Security


  • Cloud computing platforms app icons for AWS, Microsoft Azure, Google cloud and other are pictured on a smartphone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Global sovereign cloud spend to increase 35.6% in 2026

    Cloud customers will seek more local infrastructure options in an effort to retain full control of their data, according to Gartner.

    By Makenzie Holland • Feb. 11, 2026
  • Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat actors target SolarWinds Web Help Desk flaw

    Researchers say hackers are using remote monitoring and other tools in compromised environments.

    By David Jones • Feb. 9, 2026
  • An American solider sits at a desktop computer at a U.S. army base.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    MetTel, TekSynap take aim at aging Army National Guard telecom

    The modernization service providers finalized multiyear contracts to replace aging networks at bases in Georgia and Tennessee.

    By Feb. 6, 2026
  • A thumbprint for biometric ID is scanned.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI creates identity sprawl crisis for channel partners

    Automation and non-human identities are changing attack strategies, according to separate reports from Netwrix and the Cloud Security Alliance.

    By Kelly Teal, Channel Dive contributor • Feb. 4, 2026
  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

    By Eric Geller • Feb. 4, 2026
  • IBM headquarters building in downtown San Francisco pictured on Aug. 21, 2019
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IBM enjoys a mainframe sales boost as its software segment soars

    The company reported its highest annual revenue for zSystems units in two decades coupled with record growth in software revenue for the 2025 fiscal year.

    By Jan. 29, 2026
  • A man stands on a stage with a blue screen with the number $413 million behind it.
    Image attribution tooltip
    Permission granted by Thrive
    Image attribution tooltip

    Thrive puts ServiceNow agents to work in AI push

    The IT services provider has poured money and headcount into its security and AI practices in the last two years.

    By Jan. 28, 2026
  • Two businesspeople -- one holding a calculator, the other with clasped hands -- sit facing each other at a table.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CFOs, CISOs clash over cybersecurity spending as threats mount: Expel

    Four in 10 finance leaders said quantified risk reduction would make it easier to justify a cybersecurity spending hike.

    By Alexei Alexis • Jan. 21, 2026
  • A magnifying glass rests on top of a a paper with financial charts on it.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    MSPs keep calm after Pax8 security snafu

     “It could have happened to anyone.”

    By Christine Horton, Channel Dive contributor • Jan. 20, 2026
  • Multiple padlocks encircled by white, on a blue surface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Rogue AI agents threaten MSPs

    Autonomous systems represent an attack surface existing cybersecurity services models aren't designed to protect.

    By Jan. 15, 2026
  • A person types on a laptop with a digital cloud icon above, signifying cloud storage. Arrows indicate data transfer, conveying a tech-focused theme.
    Image attribution tooltip
    Permission granted by Datto
    Image attribution tooltip
    Sponsored by Datto

    Not just a checkbox: How SaaS backup powers MSP growth

    Discover how MSPs can confidently sell SaaS backup and grow their business with smarter data protection and recovery.

    By Angela Chang, Product Marketing Specialist, Kaseya • Jan. 12, 2026
  • Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Moody’s forecasts growing AI threats, regulatory friction for 2026

    The U.S. and the EU continue to pursue starkly different regulatory agendas, the research firm noted.

    By Eric Geller • Jan. 9, 2026
  • A building with the TD Synnex corporate logo is pictured.
    Image attribution tooltip
    Retrieved from TD Synnex on January 08, 2026
    Image attribution tooltip

    TD Synnex enjoys the fruits of an ongoing hardware refresh

    The technology distributor logged a record fourth quarter, with revenue growing nearly 10% year over year to $17.4 billion.

    By Jan. 8, 2026
  • Doors are fitted and checked during production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. Jaguar Land Rover is relaunching certain operations following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risks grow as manufacturers turn to AI and cloud systems

    Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report. Experts weigh in on how to balance the costs of security infrastructure with the rapid pace of technological advancement.

    By Sakshi Udavant • Jan. 7, 2026
  • three gears surrounded by a circle on a blue surface
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    NinjaOne trains sights on Kaseya, ConnectWise in MSP platform push

    The software provider is balancing technical innovation with simplicity as it lures MSP customers from legacy management platforms.

    By Jan. 6, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Risky shadow AI use remains widespread

    A new report offers fresh evidence for why enterprises should prioritize AI governance policies.

    By Eric Geller • Jan. 6, 2026
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says

    Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.

    By Eric Geller • Jan. 5, 2026
  • Digital art of cyber threat
    Image attribution tooltip
    Permission granted by Datto
    Image attribution tooltip
    Sponsored by Datto

    From myths to margins: How MSPs can beat ransomware

    Explore how MSPs can bust common backup myths, outsmart ransomware threats and deliver real business continuity with the right tools and strategy.

    Jan. 5, 2026
  • Person using laptop
    Image attribution tooltip

    Shutterstock/ Song_about_summer

    Image attribution tooltip
    Sponsored by Datto

    Datto EDR and AV secure 99.62% malware detection efficacy

    With cyber threats constantly evolving, having reliable, robust and secure solutions for MSP’s has never been more important. Learn what sets Datto’s solutions apart.  

    Jan. 5, 2026
  • a brilliantly lit domino piece stands out amid several rows of black dominos
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    OpenText: MSPs need to think like business consultants

    The MSP model is evolving as AI, cybersecurity threats and regulation reshape the channel.

    By Christine Horton, Channel Dive contributor • Dec. 19, 2025
  • Ominous storm clouds and lightning appears in the sky.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Gaia-X warns US hyperscalers about selling cloud sovereignty

    Tech leaders at last month’s Gaia-X summit said sovereign branding can’t overcome the limits of what the cloud providers can offer European customers.

    By Christine Horton, Channel Dive contributor • Dec. 19, 2025
  • A protractor, a pencil and a building blueprint on a desk next to a laptop
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Avant, partners draw up blueprint for Court Square funding

    The company just completed the first private equity recapitalization in the history of the technology services distributor market. Its partners have ideas for putting the new investments to work.

    By Dec. 18, 2025
  • A black office chair is pushed against a conference table in meeting room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity concerns are paramount among executives in almost all roles, regions and industries

    A new survey finds widespread agreement that security is one of the biggest challenges facing companies today.

    By Eric Geller • Dec. 18, 2025
  • Male IT Server Technician Specialist Holds Laptop and Looking on Raining Script Code in Rack Sever Cabinet.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs view hybrid environments as best way to manage risk, compliance

    Security leaders are also focused on the convergence of IT and operational technology as business continuity becomes a major concern.

    By David Jones • Updated Dec. 15, 2025
  • Cyber security is compromised
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React2Shell attacks expand widely across multiple sectors

    Researchers warn that state-linked and opportunistic actors are working to exploit flaws in React’s application tools.

    By David Jones • Dec. 16, 2025