Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

12 Penetration Testing Myths Blocking MSP Revenue, Margins, and Client Trust

Managed Service Providers (MSPs) sit on the front line of cyber‑defence for thousands of small and midsize businesses. Yet many still hesitate to add penetration testing (pentesting) to their security stack, largely because of persistent myths—myths that are steadily being dismantled by real‑world breach data. Fresh breach evidence makes the cost of that hesitation impossible to ignore.

DoD Cyber Clause Flowdown: What Suppliers Must Do

The Department of Defense DFARS Cybersecurity Clause, more commonly known as the DoD Cyber Clause (or just DFARS 7012), is the long-standing set of rules the DoD has put in place for all members of the DoD supply chain and defense industrial base. It has also spread beyond those boundaries through the use of DFARS 7012 clauses in contracts for other parts of the federal government.

Regulations Rising, Risks Persisting: The Cybersecurity Crossroads Facing Australian Hospitality

The hospitality industry’s cybersecurity posture is approaching an inflection point. Businesses are increasingly having to balance cost pressures in a challenging economic environment, while balancing technological innovation with escalating threats. Australia’s regulatory reforms, including heightened penalties and critical infrastructure protections, provide a framework for resilience; yet enforcement gaps will remain.

Master CIS Benchmark compliance: Simplify network security with automation

As a network admin, balancing optimized configurations with compliance requirements often feels like managing competing priorities. With networks growing more complex every day, achieving and sustaining compliance with the Center for Internet Security (CIS) Benchmarks can feel like a constant uphill battle. However, it doesn't have to be an overwhelming burden. The CIS Benchmarks offer practical, best practice guidelines for securing devices, systems, and applications against evolving threats.

Performance measurements... and the people who love them

Principal Engineer Kevin Guthrie walks us through his blog post, “Performance measurements… and the people who love them,” which explores how teams can better measure, visualize, and communicate web performance—beyond just raw metrics. Part of the “This Week in NET” show/podcast.

Verifying Bots and Agents with Cryptography in the Age of AI

In this episode, host João Tomé is joined in Cloudflare’s Lisbon office by our Senior Research Engineer Thibault Meunier to explore a new proposal that could reshape how bots interact with the web in the age of AI. Timestamps: We go into Cloudflare’s proposal of using cryptographic signatures for bots, enabling websites to verify their identity. Why is this important? As AI systems rely increasingly on online content, this standard could help build a better relationship between content creators and AI platforms.

IT Auditing Secrets: Uncover Financial Shenanigans & Level Up #Cybersecurity #securecloud

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Poison everywhere: No output from your MCP server is safe

The Model Context Protocol (MCP) is an open standard and open-source project from Anthropic that makes it quick and easy for developers to add real-world functionality — like sending emails or querying APIs — directly into large language models (LLMs). Instead of just generating text, LLMs can now interact with tools and services in a seamless, developer-friendly way.