GhostToken Exposes Google Cloud Platform Users to Potential Attacks
First discovered in June 2022 by researchers at Astrix Security, an Israeli cybersecurity company, t…
What is cyber insurance and what is the MSP’s role?
Cyber attacks are on the rise in 2022, and, no one, it seems, is safe. Big enterprises, small busine…
Why Stale Account Cleanup is Important and How To Do It
This week, SaaS Alerts has released a new account management functionality within its SaaS security …
How MSPs can deal with the current hiring crisis
The COVID-19 pandemic threw the workforce into an imbalance between supply of workers and employer d…
Microsoft 365 Price Increase: Right-sizing protection and cost for your customers
“Win on the transition” is a term I heard for the first time several years ago. I have written about…
Attention MSPs: Is it time to reprioritize your activities?
When faced with the need to secure their customers’ SaaS Applications, consistent feedback heard fro…
What is a Brute Force Attack and What to Do When They Happen?
We live in a world where a vast majority of a company’s sensitive data resides in Software as a Serv…
How can MSPs help protect Dropbox users?
If you ask any seasoned IT professional at a Managed Service Provider (MSP), “what is your greatest …