Traceless Logo Black
  • Solutions
    • Verify
    • Data
    • AI
  • Platform
    • Pricing
    • Integrations
      • Autotask
      • ConnectWise
      • Duo
      • Jira Service
      • Microsoft Authenticator
      • Okta
      • ServiceNow
      • Slack
      • Microsoft Teams
      • Halo
      • Zendesk
  • Industry
    • Banking
    • Enterprise
    • Healthcare
    • Legal
    • MSP
  • Learn
  • Book a Demo
Log In
Log In
Sign Up
Pax8 and Traceless Are Empowering MSPs to Secure the Human Layer of Identity

Pax8 and Traceless Are Empowering MSPs to Secure the Human Layer of Identity

by Gene Reich | Jan 29, 2026 | Cybersecurity for MSPs, Solution Spotlight

As identity-based attacks continue to rise, MSPs are increasingly targeted through the human workflows that connect users, systems, and sensitive data. Social engineering, vishing, and credential theft no longer exploit infrastructure gaps alone, they exploit trust....
What the Qantas Breach Reveals About Trust and Identity

What the Qantas Breach Reveals About Trust and Identity

by Gene Reich | Aug 5, 2025 | Cybersecurity for MSPs, Qantas Breach, Scattered Spider, Social Engineering

The recent data breach at Qantas exposed the personal details of nearly six million customers. The breach was traced to a third-party call centre, not to a technical exploit like ransomware or firewall compromise. Between June 30 and July 2, attackers gained access to...
What Clorox vs. Cognizant Reveals About MSP Vulnerabilities

What Clorox vs. Cognizant Reveals About MSP Vulnerabilities

by Gene Reich | Jul 24, 2025 | Clorox and Cognizant, Cybersecurity for MSPs, Cybersecurity Threats, Reader's Choice, Scattered Spider

In a lawsuit filed this week in California state court, Clorox alleges that IT provider Cognizant Technology Solutions enabled one of the most damaging cybersecurity breaches in the company’s history, due to a lack of secure processes in routine support interactions...
Ultimate Cybersecurity Compliance Checklist

Ultimate Cybersecurity Compliance Checklist

by Gene Reich | Jun 25, 2025 | Cybersecurity for MSPs, Cybersecurity Trends

Our Key Takeaways From Pax8’s Beyond Conference

Our Key Takeaways From Pax8’s Beyond Conference

by Gene Reich | Jun 19, 2025 | Cybersecurity for MSPs, MSP Security Best Practices, Pax8 Beyond, Secure Communication

The Pax8 Beyond Conference in Denver brought together managed service providers, vendors, and IT professionals for several days of panels, product demos, and informal discussions. The event focused heavily on AI, security and the evolving role of MSPs in an...
Traceless Wasn’t Built FOR MSPs: It Was Built BY One

Traceless Wasn’t Built FOR MSPs: It Was Built BY One

by Gene Reich | Jun 13, 2025 | Cybersecurity for MSPs, MSP Security Best Practices

Before Traceless existed, I ran an MSP. In fact, I still do. I’ve spent the last decade helping clients build secure systems, lock down data, and respond to threats in real time. If you’ve ever worked in this field, you already know how unpredictable that world can...
« Older Entries
Traceless Logo 2024 White
  • Follow
  • Follow
  • Follow

Platform
Verify
Data
AI
Pricing
Integrations

Resources
Twitter’s 2020 Breach
Traceless & ConnectWise
What is Traceless?
MSP Vulnerabilities

Company
Book a Demo
Bug Bounty
Terms of Services

SOC 2 Compliant

Privacy Matters
Privacy Policy  Cookie Notice

© 2025 Traceless. All rights reserved.