Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building Cyber Resilience Beyond Defence - Chris Hallenbeck, CISO at Tanium

In this interview with iTnews, Chris Hallenbeck, CISO at Tanium, discusses the critical shift from traditional cyber defence to proactive resilience. He highlights why organisations must prepare for inevitable incidents through proactive visibility, rapid response, and muscle-memory preparedness, emphasising that resilience isn’t about preventing every breach, but minimising impact and ensuring business continuity.

Building Trust and Autonomy in the Age of Agentic AI - Saqib Khan, Global Field CIO at Tanium

Speaking with iTnews, Saqib Khan, Global Field CIO at Tanium, explores how real-time, trustworthy endpoint data forms the foundation of Agentic AI. He explains why confidence in data sources is key to enabling autonomous decision-making, reducing incidents, and driving faster, more reliable outcomes across IT and cybersecurity environments.

Why Visibility & Agility Define Enterprise Resilience - Erik Gaston (Tanium)

In this interview with iTnews, Erik Gaston, Vice President of Global Executive Engagement at Tanium, highlights why enterprise resilience today depends on visibility, speed, and alignment between technology and business outcomes. He explains how organisations can stay proactive amid evolving threats, emphasising that in the digital era, "slow is the new down".

Sensitive Data Is the Common Thread Across Most OWASP Top 10 Issues. Here's Why

The OWASP Top 10 is usually presented as a list of technical failures. Broken access control. Injection. Insecure design. Misconfiguration. Each category points to something that went wrong in the application. What it doesn’t say explicitly is what was actually at risk when it went wrong. In most real incidents, the answer is not “the application.” It’s the data inside it. Sensitive data is the reason attackers care about OWASP failures in the first place. Credentials.

CrowdStrike to Acquire Seraphic to Secure Work in Any Browser

I’m delighted to announce CrowdStrike’s intent to acquire Seraphic, the leader in browser runtime security. With this acquisition, we will extend the power of the CrowdStrike Falcon platform into the browser to enforce security within sessions across any browser, on any device. The browser is already the operating system of the enterprise workforce, connecting apps, data, and identity.

Cryptographic Key Management Is Becoming a Structural Constraint in Automotive - Download our Whitepaper

Automotive engineering teams are being asked to deliver faster, with less tolerance for failure. Software-defined vehicle programmes, secure OTA rollouts, zonal and service-oriented architectures, and continuous feature delivery are now baseline expectations. In parallel, regulatory pressure is increasing — from WP.29 (R155/R156), ISO/SAE 21434, and the forthcoming EU Cyber Resilience Act — tightening requirements around software integrity, traceability, and lifecycle governance.

Introducing Acronis Archival Storage: Long-term retention made simple for MSPs

Acronis is introducing Acronis Archival Storage, a new S3-compatible cloud storage tier built specifically for long-term data retention, compliance and cost optimization. This addition strengthens the Acronis Cyber Protect Cloud platform by giving MSPs a complete, integrated solution that spans the entire data lifecycle from active protection on PCs and disaster recovery to long-term, compliant data archiving.

Critical servers under attack: Why backup isn't enough in 2026

Do you know what it takes to launch a retail website that neatly organizes products and enables customers to add items to their carts with a single click? Do you know what powers the booking system your clients rely on? What is the hidden engine that manages your clients’ logistics, controls their supply chain, processes invoices and stores data for analytics and compliance? These are the systems MSPs are trusted to keep running every day. Critical servers.

Security Simplified: Endpoint Protection Made for Everyone

Endpoint threats are evolving faster than ever - more automated, more precise, and harder to stop with detection alone. Today’s security teams need more than alerts; they need clarity, context, and the ability to respond in real time without adding complexity or operational strain. On January 29, 2026, at 8am PST (4pm GMT), join WatchGuard and GigaOm for an educational webinar that cuts through the noise around endpoint security.