Blog

Crowstrike

VELOCITY BUNDLE PROGRAM – CROWDSTRIKE

Instant cybersecurity to accelerate your SMB sales In today’s landscape, where cyber threats are becoming increasingly frequent and sophisticated, CrowdStrike stands out as the global leader in endpoint protection, powered by the Falcon platform—lightweight, cloud-native, and continuously updated against ransomware, malware, and targeted attacks. The Velocity Bundle Program has been designed to provide ready-to-use security packages with competitive pricing and …
Read more
Sealpath

Data Protection Federation in Document Collaboration and Management Platforms

Discover how data protection federation streamlines security in document collaboration platforms like SharePoint and Nextcloud. Learn about federated security and access, improved data governance, and reduced risks to ensure efficient, secure, and seamless management of sensitive information. 1. What is Federated Security? Federated security is an IT security methodology that allows centralized authentication and authorization to be applied across multiple, …
Read more
Blog Yubico 5 tips

Five Quick Cybersecurity Tips to Declutter Your Digital Life

Today, on Identity Management Day, it’s the perfect time to take stock of your online presence, update your security settings and ensure your personal information remains protected from cyber threats such as phishing. We’re also seeing increased privacy concerns with DeepSeek and other AI tools, making these types of attacks more successful than ever. Yubico is committed to helping you …
Read more

How to Navigate Regulatory Complexity

The increasing diversity of regulations in the field of cybersecurity, represented by legislations such as the NIS2 Directive or the DORA Regulation, among others, presents both challenges and opportunities for organisations. On the one hand, the most evident challenge is the complexity and effort required to comply with multiple regulations, which may have different or even sector- or region-specific requirements. …
Read more
Kela-article

Black Basta leak: new findings reveal details of victims

Last week, Kela published a new report on the Black Basta leak, revealing its inner workings. As expected, since the publication of our report, KELA’s Cyber Intelligence Centre has obtained new information and analysis on the targeting of victims in Black Basta’s reconnaissance strategies. KELA found that at least 11% of the ZoomInfo links shared in Black Basta communications were …
Read more

LastPass Is Encrypting URLs. Here’s What’s Happening.

LastPass has built a popular password manager used by millions of consumers and hundreds of thousands of businesses worldwide.
Read more

LATEST
PRESS RELEASES

Nota de prensa_ Claroty

Claroty Secures $150 Million in Series F Funding to Lead Charge on Securing the World’s Mission Critical Infrastructure

NEW YORK—January 22, 2026—Claroty, the cyber-physical systems (CPS) protection company, today announced it has secured $150 million in Series F funding led by Golub Growth, an affiliate of Golub Capital, with additional confirmed participation from existing investors up to $50 million. This new investment will fuel global expansion through both …
Read more
Reporte-delinea-enero

Delinea

Η Delinea αναγνωρίζεται με το Frost & Sullivan Global Technology Innovation Leadership Award

Η Delinea αναγνωρίστηκε από τη Frost & Sullivan με το Global Technology Innovation Leadership Award, αναδεικνύοντας την ηγετική της θέση στην προστασία μη ανθρώπινων ταυτοτήτων μέσω καινοτομίας, αυτοματοποίησης και ελέγχων ταυτότητας που βασίζονται στην τεχνητή νοημοσύνη. «Η Frost & Sullivan αναγνωρίζει το στρατηγικό όραμα της Delinea στην αγορά, την αξιοποίηση …
Read more
Silverfort

Ingecom Ignition Strengthens Identity Security with Silverfort

Madrid, October 9, 2025.- Ingecom Ignition, an Exclusive Networks company, Value-Added Distributor (VAD) specialized in IT cybersecurity, OT/ICS cybersecurity, IoT, IoMT, and cyber intelligence, signs a distribution agreement in Spain with Silverfort, a leader in identity security that breaks down security silos and closes the gaps and blind spots left …
Read more