MSP Technology News Headlines for the week of 3/9/2026
GTIA’s PeerTrust Circles, their latest peer collaboration initiative, leads this week’s headlines, followed closely by Huntress’ updates to their global partner program. But, don’t miss the news from ESET and HP, plus a slew of interesting reports and research touching on all aspects of the industry.If you’re ready for a quick rundown of this week’s MSP news and partner program updates, scroll on down!
GTIA Launches PeerTrust Circles to Foster Trust-Driven Collaboration Among IT Service Providers
New program connects IT service provider leaders in small peer groups to collaborate on trust, resilience, and cybersecurity maturity.
Key quote from the press release:
“GTIA is proud to introduce the PeerTrust Circles program as a new member benefit. Peer collaboration has always been an integral part of the GTIA mission, and this program responds to our members’ desire to come together in more intimate and impactful ways. This program elevates members by placing trust, resilience, and security maturity at the center of the experience. By aligning trust metrics with our Cybersecurity Trustmark standards, participants gain meaningful, practical insight that strengthens both their organizations and the wider channel community.” — MJ Shoer, chief community officer, GTIA
More ChannelPro Coverage from GTIA’s Communities and Councils Forum:
➡️ GTIA Leaders Lay Out Their 2026 Vision at CCF: Growth, Community, and Circles
More from GTIA:
➡️ GTIA Reveals Winners of the 2026 North America Spotlight Awards
Huntress Expands Global Partner Program, Democratizing Cybersecurity for Businesses of All Sizes
Expanded program brings reseller partners into the Huntress ecosystem to extend enterprise-grade protection to organizations beyond the Fortune 1000.
Key quote from the press release:
“Cybercriminals are relentless and opportunistic, disproportionately targeting the most vulnerable businesses regardless of size or industry. Together, Huntress and our partners are the global force multiplier that makes protection possible for those most often left behind. Our reseller partner program is now live, and provides access to enterprise-grade security, purpose-built to catch what others miss, without constant false positives and alert fatigue. This enables them to differentiate their tech offerings, drive profitable business growth, and deliver tangible security outcomes. We are looking for partners who want to join our collective hunt and protect the 99%.” — Tuan Nguyen, vice president, channels and alliances, Huntress
ESET Launches eCrime Reports to Give Security Teams a Strategic Edge Against Modern Cybercriminal Groups
New intelligence reports provide deep analysis of ransomware and infostealer activity to help defenders anticipate attacks and strengthen cyber defenses.
Key quote from the press release:
“For over 30 years, ESET has helped governments, channel companies, and businesses stay protected from the world’s most advanced cybersecurity threats. Our newly launched eCrime Reports combine technical depth with functional defense guidance – based on feedback from ESET’s threat researchers around the world. This means law enforcement, IT, and security teams don’t just read about threats; they gain insights needed to anticipate attacks, close gaps, and strengthen defenses proactively. Focused on ransomware and infostealers, these eCrime reports help organizations to strengthen their overall cybersecurity postures, particularly in high-stakes environments.” — Roman Kováč, chief research officer, ESET
Intruder Research – The Security Middle Child Report

Intruder research highlights how cybersecurity tools and services often overlook midmarket businesses despite their growing exposure to cyber risk.
Key findings from the report include:
- Midmarket organizations face the same attack surface and threat landscape as large enterprises but typically lack the budgets, staff, and tooling to defend themselves effectively.
- Security vendors frequently prioritize enterprise customers, leaving midmarket firms underserved and with fewer tailored solutions.
- Many midmarket companies rely on smaller IT and security teams that juggle multiple responsibilities, creating operational gaps in monitoring, remediation, and response.
HP Unveils New Innovations at Dscoop Edge Rockies to Unlock Profitable Growth for Print Service Providers

HP introduces AI-driven software, automation tools, and press innovations to help PSPs increase productivity, streamline workflows, and scale digital print operations.
Key quote from the press release:
“As digital print scales to meet new demands, our customers are no longer buying presses alone. They’re investing in outcomes: predictable productivity and speed at scale. At Dscoop Edge Rockies, we’re showing how our commitment to Nonstop Digital Printing delivers those outcomes by connecting press innovation, intelligent workflows, and AI driven reliability across the entire production lifecycle.” — Haim Levit, senior vice president and division president, HP Industrial Print
ISC2 Women in Cybersecurity Study: Workplace Perceptions and AI Skills Preparation

New ISC2 research examines how women in cybersecurity view workplace conditions, career advancement, and the growing importance of AI-related skills.
Key findings from the report include:
- Women represented 16% of the 16,029 global respondents to the latest ISC2 Cybersecurity Workforce Study.
- Layoffs, advancement freezes, and longer recruitment cycles are creating job insecurity for many cybersecurity professionals, disproportionately affecting women’s career progression.
- Ongoing workforce restructuring can limit opportunities for women to develop new cybersecurity and AI-related skills needed for evolving roles.
Cribl Unveils Agentic AI Enhancements to Cribl Search
New AI-native log intelligence solution helps security and IT teams investigate faster and manage telemetry for AI-driven workloads.
Key quote from the press release:
“The age of agentic AI is here, driving expectations for productivity sky-high, but legacy log platforms are simply not equipped to handle the exponential data and query growth from AI agents. Organizations are constrained by platforms that are too expensive, too rigid, and too fragmented to keep up. Cribl Search, built on agentic telemetry, is the essential new architecture that closes this gap, doubling speed while empowering security and IT teams to automate data normalization, add human context to any situation, and move at the speed of AI.” — Clint Sharp, co-founder and CEO, Cribl
AvePoint Announces General Availability of AgentPulse Command Center with Multicloud Agentic AI Governance
New command center gives organizations unified observability and governance for AI agents operating across Microsoft and Google cloud environments.
Key quote from the press release:
“We’ve reached a turning point for agentic AI adoption at the enterprise level. Organizations are no longer exploring whether or not to deploy AI agents; they’re now trying to do this responsibly and at scale. AgentPulse makes this possible by giving organizations the visibility they need to ensure that every agent operates as efficiently as possible, within governance guardrails, and without hidden costs.” — John Peluso, chief technology officer, AvePoint
Actian Unveils Conversational Analytics Solution with Intelligently Generated Semantic Foundation for Trusted Insights
New Actian AI Analyst combines AI-driven analytics with a governed semantic layer to deliver accurate, auditable business insights.
Key quote from the press release:
“Increasingly, enterprises are embedding AI into analytics workflows to accelerate insight generation and decision-making, but speed without trust is a liability. Unlike error-prone text-to-SQL tools, the Actian AI Analyst is anchored in governed enterprise data and engineered for full traceability, allowing organizations to scale analytics access for business users without sacrificing accuracy or trust.” — Guillaume Bodet, chief product officer, Actian
Armis Announces Armis Centrix™ for Vulnerability Management Detection and Response to Reduce Cyber Risk and Eliminate Operational Friction
New solution enables continuous vulnerability detection across the entire attack surface while reducing scan volume and operational impact.
Key quote from the press release:
“Waiting weeks for a vulnerability scan that still misses essential assets is no longer sufficient to combat AI-powered cyberattacks. Organizations need a continuous view of their complete environment to stay ahead of threats. Armis’ new solution delivers more accurate, targeted results than traditional vulnerability management solutions with a fraction of the scans. It empowers security teams to shift from a reactive approach that relies on stale data to targeted, real-time vulnerability detection, allowing them to save time, enhance efficiency and fortify their defenses.” — Nadir Izrael, CTO and co-founder, Armis
2026 Annual IT Solution Provider Compensation Report

Service Leadership research examines compensation benchmarks, wage trends, and workforce strategies among global IT solution providers.
Key findings from the report include:
- Wage inflation for IT solution providers peaked in 2022 and has improved significantly since then.
- Top-performing IT solution providers awarded fewer large pay increases in 2025 compared with lower-performing organizations.
- Hybrid work remains the dominant operating model across the IT services industry.
- Demand for advanced technical roles continues to grow globally.
LastPass Expands Its Mission Beyond Passwords to Deliver Secure Access Essentials for Every Business and User
New Secure Access Essentials approach helps organizations discover unmanaged apps and AI tools, control access across users, and simplify secure sign-ins from the browser.
Key quote from the press release:
“In a world where businesses and people rely on more apps and AI tools than ever before, securing access has become both essential and even more complicated. Customers tell us they need security that gives them control without slowing anyone down. Secure Access Essentials delivers simple, foundational access protection that helps keep every user, every app and every AI tool secure from the place people already work — the browser.” — Don MacLennan, chief product officer, LastPass
Fortinet Updates Engage Partner Program to Drive Platform Growth and Partner Value
Program enhancements reward partners for lifecycle contributions while helping them expand services revenue and platform expertise.
Key quote from the blog post:
“Success is no longer defined by individual product purchases but by measurable outcomes across the entire environment. These shifts are also changing how partners engage with customers.” — Fortinet
ColorTokens Introduces Xshield AI Agent to Eliminate Microsegmentation Complexity and Accelerate Breach Readiness
New AI-driven capability automates microsegmentation policy design and enforcement to help organizations contain threats faster and reduce attack surface.
Key quote from the press release:
“Microsegmentation has historically been powerful but operationally complex. Xshield AI Agent removes that friction. By automating policy design and refinement, we enable security teams to move from visibility to enforcement nearly instantly — keeping pace with increasingly agile adversaries.” — Rajesh Khazanchi, co-founder and CEO, ColorTokens
Komodor Launches Global Partner Program to Accelerate AI-Driven Reliability and Cost Optimization at Scale
New initiative enables service providers to deliver resilient, cost-optimized cloud-native applications using Komodor’s AI SRE platform.
Key quote from the press release:
“Enterprise cloud native environments move at machine speed, but many partners are still forced to support them with fragmented tools and manual workflows. The Komodor Partner Program changes that dynamic. We give partners a proven, AI-driven SRE and cost optimization platform, backed with enablement, deal protection, and meaningful margins, so they can deliver more resilient and cost optimized outcomes for customers and measurable results.” — Peter Dalziel, channel director, Komodor
Flashpoint 2026 Global Threat Intelligence Report

Flashpoint research highlights how agentic AI and converging cybercriminal tactics are accelerating global threat activity
Key findings from the report include:
- Cybercrime is entering an “era of total convergence,” where multiple attack stages—from reconnaissance to credential testing—can be executed autonomously by AI-driven systems.
- Illicit discussions about AI tools on underground forums surged by roughly 1,500% between November and December 2025.
- Infostealer malware infected about 11.1 million devices in 2025, enabling attackers to steal roughly 3.3 billion credentials and cloud tokens.
Netskope One AI Security
New Netskope research highlights the need for unified security and governance across rapidly expanding enterprise AI ecosystems
Key findings from the report include:
- Netskope One AI Security provides discovery, visibility, and real-time control of AI applications, models, agents, and tools used across organizations.
- The platform analyzes AI-specific risks and helps organizations accelerate secure AI adoption across their entire ecosystem through a unified security framework.
- Netskope One AI Guardrails help prevent emerging AI threats such as prompt injection and model jailbreaking while moderating LLM interactions.
Identity Verification Emerges as a New Enterprise Standard

HYPR’s 2026 State of Passwordless Identity Assurance report examines how AI-driven identity threats and deepfakes are forcing organizations to adopt stronger identity verification practices.
Key findings from the report include:
- 87% of organizations report encountering audio or video deepfakes used in identity-based attacks.
- 64% of security leaders now consider FIDO passkeys the “gold standard” for authentication, up from 40% previously.
- Despite rising awareness, enterprise-wide passkey adoption remains limited at 43%.
Zero Networks Launches Industry-First Map of the Enterprise Network for Real-Time Visibility and Response

Network Map 2.0 delivers a continuously updated, real-time view of enterprise environments to help security teams detect lateral movement and respond faster.
Key quote from the press release:
“Network Map 2.0 capability replaces static, point-in-time visualizations that must be generated on demand with a continuously updated, living map of the enterprise. Unlike legacy microsegmentation approaches that rely on delayed, point-in-time analysis of historical data, Network Map 2.0 operates in real-time. It continuously ingests, normalizes, deduplicates, and correlates network activity so the environment is always current, always mapped, and immediately actionable. The result is real-time east-west clarity, not retrospective analysis.” — Zero Networks
Canada: Bell Cyber Launches CyberShield Connect for Canadian Small and Medium Businesses
Fully managed cybersecurity service powered by WatchGuard’s Unified Security Platform expands enterprise-grade protection for Canadian SMEs.
Key quote from the press release:
“Cyber resilience today is less about deploying more tools and more about having the team with the right expertise operating them continuously. With CyberShield Connect, we’re applying Bell Cyber’s managed security experience and national infrastructure to help Canadian SMEs achieve enterprise-level protection in a way that’s practical, scalable, and aligned with how they actually operate.” — John Menezes, president, Bell Cyber
As ChannelPro’s online director and tech editor for over a decade, Matt Whitlock has spent years blending sharp tech insight with digital know-how. He brings more than 25 years’ experience working in the technology industry to his reviews, analysis, and general musings about all things gadget and gear.
Images: Intruder, HP, ISC2, ConnectWise, Flashpoint, HYPR, Zero Networks












