Latest News

April 15, 2026

Data sovereignty: Take control of your data.

Data sovereignty is becoming a defining priority for organizations globally — but gaining true control over your data is harder than ever. The Keepit data sovereignty report breaks down what leaders need to know and offers practical guidance for navigating compliance, risk, and governance across borders. In the report, you’ll learn:  What digital and data sovereignty really mean — and why they matter now  The critical questions [...]
Continue reading
April 15, 2026

Take control of every threat

Modern cybersecurity threats demand a partner that delivers powerful detection and response capabilities to achieve your security and business objectives. Sophos unites unmatched threat intelligence, adaptive AI, and human expertise in an open platform to stop attacks before they strike — giving you the clarity and confidence to stay ahead of every threat. Download the [...]
Continue reading
April 15, 2026

The Privilege Reality Gap: New Insights Shaping the Future of Identity Security

New data exposes a widening privilege reality gap: organizations are racing toward cloud and AI innovation, yet standing privilege, privilege drift, and fragmented controls continue to expand the attack surface. This infographic gives security and infrastructure teams a clear snapshot of where risk is rising and the actionable insights needed to modernize privilege controls, eliminate [...]
Continue reading
April 15, 2026

Whitepaper: XFA – privacy-respecting device security

XFA is a privacy-respecting security solution designed to eliminate the "visibility gap" in modern hybrid work environments. Traditional Mobile Device Management (MDM) tools typically secure only 40% of devices used for work, leaving the remaining 60%, often personal or freelance devices (BYOD), unmanaged and vulnerable. XFA addresses this by providing 100% coverage without the intrusive [...]
Continue reading
March 13, 2026

The Device Security Gap:
What Companies Don’t Know Is Hurting Them

Executive Summary Most organizations believe their device fleet is under control. They run an MDM solution, they have a patching policy, and they report compliance to their board. But when we look at what actually connects to corporate systems, a different picture emerges. An analysis of 13,000+ devices across 67 organizations reveals that the majority [...]
Continue reading
February 23, 2026

Whitepaper: Network Infrastructure to Support Cybersecurity Strategies

The adoption of digital technologies has improved efficiency and connectivity across organizations, but it has also increased exposure to cybersecurity threats. Cyberattacks, ransomware, and insider threats continue to pose significant risks, with serious consequences for business continuity and costs. These challenges highlight that cybersecurity extends beyond software and IT control alone. An effective defense-in-depth strategy [...]
Continue reading
April 28, 2025

Looking back at the Cyber Resilience Conference 2025

On April 23rd, the Cyber Resilience Conference 2025 took place at Van der Valk Mechelen — a vibrant gathering focused on strengthening digital resilience. The event brought together over 100 cyber professionals, alongside 18 speakers and 19 partners, for a day full of insights, innovation, and networking. Key Highlights Throughout the day, 18 expert speakers [...]
Continue reading
April 15, 2025

Whitepaper: Security Leaders handbook for cloud security

Cloud Security operations is a critical aspect of protecting an organization’s cloud. It is essential for organizations to have a clear understanding of the security risks and appropriate measures to protect their environment. In this practical guide, we will detail the journey that organizations can take to achieve a cloud security operating model that enables [...]
Continue reading
April 14, 2025

Whitepaper: What to Know and How to Prepare

Meeting NIS2 requirements is an organization-wide, top-to-bottom mission. For many businesses, this will require implementing a host of new processes and technologies. While not a silver bullet, the Veeam Data Platform is well-positioned to help entities meet various NIS2 requirements, particularly around data hygiene, reporting and auditing, data backup and disaster recovery. The Veeam Data [...]
Continue reading
April 1, 2025

Whitepaper: How Thales can help your organization comply with the European Union’s DORA Regulation

Thales’ solutions can help Financial Institutions and third-party ICT providers comply with DORA by simplifying compliance and automating security reducing the burden on security and compliance teams. We help address essential cybersecurity risk-management requirements under articles 8, 9, 10, 11, 19 and 28 of the regulation, covering ICT Risk Management and Governance, Incident Reporting, and [...]
Continue reading