Data Center Edge

bg
Deep Dive: Protecting Against Container Threats in the Cloud

Deep Dive: Protecting Against Container Threats in the...

A deep dive into securing containerized environments and understanding how they...

bg
Security Turbulence in the Cloud: Survey Says…

Security Turbulence in the Cloud: Survey Says…

Exclusive Threatpost research examines organizations’ top cloud security concerns,...

bg
Firms Push for CVE-Like Cloud Bug System

Firms Push for CVE-Like Cloud Bug System

Researchers propose fresh approaches to cloud-security bugs and mitigating exposure,...

bg
Zero-Trust For All: A Practical Guide

Zero-Trust For All: A Practical Guide

How to use zero-trust architecture effectively in today's modern cloud-dependent...

bg
Protect Your Executives’ Cybersecurity Amidst Global Cyberwar

Protect Your Executives’ Cybersecurity Amidst Global Cyberwar

In this time of unprecedented cyberwar, organizations must protect the personal...

bg
Rethinking Cyber-Defense Strategies in the Public-Cloud Age

Rethinking Cyber-Defense Strategies in the Public-Cloud...

Exploring what's next for public-cloud security, including top risks and how to...

Industry News

Why Thoma Bravo Avoided A Bidding War to Buy Datto

Exclusive: Why ConnectWise owner Thoma Bravo scaled back its view on Datto's valuation, ultimately leaving Kaseya/Insight Partners...

Industry News

How Kaseya Outbid Six Firms to Buy Datto: Inside the M&A...

Kaseya, Insight Partners & six other private equity firms each explored buying Datto. The M&A race started in November 2021. Here's...

Industry News

Government IT Solutions Provider Axiologic Acquires Data...

The acquisition of Data Intelligence Technologies broadens Axiologic’s advanced technology expertise in 5G, SIGNT, RF, analytics and...

Industry News

Robotic Process Automation (RPA) M&A: Impact Makers Buys...

IT consulting & services merger focuses heavily on robotic process automation (RPA) software deployments & workflow automation. The...

Industry News

Getting Email Security Right: The MSP Perspective

Here are three types of Business Email Compromise (BEC) attacks, and steps MSPs can take to improve email security for their customers,...

Industry News

The Truth About Managing Macs With an RMM Tool

Selecting the right Apple device management solution can help improve your MSP's efficiency & profits, Addigy CEO Jason Dettbarn asserts....

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.