Veeam launches Data Cloud for MSPs to simplify Microsoft 365 and Entra ID protection

Veeam Software announced the availability of Veeam Data Cloud (VDC) for Managed Service Providers (MSPs) through the Veeam Cloud & Service Provider (VCSP) program. Designed to empower third-party service... Read more »

Cayosoft Guardian Protector safeguards Microsoft 365 and hybrid identity systems

Cayosoft introduced Cayosoft Guardian Protector, a free, always-on solution that delivers real-time threat detection, proactive alerts, resolution guidance, and change history for complex Microsoft hybrid identity environments. Cayosoft Guardian... Read more »

Securing the AI era: Huawei’s cyber security strategy for the GCC

At Gitex 2025, Sultan Mahmood, chief security officer for Huawei Gulf North, outlined how the company supports GCC digital sovereignty, AI security, and enterprise cyber resilience Read more »

Gitex 2025: Help AG aims to be global cyber force as UAE leads AI security transformation

Acting CEO Aleksandar Valjarevic discusses how Help AG is evolving from a regional cyber security authority into a global innovation-driven player, powered by sovereign services, AI automation and managed... Read more »

RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing

Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing guarantees provided by Secure Encrypted Virtualization with Secure Nested... Read more »

When trusted AI connections turn hostile

Researchers have revealed a new security blind spot in how LLM applications connect to external systems. Their study shows that malicious Model Context Protocol (MCP) servers can quietly take... Read more »

Identifying risky candidates: Practical steps for security leaders

Effective insider threat defense begins with candidate vetting. Background checks and reference calls can confirm elements of an applicant’s history, but they rarely surface the deeper risks that can... Read more »

Everyone wants AI, but few are ready to defend it

The rush to deploy AI is reshaping how companies think about risk, according to Cisco. A global study finds that while most organizations are moving quickly to adopt AI,... Read more »

Humanoid robot found vulnerable to Bluetooth hack, data leaks to China

Alias Robotics has published an analysis of the Unitree G1 humanoid robot, concluding that the device can be exploited as a tool for espionage and cyber attacks. A robot... Read more »

The password problem we keep pretending to fix

Experts across industries say they are still losing ground against identity-related breaches, even after years of investment in stronger access controls, according to RSA. Many said their organizations had... Read more »
Subscribe to our Newsletter