Operations | Monitoring | ITSM | DevOps | Cloud

Unleashing Protective DNS: The First Line of Cyber Defense You're Still Underestimating

Many cyber threats - like phishing, ransomware, and shadow IT - start at the domain layer. But too many security stacks only respond once the damage is done. In this on-demand webinar, Mikey Pruitt, Partner Evangelist at DNSFilter, shares insights, practical examples, and a live demo to show why DNS-layer protection is no longer optional - especially for MSPs and IT teams. Watch as Mikey breaks down.

Inside Our Security Masterclasses: Practical Insights for Cyber Resilience and Identity Protection

Explore an overview of our Security Masterclass series led by Stefanie Hammond, designed to help MSPs and IT professionals understand today’s evolving cyber threats and how to address them effectively. This video highlights two key sessions: Ideal for teams looking to deepen their cybersecurity knowledge or organizations aiming to enhance their security offerings with clear, practical guidance.

Threat Hunting Explained: See It in Action, Learn How It Works

Most IT and security professionals have heard of threat hunting – but few have seen it in action or fully understand how it works in the real world. That’s about to change. In this on demand webinar, Jim Waggoner and Kevin O’Connor guide you through a hands-on threat hunting session, showing how they identify, investigate, and surface hidden threats across cloud and endpoint environments. You’ll learn.

Deepfakes, Disguises, & Deliveries: How Rob Shapland Uses Social Engineering to Shape Cybersecurity

Modern cyberattacks aren’t just technical—they’re personal. And Rob Shapland knows how to exploit the human element better than anyone. In this episode, Chris Massey sits down with Rob to unpack the wild world of social engineering—from sneaking into corporate offices disguised as a delivery driver to using AI voice clones to bypass MFA. With over 200 successful break-ins (all authorized, of course), Rob shares what IT leaders and MSPs are still getting wrong—and how to fix it.

N-central 2025.3 Release Roundup

Jason Murphy, Head Nerd at N-able, walks you through the latest features released in 2025.3 Audit Log Expansion – Now track Discovery Job creation and edits via Syslog Improved Session Enforcement – Auto-invalidate sessions when SSO configurations change Device Import Safeguards – Warnings for discovery pre-check failures Duplicate MAC Filtering – New UI for managing reused MACs in discovery CMMC Progress – Continued development for DoD-aligned, on-prem environments.

Cove 25.6 Release - Focusing on Efficiency, Reliability, and Resilience

We’re excited to talk about all the innovative updates in the 25.6 release for Cove Data Protection! This release focuses on improving Ease of Use, Recovery Reliability, Microsoft 365 Backup and Recovery, and Linux System State Support - enhancing your peace of mind and cyber resilience.

Inside Vulnerability Management: Live Demo & Roadmap

Explore what’s new — and what’s coming next — in Vulnerability Management for N-central and N-sight. Hosted by Product Manager Geoff Green, this session covers current capabilities, recent enhancements, and a look at the roadmap. Watch the live demo, hear how your feedback is shaping development, and get answers to top questions in the live Q&A. Now included in both N-central and N-sight RMM platforms.

Regulation Nation: The what, when, why and how of the new CMMC for MSPs

As the cybersecurity landscape continues to evolve, the U.S. Department of Defense (DoD) is ramping up efforts to ensure that contractors and their vendors adhere to robust security standards. One of the key initiatives driving this transformation is the Cybersecurity Maturity Model Certification (CMMC). But what does CMMC mean for Managed Service Providers (MSPs) and IT shops, and how can you ensure your business is prepared to meet these new compliance requirements?