Monjur for MSPs: Lawyer-approved contracts without the legal fees
Most MSPs spend thousands on cybersecurity and backup solutions but still rely on outdated contract templates downloaded from the internet, leaving them exposed to the very risks they help clients avoid. While the managed services industry has professionalized around security and cloud delivery, contract management for MSPs often remains stuck in the past. Many MSPs […]
The forgotten majority: Why ignoring SMB security weakens everyone
From clinics to contractors, small businesses hold the keys to payrolls, portals and supplier data and attackers know it! In this Perspectives piece, Cybersecurity Technical Fellow Roddy Bergeron explains why overlooking SMB security puts everyone at risk, and how the channel can reset the standard around outcomes that prove resilience. Stop pretending the castle stands […]
AI in cybersecurity for MSPs: Insights from Hacker Summer Camp 2025 at Black Hat and DEF CON
AI is reshaping the cybersecurity landscape for MSPs, from how SOCs investigate threats to how attackers exploit new tools. Cybersecurity Technical Fellow Roddy Bergeron shares his key takeaways from Black Hat 2025 and DEF CON 33 to help MSPs prepare for what’s next. Attending Black Hat 2025 and DEF CON 33 in Las Vegas was […]
Kalibr8 for MSPs: Turn cloud complexity into clarity and profit
As businesses embrace the power and flexibility of the cloud, MSPs face a critical challenge: managing its spiraling costs. The very scalability that makes cloud infrastructure so attractive can quickly become a major obstacle to profitability. With cloud adoption accelerating, you’re under immense pressure to demonstrate value beyond just deployment. You need to be a […]
You’re not losing security at the firewall. You’re losing it in the browser.
Guest writer Roddy Bergeron, Cybersecurity Technical Fellow, explores why most MSPs are losing security where it matters most: in the browser. Learn how strengthening browser security for MSPs can stop phishing attacks, protect client credentials, and prepare your cyber defenses for the next wave of threats. Where breaches really begin Cybersecurity doesn’t fail because a […]
