Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Iberia Airlines data breach: What customers need to know

Spain's flag carrier Iberia Airlines disclosed a significant data security incident in November 2025 that should put all customers on high alert. The breach, which occurred through a compromised third-party supplier, has exposed personal information and created new risks for travelers who have flown with the airline.

Ivy League universities under siege: The cyberattacks targeting Harvard, Princeton and Penn

The Ivy League is the promised land for thousands of high school students, but it has also become a target for cyberattackers. Three of the most prestigious universities in the United States suffered sophisticated cyberattacks in fall 2025. Harvard University, Princeton University and the University of Pennsylvania have all disclosed data breaches that compromised sensitive information about alumni, donors, students and faculty members.

The Complete Guide to Patch Management: Closing Security Gaps Before Attackers Find Them

Definition: Patch management is the continuous lifecycle of identifying, acquiring, testing, and deploying code updates to endpoints, servers, and applications to resolve security vulnerabilities and improve stability. The 5-Step Process.

When one vendor falls: The SitusAMC breach and the growing threat of supply chain attacks

Following the Jaguar-Land Rover disaster, another cyberattack has shaken a major industry. The danger of attacks on the supply chain has never been clearer. The issue now revolves around what organizations can do to protect themselves and their supply chain partners. Wall Street spent a tense weekend in late November 2025 when news broke that SitusAMC, a major technology vendor serving hundreds of real estate lenders across the United States, had suffered a significant cyberattack.

DORA compliance checklist: A guide for financial entities and their technology partners

While it shares a name with a popular cartoon character, there’s nothing cute about this DORA. The Digital Operational Resilience Act (DORA) has financial entitles and their service providers scrambling to meet DORA requirements or face fines and penalties. DORA is a cornerstone of the European Union's strategy to strengthen the financial sector against risks related to information and communications technology (ICT), although it has global implications that reach far beyond Europe.

10 smart ways to prevent identity theft

Nowadays, identity theft has become one of the fastest-growing cybercrimes. In 2024, the United States' Federal Trade Commission received over 1.1 million identity theft reports¹, which is an increase of about 9.5% compared to 2023. What's even more disturbing is the fact that more than 47% of the Americans have their personal info exposed². Sometimes one mistaken click or download is all it takes to turn your life upside down.

Why cyber resilience - not just compliance - is critical for manufacturing OT environments

Your manufacturing environment might be compliant, but that doesn't mean it's protected against a cyberattack. Even compliant systems can fall victim to cybercrime. And the consequences can be devastating. The SANS Institute sends a clear message in its 2025 State of ICS/OT Cybersecurity Survey: Regulatory compliance alone is no longer enough in operational technology (OT) environments.

Acronis SIEM Connector 2.0: Seamless Security Integration for MSPs

MSPs often rely on managed detection and response (MDR) integrations, which provides enterprise-grade security capabilities without the need for in-house analysts or complex infrastructure. As MSPs grow into medium-sized businesses, they typically expand into extended detection and response (XDR) integrations, giving greater visibility across multiple security layers (endpoints, networks and cloud) and more control over how they manage and respond to threats.

What is Cyber Resilience? A Complete Guide for MSPs

Blocking every attack is impossible. The real question is this: how fast can your clients recover when one gets through? The reality is that cyberattacks are no longer a matter of “if” but “when.” For managed service providers (MSPs), this shift has redefined client expectations. While strong cybersecurity measures are essential, they are no longer sufficient on their own. What clients need is cyber resilience. Cyber resilience moves beyond prevention to ensure continuity.

Cybersecurity vs. cyber resilience: What's the difference and which do you need?

Modern businesses run on software. That software generates data, and that data is often the most valuable part of your entire business. Businesses rightfully understand that they need to protect that data, but they don’t necessarily know what that really means. If you ask any executive whether they need to invest in cybersecurity, they’ll tell you, of course, they do.