Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding the Hesitance of MSPs Towards Google Workspace

I recently saw a post on LinkedIn from a managed service provider (MSP) who had turned down an opportunity because the prospect used Google Workspace. While I understood their reasoning for doing this, it did get me thinking: Why are MSPs so hesitant to work with Google? I created a casual poll on LinkedIn and the results revealed a significant trend: a majority of MSPs seem to be bypassing Google Workspace as a viable service offering.

AI - The Good, Bad, and Scary

AI and machine learning (ML) optimizes processes by making recommendations for optimizing productivity, reducing cycles, and maximizing efficiency. AI also optimizes human capital by performing mundane & repetitive tasks 24x7 without the need for rest and minimizing human errors. There are numerous benefits as to how AI can benefit society. As much as AI can propel human progress forward, it can be consequential to our own detriment without proper guidance.

Outsmarting Cyber Threats: Etay Maor Unveils the Hacker's Playbook in the Cloud Era

In an era where cyber threats evolve as rapidly as the technology they target, understanding the mindset of those behind the attacks is crucial. This was the central theme of a speech given by Etay Maor, Senior Director of Security Strategy, of Cato Networks at the MSP EXPO 2024 Conference & Exposition in Fort Lauderdale, Florida. Titled, “SASE vs.

Data Access Governance: The Blueprint of Cloud Data Access Management

In an era where data breaches are as common as they are damaging, securing sensitive information has become paramount for businesses across the globe. Data Access Governance stands at the forefront of this battle, ensuring that the right people have the right access to the right data at the right time. It's a holistic approach that not only fortifies data against unauthorized access but also enables organizations to harness its full potential responsibly and efficiently.

Passkey Support Across KeeperFill, iOS and Android

Keeper is excited to announce that it now supports passkeys for mobile platforms on iOS and Android. This update extends passkey management functionality in the Keeper Vault beyond our earlier launch of Keeper browser extension support for Chrome, Firefox, Edge, Brave and Safari. A passkey is a cryptographic key that lets users log in to accounts without having to enter a password. Passkeys have seen rapid adoption since their introduction in 2022 and Keeper is proud to enable their use across devices, bringing users a more secure and streamlined authentication experience.

Security in the Digital Age: How Fax Apps Ensure Confidentiality and Compliance

Where data breaches and privacy concerns are rampant, ensuring the confidentiality and compliance of sensitive information is paramount. From healthcare to finance, legal to government sectors, organizations grapple with the challenge of safeguarding data while adhering to regulatory requirements. Amidst the plethora of communication tools available, fax applications emerge as stalwart guardians of security, offering a robust solution for transmitting sensitive information securely. In this article, we delve into the world of fax apps, exploring how they bolster confidentiality and compliance in the digital age.

The IT Hour | Identity Federation 03.29.24

Trevor Wiemann, Product Manager at JumpCloud tells us about what's new with Identity Federation. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable. You can expect from our weekly conversations.

Ensure PII Compliance in India with OpenAI & Top LLMs

India's data protection laws are evolving to safeguard the privacy of its citizens. One crucial aspect is the requirement that Personally Identifiable Information (PII) remain within India's borders for processing. This data residency requirement poses a challenge for businesses that want to leverage powerful AI language models (LLMs) like those offered by OpenAI, which often process data in global centers.

How a Private Cloud Approach to SASE Helped Reduce Disruption From a Severed Sub-sea Cable

It feels like sub-sea cable disruptions are becoming ever more common, with recent reports of major outages caused by severed cables in the Mediterranean, the Red Sea, the North Sea, and—most recently—off the coast of Africa.