Zero-Trust Architecture: Compliance Mandate or Best Practice?

zero trust compliance cybersecurity nist

Why Zero Trust Has Become Essential The zero-trust security model flips the traditional notion of network security: instead of trusting devices and users inside a defined network perimeter, it requires continuous verification of every user and device—never trust, always verify. As threats have become more sophisticated and workforces more distributed, this approach is now a mainstream expectation, […]

$16K in Prizes. 10 Days. It’s Almost Channel Daze Time!

channel daze 2025

It’s almost that time of year again — sun’s out, energy’s up, and Channel Daze is about to kick off! Starting August 4th, we’re bringing you 10 straight weekdays of giveaways. That’s two prizes a day, from 34 awesome sponsors who just want to say thanks. It’s easy, it’s free – and it’s all for […]

Why Off-Channel Messaging Is a Compliance Risk for MSPs and Their Clients

shadow IT and compliance

Today’s businesses thrive on speed and connectivity, but the rising use of unauthorized messaging and collaboration tools — known as off-channel communications or Shadow IT — poses a growing compliance and security risk. As enforcement actions accelerate, managed service providers (MSPs) must recognize these dangers not just for their clients, but also for their own operations and […]

Threat Alert: Sophisticated Deepfake Scams Surge, Targeting U.S. Financial Sector and Enterprises

July 2025 has marked a sharp escalation in deepfake-driven cybercrime targeting U.S. financial institutions and enterprises. Attackers are increasingly using AI-generated voice and video impersonations to trick employees into transferring funds or divulging sensitive information, often bypassing even well-established security protocols. These deepfake scams have evolved beyond traditional phishing and business email compromise. In several […]

Say Goodbye to CSVs: Why Legacy Audit Reporting Holds MSPs Back

CSV spreadsheet compliance

For years, Managed Service Providers (MSPs) have leaned heavily on CSV exports to meet audit and compliance demands. Run a PowerShell script, wrangle the output, download a log, manually parse permissions — repeat for every client, every month. It’s how things have always been done. (No wonder so many MSPs still believe that compliance is […]

Bridging Visibility and Governance: What Next-Gen Compliance Should Look Like for MSPs

governance and compliance for MSPs

Modern Managed Service Providers (MSPs) face a new reality: compliance isn’t just about going through the motions for an auditor’s checklist — it’s about equipping organizations to detect, defend, and adapt to ever-evolving threats. Achieving true compliance maturity requires orchestrating both visibility into technical environments and governance through actionable, business-ready controls. Why Traditional Approaches Fall Short Many MSPs […]

Blacksmith InfoSec and Liongard Announce Strategic Integration

integration blacksmith caas with liongard

At Blacksmith InfoSec, we’ve always believed that real security outcomes should drive compliance. That’s why we’re thrilled to announce our latest integration with Liongard, a move that transforms how Managed Service Providers (MSPs) approach compliance audits. This integration empowers MSPs to automate user-centric security audits across Microsoft 365, Google Workspace, and any system connected via Liongard […]

Demystifying CMMC for MSPs

msp guide to cmmc

The Cybersecurity Maturity Model Certification (CMMC) has become a central compliance requirement for organizations in the U.S. defense supply chain. For Managed Service Providers (MSPs), understanding CMMC is essential — not only to support clients but also to ensure their own operations align with evolving Department of Defense (DoD) expectations. This article breaks down what […]

Understanding Security Policies for MSPs and IT Professionals

MSP security policies guide

Security policies are the backbone of an organization’s information security program. These policies are shaped not only by internal business needs but also by a complex landscape of federal and state regulations. Security policies define how information assets are protected, who is responsible for safeguarding them, and the standards by which compliance is measured. For […]

The Great Password Purge: Why 2025 is the Year to Finally Kill Legacy Authentication

passwordless no password future

The era of passwords could be ending — and if that’s true, 2025 marks the tipping point. With password attacks surging to 7,000 per second and legacy authentication becoming the weakest link in organizational security, the shift to passwordless methods is no longer optional but a critical business imperative. As Microsoft phases out password support in Authenticator […]

Check Out Our Compliance Podcast on Spotify!