Security


  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix NetScaler products confirmed to be under exploitation

    Security researchers at watchTowr warn that multiple flaws are involved in the early stages of a hacking spree that could rival the 2023 CitrixBleed campaign.

    By David Jones • Updated March 30, 2026
  • a blue digital wave crests
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Partners are flooded with cybersecurity vendor tools

    “At some point, you just throw your hands in the air and you say, ‘I think it's time for me to compete,’” 360 SOC CEO Chris Ichelson said.

    By March 30, 2026
  • The words ddos attack are spelled out in red on a computer screen amid random blue text.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    DDoS attacks get faster, more disruptive: report

    As AI, IoT and for-hire botnets change the threat landscape, cybersecurity can no longer operate as a standalone function, according to Zayo research.

    By Kelly Teal, Channel Dive contributor • March 26, 2026
  • An executive in a business meeting room
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies face difficult choices in blaming hackers for an attack

    Publicly naming a hacking group can affect everything from retaliation to insurance coverage.

    By Eric Geller • March 25, 2026
  • an AI logo superimposed over an image of a man typing on a laptop
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies know AI is essential for cyber defense but aren’t yet seeing returns

    The maturity of organizations’ AI oversight also varies significantly, according to a new EY survey of cybersecurity leaders.

    By Eric Geller • March 24, 2026
  • Pedestrians walk by a Broadcom sign in front of a the company's office on Dec. 12, 2024 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Broadcom unveils unified cybersecurity platform that’s not VMware

    The tech giant is making a channel-first move to close the mid-market security gap, combining forensic and attack prevention tools in a single SaaS offering.

    By March 23, 2026
  • a digital eye representing cybersecurity
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SonicWall wants partners selling more than firewalls – it updated its partner program to get them there

    The cybersecurity vendor did away with onerous technical certifications previously required for partners to maintain specializations.

    By March 13, 2026
  • A fingerprint is scanned to prevent identity theft.
    Image attribution tooltip
    Ian Waldie via Getty Images
    Image attribution tooltip

    Most organizations can’t actually recover from an identity attack: survey

    More than three-quarters of organizations aren't testing identity disaster recovery at the recommended frequency — and nearly a quarter never test at all.

    By Kelly Teal, Channel Dive contributor • March 13, 2026
  • A man at a desk with a shadow monster behind him
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Partners have a vital role in guiding enterprise AI adoption

    Enterprises are grappling with governance gaps as AI use escapes IT oversight, according to Nutanix.

    By Kelly Teal, Channe Dive contributor • March 12, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    Industry to NIST: Keep agentic AI standards flexible and voluntary

    The business community said security guidance should reflect the nascency and diversity of the field.

    By Eric Geller • March 11, 2026
  • An office building lobby with the the company name Zero Networks pictured on the wall.
    Image attribution tooltip
    Permission granted by Zero Networks
    Image attribution tooltip

    Zero Networks bets on real-time network visibility to fuel channel growth

    Weeks after expanding its partner program, the company introduced real-time enterprise network mapping to speed up zero-trust deployments.

    By Christine Horton, Channel Dive contributor • March 11, 2026
  • A brick office building with the Okta corporate log on it.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Okta cedes consulting, systems integration to partners in cybersecurity platform push

    “We’re going to give up the professional services dollar as an investment to make this whole ecosystem bigger and empower our long-term subscription growth," CEO Todd McKinnon said.

    By March 5, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware is now less about malware and more about impersonation

    Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.

    By Eric Geller • March 4, 2026
  • A CrowdStrike office on July 30, 2024, in Sunnyvale, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    CrowdStrike’s MSSP business grew more than tenfold in three years

    "We didn't just have a great partner year," CEO George Kurtz said. "We built an ecosystem to win the next decade."

    By March 4, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.

    By Eric Geller • March 2, 2026
  • The Huntress cybersecurity company logo is picture on the way in an office overlooking a futuristic cityscape.
    Image attribution tooltip
    Permission granted by Huntress
    Image attribution tooltip

    Cybercriminals seize on MSP tools to harvest personal data

    Threat actors are using legitimate remote monitoring and management platforms as an attack vector, Huntress research found.

    By Feb. 27, 2026
  • Myriad360 office building is pictured with the technology company's logo in site.
    Image attribution tooltip
    Permission granted by Myriad360
    Image attribution tooltip

    Myriad360’s Advizex acquisition reflects channel shift toward scale

    The pairing will create an integrated enterprise IT infrastructure platform with $900 million in annual revenue, the companies said Tuesday.

    By Feb. 24, 2026
  • agentic AI business functions operations payments IT investment
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In the AI era, CISOs worry about data leaks and doubt tech will solve skills gaps

    CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.

    By Eric Geller • Feb. 24, 2026
  • A laptop's screen shows the website of an AI service
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    AI’s ‘connective tissue’ is woefully insecure, Cisco warns

    In a new report, the company also said businesses should beware of the “SolarWinds of AI.”

    By Eric Geller • Feb. 20, 2026
  • The corporate logo for cybersecurity firm WatchGuard is pictured on the wall inside an office building corridor.
    Image attribution tooltip
    Permission granted by WatchGuard
    Image attribution tooltip

    WatchGuard aims to arm MSPs with enterprise-grade security

    As the threat landscape evolves, the onus is on channel partners to respond or risk taking the blame, the cybersecurity firm’s new CEO said.

    By Feb. 19, 2026
  • American cybersecurity company Palo Alto Networks headquarters in Santa Clara, California.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Palo Alto Networks shrugs off AI worries amid ‘platformization’ push

    “I'm still confused why the market is treating AI as a threat to … cybersecurity,” Chair and CEO Nikesh Arora said Tuesday, during the company’s Q2 2026 earnings call.

    By Feb. 18, 2026
  • a headshot of a man
    Image attribution tooltip
    Permission granted by Proofpoint
    Image attribution tooltip

    Proofpoint aims to protect partners in channel revamp

    The cybersecurity company’s biggest program overhaul in three years clamps down on customer poaching.

    By Feb. 17, 2026
  • Cloud computing platforms app icons for AWS, Microsoft Azure, Google cloud and other are pictured on a smartphone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Global sovereign cloud spend to increase 35.6% in 2026

    Cloud customers will seek more local infrastructure options in an effort to retain full control of their data, according to Gartner.

    By Makenzie Holland • Feb. 11, 2026
  • Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat actors target SolarWinds Web Help Desk flaw

    Researchers say hackers are using remote monitoring and other tools in compromised environments.

    By David Jones • Feb. 9, 2026
  • An American solider sits at a desktop computer at a U.S. army base.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    MetTel, TekSynap take aim at aging Army National Guard telecom

    The modernization service providers finalized multiyear contracts to replace aging networks at bases in Georgia and Tennessee.

    By Feb. 6, 2026