Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How MSPs Can Reduce EDR False Positives and Reclaim Profit Margins

• EDR false positives are a structural profitability problem for MSPs, not just a technical nuisance. Under flat-fee, per-incident, and man-hours pricing models, every false alert erodes margins directly. • Seventy-five percent of MSPs experience alert fatigue at least monthly, and MSPs managing 1,000+ clients report daily fatigue (Source: Heimdal, The State of MSP Agent Fatigue, 2025).

PowerShell for MSPs: A Practical Guide to Automate Tasks

PowerShell is an amazing scripting language that empowers Managed Service Providers (MSPs) to automate repetitive tasks, dramatically improving efficiency, consistency, and scalability across client environments. While traditional training or formal education may cover the basics, real-world MSP automation requires going beyond the basics with hands-on PowerShell scripting and continuous learning.

Agentic commerce is happening now. Here's what we've learned.

We’ve been collaborating with others to explore when and how agentic commerce will work. Robin Gandhi is the CPO of Lithic, a leading card issuer that’s already seeing agents use its cards to make purchases. Below, he shares his thoughts on what’s changed, and what needs to change, for agentic commerce to become mainstream. Last year, I wrote about the opportunity for agentic payments to revolutionize travel bookings, ad spend management, procurement, and more.

Non-Human Identity Sprawl Is the Hidden Cost of AI Velocity

In the current AI boom, we race to use copilots, orchestration scripts, CI workflows, retrieval pipelines, and background jobs. Sometimes, we take for granted that every one of these things needs an identity. Service accounts. OAuth apps. API keys. Short-lived tokens. As AI velocity increases, so does the number of these non-human identities (NHIs). Instead of obsessing over model quality, latency, hallucinations, and GPU costs, we also need to consider how these identities impact security.

Why sensitive data sprawl is your biggest risk #netwrix #datasecurity

Sensitive data sprawl, accumulated access, and unclear ownership continue to increase risk across modern environments. Farrah Gamboa, Senior Director of Product Management at Netwrix, explains why continuous visibility into sensitive data and access is critical to reducing exposure and strengthening security.

Secure Enterprise AI Apps and Agents: Visibility, Governance, Runtime Protection

When you deploy an AI application, do you know what's being sent into it — or what's coming back out? Cato AI Security provides runtime protection for the AI applications your organization builds and deploys, with real-time enforcement, sensitive data anonymization, and a complete audit trail across every interaction.

Ep. 51 - 2026 Cyber War Update: Handala, MuddyWater, and the Rise of Destructive Attacks

Iranian cyber attacks are escalating—shifting from espionage to destructive, large-scale operations. In this episode, we break down what CISOs need to know. Host Tova Dvorin and offensive security expert Adrian Culley analyze the latest Iranian cyber threat activity, including groups like Handala (Void Manticore) and MuddyWater (Mango Sandstorm), and how their tactics are evolving.

Using VM Performance Monitoring to Boost VM Performance

Virtualization is widely used nowadays due to the advantages for business IT infrastructures, such as scalability, cost-efficiency, and convenient administration. Hardware resources of physical servers can be aggregated to resource pools and provisioned for virtual machines (VMs). Sufficient resources allocated to VMs are required for the expected performance of a guest operating system and applications running on the VM.

Stop Policies From Breaking Your Builds

Security policies exist to protect your software supply chain. So why do they keep breaking your builds? This is the unspoken frustration inside most DevOps and security teams today. Supply chain attacks drove 30% of external breaches in 2025. So your security team did the right thing. They added policies to flag packages that are too new, unproven, or missing from the organization’s approved package list.