Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The GigaOm Radar for Identity Fabric

The world of identity and access management (IAM) is no longer a place for security gaps from unintegrated solutions. An identity fabric is the answer – multiple solutions that cover privileged access, identity governance and more to give your organization the strongest level of defense possible. Looking to fight identity sprawl from siloed solutions and orphaned accounts to streamline efficiency, productivity and visibility?

Security integration takes the lead: Top MSP integration trends of 2025

As the threat landscape evolves and client environments grow more complex, managed service providers (MSPs) are rethinking how their technology stacks work together. According to the new Acronis MSP integration trends 2025 report, this past year marked a decisive shift toward security‑first, automation‑centric and platform‑driven operations.

Security Professionals Aren't Pessimists, They're Realists

Security professionals aren't pessimists - we're realists. Cybersecurity requires realistic risk management, not blind optimism. Information security teams prepare for breaches, system failures and cyber threats through threat modelling, incident response planning and security controls. This security mindset focuses on organisational resilience and breach preparation, not hope.

How to Deploy and Use Server Proxy in BDRShield

Managing backups in distributed and remote environments can be challenging. In this video, we walk you through how to deploy and use the Server Proxy in BDRShield to efficiently manage backup traffic while keeping data secure and local. You’ll learn: What a Server Proxy is and why it’s needed When to use Server Proxy in distributed environments Step-by-step deployment of Server Proxy in BDRShield How backup data flows using the proxy.

How to Test Your ISO 27001 Business Continuity Plan

What happens when there’s an unexpected interruption to your business? Certainly, it depends on the kind of interruption. The way your business handles something like a power outage can be quite different from how you handle a wildfire, which will be different from how you handle a cyberattack. The core principles are the same. You want to have ways to defend your business, to restore services, and to ensure continuity as much as possible.

Backup policy template guide: essential, safe & simple

Most teams only realize they need a backup policy after something goes wrong and by then, it’s too late. A clear, practical backup policy doesn’t just tick a compliance box; it keeps your business running when systems fail, ransomware hits, or someone accidentally deletes production data. This guide walks you through a ready-to-use backup policy template so you can define what to back up, how often, where it lives, and who is accountable, without starting from a blank page.

Bitsight: AI-powered intelligence that outsmarts cyber risk

Bitsight is the global leader in cyber risk intelligence, leveraging advanced AI to empower organizations with precise insights derived from the industry’s most extensive external cybersecurity dataset. With more than 3,500 customers and over 68,000 organizations active on its platform, Bitsight delivers real-time visibility into cyber risk and threat exposure, enabling teams to rapidly identify vulnerabilities, detect emerging threats, prioritize remediation, and mitigate risks across their extended attack surface.