Author Archive

Protect Against the Dangers of .zip and .mov Domains

The introduction of new top-level domains (TLDs) by Google Registry, including .zip and .mov, has raised concerns within the infosec community regarding cybersecurity risks. Deep learning and machine learning can […]

Deep Learning vs. Machine Learning

Deep learning and machine learning are both branches of artificial intelligence (AI). They involve building algorithms to analyze and make predictions or decisions based on data. However, there are some […]

Sales Tools vs. Actual Security: Differentiating Between Scans

  Imagine you’ve just purchased a certified used car. As part of due diligence, you take that car into another dealership for a full workup. That dealership tells you that […]

Cybersecurity Tools: Is More Security Better Security?

Recently, we attended several industry events. Looking around the vendor halls, there were no less than 30 vendors providing cybersecurity tools. All of them presented value and hit different portions […]

Third-Party Integrations – Productivity vs. Risk

Although a patch alleviates the threat, a vulnerability dubbed GhostToken reveals the danger of installing third-party integrations into sanctioned apps. GhostToken allowed attackers irrevocable access to an individual’s Google account […]

Onboarding – A White Glove Experience

You’re investigating a new tool and it appears to solve all the problems you’ve been facing. The value justifies the cost, but you just can’t seem to pull the trigger. […]

EDR v. Threat Hunting v. Endpoint Protection

It seems like everyone you speak with has their favorite tool –  EDR v. threat hunting v. endpoint protection. Unfortunately, this often leads to relying on one tool while ignoring […]

Is Your EDR Vulnerable?

Recently, cybersecurity experts reported that many EDRs are vulnerable to an attack that takes advantage of the “delete after reboot” command to maliciously wipe data.  Endpoint security solutions traditionally use […]

Correlation, Causation, or Checking Boxes

“I need a SIEM. I need a SOAR.” These are requests we field everyday from MSPs. Our first question is always, “What are you looking to accomplish?” Unfortunately, the vast […]

IRaaS is a Step Backward for the Channel

Over two decades ago, the IT industry began to shift from break-fix to managed services. Savvy business owners on both sides of the equation recognized that it made a lot […]

Get on the YOLO Bus AKA Find Work-Life Balance

Friday, March 4, was the National Day of Unplugging. This begs the question, when did you last really unplug? Some companies took the day off Friday, as a mandatory day […]

BLOKWORX Recognized on CRN’s MSP 500 Security 100 List

Larkspur, CA, February 16, 2022 — BLOKWORX, a channel-only master managed security provider dedicated to protecting MSPs and their end clients, announced today that CRN®, a brand of The Channel […]