Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Episode 4: Risk and Resilience: The Role of Cyber Insurance in Education

Gain insight into the crucial function of cyber insurance for educational institutions. We will explore the pivotal intersection of cyber insurance, regulatory compliance, and cutting-edge solutions in the context of safeguarding educational institutions. Speakers:· Wendy Pattison, CFO and Business Director, Framwellgate School· DI Martin Wilson, Detective Inspector, North East Business Resilience Centre (NEBRC)· Joe Cockcroft, Service and Technology Supervisor, North East Business Resilience Centre (NEBRC)· Edward Renwick, Strategic Partner Executive at Acronis.

Episode 5: Budgeting for Security: Financial Planning for Cyber Compliance

Our bonus episode tackles the vital topic of budgetary planning for cybersecurity compliance within educational institutions. We'll shed light on effective strategies for early communication of cybersecurity requirements within the school, engaging key stakeholders such as bursars, finance teams, and administrators.

Iberia Airlines data breach: What customers need to know

Spain's flag carrier Iberia Airlines disclosed a significant data security incident in November 2025 that should put all customers on high alert. The breach, which occurred through a compromised third-party supplier, has exposed personal information and created new risks for travelers who have flown with the airline.

Jira Data Loss Scenarios To Watch Out For (And How To Avoid)

For many DevOps and ITSM workflows, Jira is the nerve center. It’s relied upon by thousands of teams for everything from agile sprint planning to enterprise-scale incident management. However, beneath the robust interface and powerful automation, your Jira data remains fragile – far more than you think. Scenarions around Jira data loss aren’t a theory. At least nowadays, when such things happen it’s quickly and quietly.

Ivy League universities under siege: The cyberattacks targeting Harvard, Princeton and Penn

The Ivy League is the promised land for thousands of high school students, but it has also become a target for cyberattackers. Three of the most prestigious universities in the United States suffered sophisticated cyberattacks in fall 2025. Harvard University, Princeton University and the University of Pennsylvania have all disclosed data breaches that compromised sensitive information about alumni, donors, students and faculty members.

Jira Backup Script vs. Third-party Backup

Both large and small projects need to be managed in some way. It is essential to track the progress and statuses of key tasks. Projects can be managed using “ancient” methods – on a piece of paper, a blackboard, or using colored cards… but why if there are many better ways? The problem actually arises when we want to scale up. Then, organizations would require more storage space as there would be much more data, tasks and statuses.

The Complete Guide to Patch Management: Closing Security Gaps Before Attackers Find Them

Definition: Patch management is the continuous lifecycle of identifying, acquiring, testing, and deploying code updates to endpoints, servers, and applications to resolve security vulnerabilities and improve stability. The 5-Step Process.

When one vendor falls: The SitusAMC breach and the growing threat of supply chain attacks

Following the Jaguar-Land Rover disaster, another cyberattack has shaken a major industry. The danger of attacks on the supply chain has never been clearer. The issue now revolves around what organizations can do to protect themselves and their supply chain partners. Wall Street spent a tense weekend in late November 2025 when news broke that SitusAMC, a major technology vendor serving hundreds of real estate lenders across the United States, had suffered a significant cyberattack.

The Rise of the Kubernetes based OpenStack Control Plane

OpenStack has long been the go-to platform for building private clouds, but its architecture, particularly the control plane, has undergone a significant transformation in the 15 years since its inception. The original design, a tightly coupled 3-node control plane, provided a stable foundation but presented challenges in scalability, resilience, and operational complexity.