Check out our Podcasts, available on Apple Podcasts, Spotify, iHeart Radio or your favourite podcast provider
EChannelNews Podcast IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
- Horizon3.ai: Autonomous Warfare and the 77-Second Attack Cycleby EChannelNews on May 6, 2026 at 12:00 pm
Send us Fan MailSnehal Antani, CEO and Co-Founder of Horizon3.ai, addressed the tactical reality of AI-driven adversary behavior. AI has drastically accelerated the attacker’s “OODA loop” (Observe, Orient, Decide, Act), citing a documented case of an autonomous compromise occurring in just 77 seconds. Beyond the technical speed, the discussion touched on geopolitical shifts, including Iranian targeting of dual-use infrastructure and a projected surge in unpatched vulnerabilities (CISA KEVs) for late 2026.To counter these hyper-automated threats, Horizon3.ai is leveraging its channel partners and MSSPs to deploy advanced defensive tactics, such as deception technology and data poisoning. By empowering partners to move beyond traditional scanning and into active, autonomous defense, Horizon3.ai aims to neutralize AI-driven exploits before they can be weaponized against civilian and corporate infrastructure.See our past interview with Horizon3: https://www.e-channelnews.com/horizon3-ai-grows-its-global-partner-program/Horizon3.ai recently released new research on how organizations measure security—and whether those metrics reflect real resilience against attackers. The findings reveal a clear gap between tracking completed work and actually stopping real-world threats.Key findings include:Only 11% of practitioners validate or patch within 24 hours of a CISA or ENISA known exploited vulnerability alert, many take a week or more to confirm if they’re even exposed93% of CISOs say they could prove their organization took reasonable, validated steps to prevent a breach, yet only 30% patch and then test to confirm the risk was actually removed97% of CISOs are confident their endpoint protection would detect lateral movement or privilege escalation, yet only 12% have validated EDR effectiveness in the last three months
- Mapping the Blast Radius: WanAware’s Actionable Observability and the OneWire Roadmapby EChannelNews on April 29, 2026 at 1:00 pm
Send us Fan MailJeff Collins, CEO of WanAware, explored the shift toward Visibility-as-a-Service (VaaS), a model designed to help MSPs manage the increasing complexity of AI-accelerated infrastructure. He defined their core value proposition as “actionable observability”—a method that moves beyond simple data collection to map the complex relationships and “blast radius” of dependencies across cloud, on-premises, IoT, and OT environments. By establishing a real-time knowledge graph, the platform can auto-discover ephemeral or developer-deployed resources that traditional scanners often miss, effectively reducing the noise of false positives that plague modern security operations.He also addressed the telemetry trap, where organizations collect massive amounts of data in silos but fail to derive automated context. WanAware’s solution uses a lightweight, no-code integrator to ingest disparate APIs and correlate them into a unified view. This architectural approach allows MSPs to capture tribal knowledge from their senior engineers and convert it into automated playbooks. These playbooks are then executed with strict AI grounding and per-action verification, ensuring that incident responses are consistent, documented, and free from the risks of manual, spreadsheet-driven workflows.
- Cybersecurity Defense Ecosystem Episode 10: Defensive Readiness in the Age of Agentic AI and Autonomous Exploitationby EChannelNews on April 20, 2026 at 4:00 pm
Send us Fan MailPresenters: Julian Lee, Publisher, Community Builder, Speaker, Channel Ecosystem Developer with a focus on cybersecurity, AI and Digital TransformationEvgeniy Kharam, Publisher, Community Builder, Speaker, Channel Ecosystem Developer with a focus on cybersecurity, AI and Digital Transformation Cybersecurity Architect | Evangelist | Consultant | Advisor | Podcaster | Visionary | Speaker |Adam Bennett, Co-Founder & CEO at SureStack CEO at Crosshair CyberRandal Wark, Owner, MTech Cyber (MSP & Cybersecurity) ★ Conference Host ★ Mastermind Facilitator ★ Podcast Host ★ JournalistThe Cybersecurity Defense Ecosystem aims to assist Managed Service Providers (MSPs) in becoming more cybersecurity-oriented amidst industry disruptions caused by AI and regulatory changes.This strategic debrief from RSAC 2026 shifted the conversation from speculative AI threats to the immediate reality of autonomous vulnerability discovery. The team analyzed the emergence of specialized AI models, such as MITOS, which have demonstrated the ability to autonomously identify long-standing zero-day vulnerabilities in minutes. This shift from human-led research to industrialized, machine-speed exploitation necessitates a radical reassessment of traditional patching cycles and defensive postures. Central to this new reality is the evolution of security health checks, which must now account for AI-driven discovery tools that bypass standard fuzzing. The consensus was that fully scanned code is no longer a valid static assumption, and architecture must instead be adapted for continuous, active vulnerability discovery.The group advocated for “assumed breach” tabletop exercises and aggressive red-teaming to interpret AI risks that legacy monitoring often overlooks. A significant portion of the session was dedicated to a warning regarding the Model Context Protocol (MCP) and delegated AI agents. While these agents reduce operational complexity, they introduce a “lethal trifecta” of data leakage, over-privilege, and the risk of being coaxed into calling over-scoped tools. To counter this, the team recommended a shift toward Outcome-as-a-Service, leveraging trusted MSP/MSSP partners to provide a human sanity check on machine-to-machine interactions.Finally, the team addressed the immediate dangers of Shadow AI and unauthorized data exposure to public LLMs. The recommended defense-in-depth strategy focuses on achieving basic hygiene at scale, including a move toward sub-72-hour patching windows for critical flaws. By utilizing AI for defensive purposes—specifically for Active Attack Path Management—organizations can begin to match the speed of modern adversaries.
- The Service Delivery Edge: BCN’s Blueprint for MSP Success in 2026by EChannelNews on April 8, 2026 at 1:00 pm
Send us Fan MailIn this episode, we sit down with Tom Boggs, VP of Service Delivery at BCN, to explore why the modern MSP battleground has shifted from basic connectivity to high-level service execution. With over 30 years in the game, BCN is positioning itself as a leader in managed technology solutions—ranging from SD-WAN and SASE to full-lifecycle managed services.Tom breaks down how BCN moves beyond traditional technical metrics by utilizing Experience-Level Agreements (XLAs). By blending real-time customer feedback with process data, BCN ensures that uptime actually translates to a positive user experience. We also discuss the ideal BCN customer—multi-site enterprises requiring robust connectivity overlays—and how BCN is cautiously but effectively integrating AI. From self-healing SD-WAN networks to internal project onboarding tools, Tom highlights a pragmatic approach to innovation that prioritizes data privacy over open AI risks.
- Kognitos and the Rise of the Neuro-Symbolic Operating Systemby EChannelNews on April 2, 2026 at 4:00 pm
Send us Fan MailBinny Gill, Founder & CEO of Kognitos, introduced its neuro-symbolic platform, a cognitive operating system designed to bridge the trust gap in enterprise AI. Unlike traditional generative models that rely on probabilistic “guesses,” Kognitos utilizes a neuro-symbolic architecture that executes business processes deterministically. By separating AI-driven reasoning from a symbolic execution layer, the platform ensures that mission-critical workflows—particularly in audit-sensitive areas like finance and revenue—run exactly as documented, effectively eliminating hallucinations and “logic rot.”Binny also highlighted a shift in adoption strategy: rather than leading with code, organizations are encouraged to document tribal knowledge in plain English, which the platform then converts into auditable, executable logic. This approach allows partners and Global Systems Integrators (GSIs) to transition into AI-native practices, moving away from fragile RPA bots toward self-healing, automated factories. With internal examples showing engineering and marketing pipelines shifting to AI-generated code under human-set governance, Kognitos positions itself as the essential layer for translating market noise into reliable, high-ROI enterprise operations.










