Policy & Regulation


  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix NetScaler products confirmed to be under exploitation

    Security researchers at watchTowr warn that multiple flaws are involved in the early stages of a hacking spree that could rival the 2023 CitrixBleed campaign.

    By David Jones • Updated March 30, 2026
  • An executive in a business meeting room
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies face difficult choices in blaming hackers for an attack

    Publicly naming a hacking group can affect everything from retaliation to insurance coverage.

    By Eric Geller • March 25, 2026
  • President Donald Trump speaks during a White House press conference on Feb. 20, 2026 in Washington, D.C.
    Image attribution tooltip
    Aaron Schwartz via Getty Images
    Image attribution tooltip

    Trump AI policy provides a look at where legislation is headed

    The White House’s AI framework provides Congress with a “wish list,” including putting courts in charge of copyright, according to one analyst.

    By Makenzie Holland • March 23, 2026
  • A fingerprint is scanned to prevent identity theft.
    Image attribution tooltip
    Ian Waldie via Getty Images
    Image attribution tooltip

    Most organizations can’t actually recover from an identity attack: survey

    More than three-quarters of organizations aren't testing identity disaster recovery at the recommended frequency — and nearly a quarter never test at all.

    By Kelly Teal, Channel Dive contributor • March 13, 2026
  • President Donald Trump addresses reporters at the White House on March 3, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump’s new cybersecurity strategy makes promises but lacks details

    In a document released Friday, the administration vowed to increase the government’s use of AI for rapid cyber defense.

    By Eric Geller • March 9, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.

    By Eric Geller • March 2, 2026
  • Cloud computing platforms app icons for AWS, Microsoft Azure, Google cloud and other are pictured on a smartphone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Global sovereign cloud spend to increase 35.6% in 2026

    Cloud customers will seek more local infrastructure options in an effort to retain full control of their data, according to Gartner.

    By Makenzie Holland • Feb. 11, 2026
  • Kyndryl logo pictured on a wall inside the infrastructure services company's building.
    Image attribution tooltip
    Permission granted by Kyndryl
    Image attribution tooltip

    Kyndryl reassures investors as revenue flattens

    The IT services firm also revamped its finance team and commenced an audit of its cash management practices, company executives said Monday.

    By Feb. 9, 2026
  • Exterior view of Oracle's World Headquarters in Austin, Texas.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Oracle falls in line with Broadcom’s VMware license portability mandate

    The hyperscaler follows AWS, Microsoft and Google Cloud in adopting the bring-your-own-license model for VCF cloud deployments.

    By Jan. 23, 2026
  • Exterior view of and IBM building surrounded by trees in France on May 20, 2025.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IBM tackles cloud, AI sovereignty with new platform

    Built on Red Hat's open source foundation, Sovereign Core aims to inherently provide control over the environment.

    By Makenzie Holland • Jan. 15, 2026
  • Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Moody’s forecasts growing AI threats, regulatory friction for 2026

    The U.S. and the EU continue to pursue starkly different regulatory agendas, the research firm noted.

    By Eric Geller • Jan. 9, 2026
  • a brilliantly lit domino piece stands out amid several rows of black dominos
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    OpenText: MSPs need to think like business consultants

    The MSP model is evolving as AI, cybersecurity threats and regulation reshape the channel.

    By Christine Horton, Channel Dive contributor • Dec. 19, 2025
  • Ominous storm clouds and lightning appears in the sky.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Gaia-X warns US hyperscalers about selling cloud sovereignty

    Tech leaders at last month’s Gaia-X summit said sovereign branding can’t overcome the limits of what the cloud providers can offer European customers.

    By Christine Horton, Channel Dive contributor • Dec. 19, 2025
  • A black office chair is pushed against a conference table in meeting room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity concerns are paramount among executives in almost all roles, regions and industries

    A new survey finds widespread agreement that security is one of the biggest challenges facing companies today.

    By Eric Geller • Dec. 18, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates cybersecurity benchmarks for critical infrastructure organizations

    The agency streamlines and supplements goals it first issued in 2022.

    By Eric Geller • Dec. 12, 2025
  • President Donald Trump walks outside the White House on Oct. 10, 2025, in Washington, D.C.
    Image attribution tooltip
    Anna Rose Layden via Getty Images
    Image attribution tooltip

    Trump pledges order addressing patchwork of state AI laws

    The move comes after the president and big tech unsuccessfully pushed for congressional action on the issue.

    By Alexei Alexis • Dec. 9, 2025
  • The brown-and-gold seal of the Treasury Department is seen on the wall of its headquarters building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Ransomware peaked in 2023 prior to law enforcement actions

    U.S. Treasury report shows drop in threat activity in the wake of aggressive takedown efforts.

    By David Jones • Dec. 8, 2025
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Australian regulators sue Microsoft over ‘misleading’ pricing structure

    The consumer watchdog said the vendor failed to disclose the existence of a cheaper Microsoft 365 plan sans Copilot, the latest query into the company’s bundling practices.

    By Makenzie Holland • Oct. 27, 2025
  • MSSP automation amps managed service delivery, opens markets

    MSSPs are updating and broadening their technology stacks, emphasizing automation to break security service price barriers and reach new clients in a competitive market.

    By John Moore • June 27, 2025
  • Service providers pursue quantum computing security market

    Accenture, DXC and Unisys are among the companies pursuing quantum security services. They'll need to overcome competing cybersecurity concerns and an uncertain threat deadline.

    By John Moore • May 28, 2025
  • Cybersecurity market trends, from AI to post-quantum crypto

    Service executives list generative AI, the growing attack surface at the edge and post-quantum crypto standards as among the key security developments in 2024.

    By John Moore • Jan. 31, 2024
  • IT service execs point to 5 core zero-trust questions

    A partner-customer dialog around zero trust should focus on the basics of organizational awareness, upskilling, funding, technical tooling and user experience.

    By John Moore • June 6, 2023
  • IT services market size expands amid mixed economic signals

    Market watchers forecast continued growth in the tech services sector, while U.S. payrolls expand, albeit at a slower pace.

    By John Moore • April 10, 2023