Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Double your cloud power: Acronis True Image Premium now offers a massive 10TB!

As an Acronis user, you understand the importance of safeguarding your digital life. Whether you're a photographer with an ever-growing library of high-resolution images, a videographer churning out terabytes of footage, a content creator managing countless projects or a power user with multiple virtual machines and a home lab, the need for ample, secure cloud storage is constant. You want one reliable place for all your data, without the hassle of juggling multiple tools and accounts.

UK Cybersecurity and Resilience Bill Provides a New Era of Accountability for Critical Infrastructure

The UK Government’s Cybersecurity and Resilience Bill marks a significant shift in how the nation safeguards critical infrastructure. The Bill moves beyond voluntary measures and fragmented self-regulation and introduces a mandated framework for resilience, signalling that cyber protection is now a strategic obligation for many sectors including healthcare, critical national infrastructure (CNI) transport and digital infrastructure.

Government contracting compliance 101: Everything you should know

Organizations that work with the US government must adhere to strict procedures covering procurement protocols, non-discrimination policies, and rigorous cybersecurity. That’s because working with government agencies often involves handling sensitive and legally protected data, and failure to comply can result in financial and legal consequences.

VMware License Cost Changes: What You Need to Know

Broadcom’s VMware acquisition brought massive pricing changes that caught most IT departments off guard. The company eliminated perpetual licenses, forcing everyone into subscription models while implementing steep VMware license cost increases and new minimum core requirements. These aren’t minor adjustments: Broadcom restructured the entire VMware license pricing model.

Ingress Security for AI Workloads in Kubernetes: Protecting AI Endpoints with WAF

For years, AI and machine learning workloads lived in the lab. They ran as internal experiments, batch jobs in isolated clusters, or offline data pipelines. Security focused on internal access controls and protecting the data perimeter. That model no longer holds. Today, AI models are increasingly part of production traffic, which is driving new challenges around securing AI workloads in Kubernetes.

USB Drive Security Best Practices to Protect Your Data

I’ve seen more data breaches caused by USB drives than you think. Not fancy hacks. Not nation-state attacks. Just people moving files quickly because they had to get something done. A USB drive feels harmless. It’s small, familiar and fast. You plug it in, copy a file, unplug it and move on. That’s exactly why it’s dangerous. USB flash drives and external storage devices carry the most valuable data an individual or organization owns. Contracts. Client records.

SafeBreach Labs Releases Root Cause Analysis & Proof-of-Concept Exploit for CVE-2026-24061: Telnetd RCE as Root Vulnerability

In January 2026, the GNU telnetd service from GNU InetUtils was found to be vulnerable to authentication-bypass by Simon Josefsson. Tracked as CVE-2026-24061, this flaw allows an attacker to establish a Telnet session without providing valid credentials, granting unauthorized access to the target system. The vulnerability exists all the way up to version 2.7-2 of the GNU telnetd service and, as indicated by Simon, looks like it was taken right out of the 90s.

UEBAenabled SIEM use cases: Stopping insider threats before they strike

Insider threats remain one of the most challenging security risks organizations face. Unlike external attackers who must breach perimeters, insiders already possess legitimate access to critical systems and data. They understand security controls, know where valuable assets reside, and can operate under the radar of traditional rule-based detection systems for extended periods.

You Don't Need 20 Different Perimeters. You Need One Identity Fabric.

Guest post by WatchGuard Tech All-Star, Michael Carter II At a glance: The trend is hard to ignore: most attackers do not “break in” anymore; they sign in using stolen or abused identities, not by bypassing a next-gen firewall, your EDR, or those fancy email and collaboration tool defenses. If an unauthorized identity can export it, you have not protected it, no matter how many controls you have in place.

Service Advisory: What Recent Remote Access Disruptions Remind Us About Security Evolution

Security incidents and service disruptions are never simple. They are rarely the result of a single mistake, and they don’t only happen to organizations that “did something wrong.” In reality, many of the most capable, well-resourced companies experience them precisely because they operate at scale, under constant pressure, and within complex, interconnected environments.