08 May, 2026
Key Points Supply chain cyber attacks compromise trusted vendors to reach downstream organizations through legitimate channels. Malicious code hides inside approved software, updates, and third-party services. One compromised provider can expose thousands…
View the video of this post here. This week’s post is sponsored by YCharts. Is the AI boom a bubble… or the early innings of a supercycle? Join me and YCharts…
Proving that security is improving is just as important as the improvements themselves. However, it’s not always practical or necessary for many MSPs and IT teams to invest in a…
View the video of this post here. 📊 Charts that don’t need a PhD to understand.🌎 Big-picture thinking without the TV drama.🎯 Insights you can actually use. Subscribe to our YouTube…
Key Points NinjaOne vulnerability management uses AI to continuously analyze endpoint telemetry and correlate it against the latest CVE disclosures. AI-driven software identification detects software artifacts across endpoints, strengthening endpoint…

General election 2024: What SMEs need to know

Major change is predicted, so make sure your business is ready for upheaval. The business environment has been buffeted by change in the last few years: Covid and remote working, digital transformation and supply chain issues, Brexit, cost of living and volatile interest rates… Businesses that have survived through the last five years are businesses […]

5 mins read