MSP Technology News Headlines
Wildix’s New Agentic AI for UCaaS leads the headlines for this week. There’s also a lot of other interesting technology news from all over the industry. From compliance to acquisitions to partner program enhancements, you’ll want to stay in the know. Ready for a quick rundown of this week’s MSP news and partner program updates? Scroll on down!
Wildix Rolls out Fully Embedded Agentic AI for UCaaS that’s Modular, Codeless, Autonomous
Real-time, codeless automation with shared memory, native privacy controls and proven ROI, now live in 1,000+ environments.
Key quote from the press release:
“Organizations are under pressure to accelerate service, reduce costs and improve responsiveness. This release is designed to meet those expectations immediately. Our AI doesn’t just assist. It executes, adapts and integrates natively into existing workflows with zero disruption.” — Dimitri Osler, co-founder and CIO, Wildix
IAM Maturity Lags Across Most Organizations, GuidePoint Security Report Finds
New Ponemon Institute report commissioned by GuidePoint Security reveals IAM programs are underfunded, underdeveloped and misaligned with cybersecurity threats.
Key findings from The State of Identity and Access Management (IAM) Maturity Report:
- IAM is underfunded and underdeveloped. Only 50% of respondents believe their IAM tools and investments are effective. Investments in IAM trail behind other security priorities.
- Manual processes and expertise gaps are barriers to maturity. A lack of appropriate technologies (54%), in-house expertise (52%) and resources (45%) are cited as top challenges to achieving IAM maturity. Many organizations still rely on spreadsheets, scripts and other manual efforts.
- IAM maturity is a path to enhanced security. A small group (23%) of organizations that have invested in automation and advanced IAM technologies report fewer security incidents and stronger identity controls. They lead in adopting biometric authentication, identity threat detection and integrated governance platforms.
- IAM implementation is misaligned with security goals. Surprisingly, 45% of respondents say the primary driver for IAM investments is to improve user experience—not security.
- There is a disconnect in program perception and reality. While most organizations report having policies in place or in development (83%), only 28% have these policies integrated into their IAM platforms.
Quorum Cyber Uncovers 2 Variants of Remote Access Trojan Malware: NodeSnake
Quorum Cyber’s threat intelligence team has identified two new variants of a remote access trojan (RAT) tracked as NodeSnake, believed to be targeting local government and higher education.
Key quote from the press release:
“We have observed threat actors increasingly targeting universities this year to exfiltrate valuable intellectual property, including research data, and possibly to test and hone new tactics, techniques, and procedures before potentially applying them in other sectors. Theft of research data suggests an espionage motivation, and as such our threat intelligence team continues to monitor Interlock and its use of the NodeSnake variants so that we can advise organizations across sectors on practical steps they can take to prevent the theft of their intellectual property.” — Paul Caiazzo, chief threat officer, Quorum Cyber
DragonForce Actors Target SimpleHelp Vulnerabilities to Attack MSP, Customers
Ransomware actor exploited RMM to access multiple organizations; Sophos EDR blocked encryption on customer’s network.
Key info from the press release:
- Sophos MDR responded to a targeted attack involving a managed service provider (MSP).
- In this incident, a threat actor gained access to the MSP’s remote monitoring and management (RMM) tool, SimpleHelp, and then used it to deploy DragonForce ransomware across multiple endpoints.
- The attackers also exfiltrated sensitive data, leveraging a double extortion tactic to pressure victims into paying the ransom.
Epson to Demonstrate High-impact Visual Experiences with Cutting-edge Display Technology at InfoComm 2025
Epson Booth to feature ultra-sharp 4K resolution, innovative fixed-lens models, short throw versatility, and dynamic interactive solutions.
Key quote from the press release:
“Over the past few years, we’ve seen tremendous growth in immersive experiences, and projection continues to play a key role in creating new and exciting installations that leave lasting impressions. This year, we aim to deliver a few unforgettable ‘wow’ moments at Epson’s booth. Highlighting our breadth of projection technology, we’ll explore many different applications and show how projection can transform common spaces — from an all-encompassing immersive environment to a projection-mapped building.” — Ramzi Shakra, senior product manager, Epson America Inc.
Secureframe and Coalfire Unite to Fast-track CMMC 2.0 Certification
Strategic partnership launches with free CMMC resources as Department of Defense implementation deadlines approach.
Key quote from the press release:
“By joining forces with Coalfire, we’re creating the definitive path to CMMC 2.0 certification. Our combined solutions eliminate the fragmentation and complexity organizations typically face when preparing for CMMC assessments, dramatically reducing time to certification while ensuring the highest standards of cybersecurity readiness.” — Shrav Mehta, founder and CEO, Secureframe
Cyware Survey: 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It
Cyware survey identifies significant gaps in internal collaboration, tool integration, and automation — with only 13% confident their systems currently work well.
Key findings from the press release include:
-
- Internal Collaboration, Automation Maturity Remain Major Gaps: While 92% of respondents said threat intel sharing is “absolutely crucial” or “very important,” only 13% said their automation between CTI and SecOps tools is working well.
- AI Optimism Is High, Implementation Still Uneven: 78% of respondents believe AI will improve threat intel sharing within their organization, but only 43% say it’s made a meaningful impact so far.
- Threat Intel Sharing Not in Real Time: Only 17% of teams share threat intel across roles like SecOps, IR, and vulnerability management in real time, while another 25% do so daily. 22% reported sharing information rarely or not at all.
- External Threat Intel Sharing Collaboration Has Room for Improvement: While 57% of respondents said their organization collaborates with industry peers to improve threat intel, 30% were unsure if such collaboration even exists.
- Automation Gaps Persist: More than half of respondents (56%) reported either significant or moderate challenges automating workflows across CTI and SecOps teams.
- ISAC Participation Is Low or Unknown: Only 18% confirmed that their organization is part of an Information Sharing and Analysis Center (ISAC) or Organization (ISAO), while 45% said they didn’t know. That lack of clarity could be limiting access to valuable sector-specific threat insights, further compounding intelligence silos.
Xthings Launches Major Upgrade to SECU365 Smart Workplace Management Platform, Available Now For Free to the First 50 Qualified SMB Users
AI-powered solution redefines cost-effective security for small businesses.
Key quote from the press release:
“Where traditional security systems can bankrupt SMBs with complexity, SECU365 turns AI into a force multiplier,” said Patrick Serrato, Xthings’ Director of Ecosystem Business Development and Product Strategy “Our users will pioneer a new era – where a 10-person startup can afford enterprise-grade protection that actually improves their bottom line.” — Patrick Serrato, director of ecosystem business development and product strategy, Xthings
AI Is Core to Strategy for 86% but Most Are Stuck in Data Complexity
New research underscores urgency for organizations to bridge the gap between AI ambition and real-world results, as Qlik debuts capabilities to enable trusted AI at scale.
Key stats from the survey of business leaders conducted in April:
- Nearly 87% of respondents describe executing with AI as no longer optional, but core to their competitive strategy.
- Around 74% report infrastructure costs, disconnected data silos, or slow data ingestion as their biggest barriers to effectively scaling AI.
- Seven in ten organizations struggling with data integration specifically cite complex toolchains and fragmented data sources as their primary roadblocks.
Most U.S.-based Channel Companies Grapple with Tariff Impacts, per Global Technology Industry Association
The Channel Economic Tracker highlights the complex landscape faced by businesses today.
Key quote from the press release:
“There’s a lot of uncertainty about how, when, and if tariffs will impact the tech industry as a whole and the channel specifically. With so many small businesses in the channel, even slight increases on the cost of goods or supply chain disruptions can have a huge downside effect on their everyday operations and customer pricing. GTIA launched this tracker to go directly to the source: ITSPs, MSPs, resellers etc. to assess how tariffs are or are not affecting them today and over time.” — Carolyn April, vice president of research and market intelligence, GTIA
Sage Scales Embedded Services to North America and Europe to Help Platform Partners Serve SMBs Better
Meeting the rising demand for unified solutions, Sage positions platform partners to lead in their market by embedding accounting directly into everyday workflows for small businesses.
Key quote from the press release:
“Today’s small businesses are demanding seamless, all-in-one solutions that streamline daily operations and manage money in real time within their natural digital habitat. By expanding embedded services across multiple regions, Sage is meeting the needs of banks and platforms looking to deliver accounting capabilities at the heart of the apps small businesses use every day.” — Gordon Stuart, senior vice president operations, fintech & embedded services, Sage
NordSec Warning: Microsoft Begins Authenticator Password Phase-out This Weekend. Act Before You Lose Access to Your Accounts.
A friendly and somewhat urgent reminder to all Microsoft Authenticator users – starting June 1, you will no longer be able to save new passwords in Authenticator.
Phase-out timeline from NordSecurity:
- From June 2025, you will no longer be able to save new passwords in Authenticator.
- From July 2025, the autofill function will stop working.
- From August 2025, your saved passwords will no longer be accessible in Authenticator.
- Starting July 2025, all credit card details and payment information will be removed from Authenticator. According to Microsoft, payment details won’t transfer automatically to Edge or other services. You will need to re-enter your information manually. It doesn’t matter whether you choose Edge or a dedicated password manager solution.
Snyk Announces 1st AI Trust Platform to Revolutionize Secure Software Development for the AI Era
New platform leverages and secures agentic and generative AI to empower organizations to unleash innovation while reducing business risk.
Key quote from the press release:
“Snyk was founded with a mission to disrupt the legacy AppSec industry with what was previously an unconventional concept, putting security in the hands of developers. This is now considered an industry best practice. With today’s launch, we’re disrupting the status quo again and charting the course for Snyk’s next decade of innovation. AI should be welcomed, not feared, but it’s up to us to help our customers navigate this new world order — securely.” — Peter McKay, CEO, Snyk
Images: Snyk, Epson, Sophos, Wildix