtango

Microsoft Threat Protection Products Renamed

We are yet to see the paint dry from the last product renaming round, yet here comes Microsoft’s threat protection suite with a new batch of names for us to digest. Old Azure Sentinel is now called Microsoft Sentinel, following the same trend seen with Office 365 and a bunch of other products. If you[…] Read

Published by Jordi Vilanova, Cloudtango

Digital Transformation with Managed Cyber Security Services

Digital transformation is necessary for businesses, but it comes with security challenges. Read this blog to find out how managed security services enable it. Enabling The Digital Transformation With Managed Security Services Business owners across all industries are rushing to breathe new life into their companies through digital transformation initiatives. For many, this used to be only[…] Read

Published by Carla Kaine, Kaine Mathrick Tech (KMT)

Top Cybersecurity Conferences for 2022

Many events and conferences were cancelled and moved online since Covid came about. However, as me move toward 2022, most cybersecurity conferences are making an in-person comeback. It’s still early, and some dates may be rescheduled but I wanted to go ahead and pick what I believe will be the top ones nevertheless. So below,[…] Read

Published by Jordi Vilanova, Cloudtango