AI in cybersecurity for MSPs: Insights from Hacker Summer Camp 2025 at Black Hat and DEF CON
AI is reshaping the cybersecurity landscape for MSPs, from how SOCs investigate threats to how attackers exploit new tools. Cybersecurity Technical Fellow Roddy Bergeron shares his key takeaways from Black Hat 2025 and DEF CON 33 to help MSPs prepare for what’s next. Attending Black Hat 2025 and DEF CON 33 in Las Vegas was […]
You’re not losing security at the firewall. You’re losing it in the browser.
Guest writer Roddy Bergeron, Cybersecurity Technical Fellow, explores why most MSPs are losing security where it matters most: in the browser. Learn how strengthening browser security for MSPs can stop phishing attacks, protect client credentials, and prepare your cyber defenses for the next wave of threats. Where breaches really begin Cybersecurity doesn’t fail because a […]
NordLayer: Fast, flexible network security for MSPs
Hybrid work has become the new normal, but many MSPs still rely on traditional VPNs and firewalls that simply weren’t built for today’s distributed environments. With users accessing cloud applications and sensitive data from multiple devices and locations, security gaps and management complexities are emerging. Protecting this modern, hybrid workplace requires a fresh approach to […]
Ransomware isn’t the only risk — why true cyber resilience starts with who you trust
Guest writer Roddy Bergeron, Cybersecurity Technical Fellow, explores how Managed Service Providers (MSPs) can strengthen their vendor risk management strategies and build true cyber resilience. Learn how to protect your clients and your trust before the next threat tests your supply chain. Every MSP knows ransomware isn’t going anywhere. It’s evolved from a rare catastrophe […]
NordPass for MSPs: Simplify security with multi-tenant password management
Password resets. Account lockouts. Insecure spreadsheets. If this sounds all too familiar, you’re not alone. For many MSPs, managing credentials across dozens of clients is a major operational drain and a significant security blind spot. Weak and reused passwords remain a primary entry point for data breaches and put your clients at constant risk. And […]
