We Need to Align Cybersecurity with Business in the Industrial Environment
Cybersecurity in industrial environments can no longer be viewed as an isolated domain. Protecting Operational Technology (OT) depends on a solid IT foundation that aligns technical defences with business objectives. Only through this integration can organisations ensure operational continuity, safety, and resilience against cyber threats. Today, we understand that OT security requires a strong IT backbone capable of creating a …
Read more
Introducing “Universal Logout” for all Adaptive MFA customers
The power of Universal Logout for session security Managing sessions and tokens across distributed applications has long challenged identity teams. Universal Logout is a powerful capability that allows admins to revoke sessions and tokens across federated applications. Starting today, Universal Logout is now available for all Okta Adaptive MFA customers (with some restrictions as stated below). This feature enables Super Admins to manually clear …
Read more
VELOCITY BUNDLE PROGRAM – CROWDSTRIKE
Instant cybersecurity to accelerate your SMB sales In today’s landscape, where cyber threats are becoming increasingly frequent and sophisticated, CrowdStrike stands out as the global leader in endpoint protection, powered by the Falcon platform—lightweight, cloud-native, and continuously updated against ransomware, malware, and targeted attacks. The Velocity Bundle Program has been designed to provide ready-to-use security packages with competitive pricing and …
Read more
Five Quick Cybersecurity Tips to Declutter Your Digital Life
Today, on Identity Management Day, it’s the perfect time to take stock of your online presence, update your security settings and ensure your personal information remains protected from cyber threats such as phishing. We’re also seeing increased privacy concerns with DeepSeek and other AI tools, making these types of attacks more successful than ever. Yubico is committed to helping you …
Read more
Black Basta leak: new findings reveal details of victims
Last week, Kela published a new report on the Black Basta leak, revealing its inner workings. As expected, since the publication of our report, KELA’s Cyber Intelligence Centre has obtained new information and analysis on the targeting of victims in Black Basta’s reconnaissance strategies. KELA found that at least 11% of the ZoomInfo links shared in Black Basta communications were …
Read more
LATEST
PRESS RELEASES

SealPath Records 50% Sales Growth in First Half and Strengthens Its Leadership in Data Security
The firm specialising in corporate information protection attributes its performance to the rise of regulation, a notable increase in data breaches, and growing organisational concern over safeguarding sensitive data. The cybersecurity market continues to show strong momentum in 2025, and SealPath’s results mirror that trend. The company, which focuses on …
Read more

Rachael Lyon
Forcepoint to Acquire Getvisibility, Expanding AI-Driven Data Security and Risk Visibility
AUSTIN, Texas – March 10, 2025 – Global data security leader Forcepoint today announced the company has signed a definitive agreement to acquire Getvisibility, an innovator in AI-powered Data Security Posture Management (DSPM) and Data Detection and Response (DDR). Forcepoint’s Data Security Everywhere platform unifies visibility and control over sensitive data, while Getvisibility enhances the …
Read more

TXOne
INGECOM IGNITION SIGNS WITH TXONE TO BOOST SECURITY IN THE OT ENVIRONMENT
Madrid, 11 March 2025- Ingecom Ignition, an Exclusive Networks Value Added Distributor (VAD) specialising in IT cyber security, OT/ICS cyber security, IoT and IoMT and cyber intelligence solutions, has signed a distribution agreement for Iberia with TXOne Networks, a leader in cyber-physical system (CPS) security specialising in ZeroTrust OT solutions. …
Read more




