SIEM Requirements for MSPs: What You Need to Get Right

SIEM is a streamlined tool used by managed service providers (MSPs) to monitor activity across their clients’ systems in real time. The tool brings security data into one place. This makes it easier to spot suspicious activity early and respond quickly if something goes wrong. SIEM provides MSPs with a single, clear view of their environment to improve day-to-day monitoring. It also takes less time to investigate security incidents.

Razorwire 2025 Cybersecurity Year in Review

The Razorwire Christmas Party 2025 episode looks back over a year of burnout, AI hype, flat security budgets and noisy breaches, and forward to the future of work in cybersecurity. Listeners get a fast survey of social engineering trends, alert fatigue, decision culture, talent pipelines and work life boundaries that shaped 2025 and point to the years ahead.

The Best Ticketing Tool(s): The Complete Guide for MSPs and IT Service Providers

Nowadays, businesses of all sizes rely on MSPs and IT service providers for key functions such as cybersecurity, cloud management, and digital transformation, because it is often more cost-effective and efficient than handling these tasks in-house. However, that places enormous pressure on those providers because they are expected to solve a wide range of problems around the clock.

6 Ways to move from security questionnaires to self-serve trust

In this session of the Strategic CISOs webinar series, Sravish Sridhar (CEO, TrustCloud) sat down with Myke Lyons (CISO, Cribl) and Jon Zayicek (Customer Security Assurance Leader, Cribl) to break down how Cribl built a customer trust program that helps buyers self-serve proof, reduces questionnaire drag, and gives security a clear line of sight to pipeline and ARR. Cribl has turned customer assurance into a revenue accelerant, and that posture has produced great results.

Joomla SAML SSO with Microsoft Entra ID (Azure AD) | Step-by-Step Setup Guide

Learn how to configure SAML Single Sign On (SSO) in Joomla using Microsoft Entra ID (formerly Azure Active Directory). In this step-by-step tutorial, we show how to connect your Joomla site as a SAML Service Provider (SP) with Microsoft Entra ID, enabling users to securely log in using their corporate credentials. What you will learn in this video: Creating and configuring a SAML application in Entra ID Setting up the Joomla SAML SP plugin Exchanging metadata between Joomla and Entra ID Configuring attribute mapping.

AI and Data Security: Why Your Data Security Model Is Hurting Innovation

Why Your Data Security Model Is Outdated For over 20 years, we’ve focused on the Data Envelope—securing the perimeter, the cloud, and the network. But in a world of AI and rapid data sharing, protecting the envelope is not enough. In this video, James Rice (VP of Product Marketing at Protegrity) explains why traditional security has become the biggest bottleneck for modern innovation. Whether you are a security leader, a data architect, or a business innovator, understanding this paradigm shift is essential for the next decade of growth.

Remediation Coordination Breaks Down When Assets Have No Owner

Remediation coordination often fails because security teams are dealing with unowned assets and resources. In this hands-on demo, Seemplicity Exposure Management Strategist Rob Babb shows how ownership gaps create blind spots, stall remediation, and slow exposure reduction across teams. The walkthrough highlights how remediation orchestration establishes accountability, improves visibility, and enables automation for exposure remediation across cloud, application, and infrastructure environments.

Ensuring API Testing Meets Compliance: Policies, Performance, and Proof

APIs sit at the center of modern applications. They move data between systems, power mobile apps, and enable integrations at scale. Naturally, they are also a focal point for regulators, auditors, and attackers. Most organizations today do test their APIs. Yet many still struggle during audits. Not because testing didn’t happen, but because it wasn’t consistent, governed, or provable. Compliance frameworks don’t ask whether you ran an API scan.

Keeper Security Achieves FedRAMP High Authorization for Privileged Access Management

As federal agencies face increasingly sophisticated cyber threats, securing high-impact systems and sensitive unclassified data has become a top priority. To support this need, Keeper Security has achieved FedRAMP Authorization at the High Impact Level for its Keeper Security Government Cloud (KSGC) platform, expanding its ability to protect the U.S. federal government’s most sensitive unclassified workloads.