Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Expand Disk Partitions in Linux VMs

Insufficient virtual disk space can lead to issues, including poor performance. For example, you set up a virtual disk, create partitions, and install a guest OS on one of those partitions. Then you find that you have insufficient disk space. In this case, you should extend the disk size. VMware provides flexible configuration options for virtual hardware like CPUs, memory, and disks, allowing you to extend the size of an existing virtual disk.

How to Extend Windows VM Partitions

When a virtual disk on a virtual machine is full, you need to increase the virtual disk size. However, partitions located on the virtual disk do not expand automatically and should be expanded manually. Learn how to increase the virtual disk size and extend Windows partitions using different methods and combine these methods for different scenarios. NAKIVO for VMware vSphere Backup Complete data protection for VMware vSphere VMs and instant recovery options.

12 Cloud Outages With Catastrophic Effects

There’s no infrastructure that’s always on and immune to all kinds of threats. Even the top providers leave a tiny margin in their Service Level Agreements (SLA), stating 99.999% uptime at most. The cloud, advertised as the universal cure for the problems of legacy on-premises setups, also turned out vulnerable. The most obvious and impactful manifestations of cloud vulnerability are cloud outages.

Why QR Code Phishing Is the New 2026 Security Blind Spot

QR code phishing is a social engineering attack that embeds malicious URLs inside QR code images delivered through email. Because the payload lives inside an image — not in a clickable link or plain text — legacy secure email gateways (SEGs) never see it. The email passes inspection. The user scans the code with their phone. And the attack moves from a protected corporate desktop to an unmanaged mobile device outside your security perimeter.

Explainable AI in Email Security: From Black Box to Clarity

Generative AI and sophisticated social engineering have reshaped the cybersecurity landscape in 2026. Traditional "castle-and-moat" defenses centered on the Secure Email Gateway (SEG) are increasingly pressured by machine-scale attacks designed to bypass static filters. As organizations shift toward Integrated Cloud Email Security (ICES) models, a new technical and psychological barrier appears: the "black box" problem of defensive AI.

Acronis Ecosystem expands with new integrations to help MSPs protect, manage and automate

Managed service providers (MSPs) are operating in an environment defined by growing attack surfaces, rising customer expectations and increasing pressure to scale efficiently. With MSPs managing more than 20 tools on average, integrations are no longer a backend convenience but are a strategic requirement for reducing complexity, accelerating response and improving margins.

AV-TEST gives Acronis Cyber Protect Cloud their top score in February 2026 evaluation

Acronis Independent testing continues to matter because security teams need more than vendor claims — they need repeatable, third-party validation under realistic conditions. That is why the latest AV-TEST results for business Windows endpoint protection stand out for Acronis.

Trilio Becomes a Red Hat Premier Partner: A Milestone in Cloud-Native Data Protection

In the rapidly evolving landscape of cloud-native infrastructure, collaboration is the engine of innovation. Today, we are thrilled to share a major milestone in our journey: Trilio has officially achieved Premier Partner status within the Red Hat partner ecosystem. This elevation isn’t just a badge of honor; it is a testament to years of deep technical integration and a shared vision for the future of the open hybrid cloud.

GitProtect 2.2.0: GitHub Enterprise Cloud with Data Residency Backups, AES-GCM Encryption, and More

The huge news is coming: GitProtect is the first solution on the market to support the backup of the GitHub Enterprise Cloud with Data Residency environments. The launch of version 2.2.0 also brings more secure and efficient AES-GCM encryption, a refreshed dashboard, a new onboarding experience, support for Azure DevOps related work links, and much more. Let’s dive into all the new features.