When Trust Becomes a Threat: The SonicWall Breach and the Case for Zero Trust Security

A recent security incident has raised serious concerns across the IT industry. Firewall vendor SonicWall confirmed that all cloud backups of its customers’ firewalls were stolen in a large scale breach. What was initially described as a limited issue has now turned into a data leak affecting every organization that used SonicWall’s cloud backup service.

Insider Threat Detection: Prevention Tools & Techniques

The cost of insider risk has reached an annual average of $17.4 M. It is quietly draining millions from organizations worldwide. Companies face operational hindrances, damage their reputations, and incur severe regulatory penalties. So, how do you detect insider threats? Here, we’ll break down everything about insider threat detection, show you why it fails, and provide suggestions for efficient detection.

What Buyers Should Look for When Choosing a Cyber Fusion Center Provider

A cyber fusion center brings together people, processes, and technologies into one coordinated hub to detect, analyze, and respond to threats. It's not just about monitoring; it's about building resilience by connecting intelligence, incident response, and security operations in real time.

Digital Sovereignty in 2025: Why It Matters for European Enterprises

In the new digital economy, data is power. Questions about who controls, processes, and protects it now sit at the center of political and corporate priorities. The year 2025 marks a turning point in Europe’s pursuit of digital sovereignty, driven by tighter regulation and growing geopolitical tension. For enterprises within the EU, digital sovereignty has become a strategic requirement for sustainable growth in an increasingly regulated environment.

What Is Cloud Sovereignty? A Guide for European Enterprises

US based hyperscalers continue to dominate digital infrastructure worldwide. Yet across Europe, there is a growing movement to protect data from both cyber threats and extraterritorial laws, and to ensure full regulatory compliance. Cloud sovereignty has become a cornerstone of this effort. Cloud sovereignty ensures that data, workloads, operations, and digital infrastructure remain under the jurisdictional control of the country or region where they reside. It goes beyond simple data residency.

When Compliance Comes Late: Why Microsoft's EU Deal Shows That Non-Compliance Still Pays Off

The Commission’s compliance is not just a Microsoft win—it’s a signal to all European institutions and businesses. To meet EU rules, the Commission had to enforce strict limits on data transfers, improve contractual safeguards, and guarantee that data processing takes place within the European Economic Area wherever possible.

Unbundling Dependence: Why the EU's Teams Breakup Is a Broader WakeUp Call

Microsoft’s forced unbundling of Teams in the EU is more than an antitrust event. It's a reminder that enterprises must carefully deconstruct how they build dependence on platforms that mix sensitive and non-sensitive workloads, especially those outside sovereign control. The key lesson: separating sensitive from public-facing communications, and sovereign from non-sovereign platforms, is now a strategic imperative.

Wire Uncut Ep.6 | XWiki | Open Source Tools for Knowledge and Privacy

In this episode of Wire Uncut, Alexandra speaks with Dan, Director of Marketing and Communication at XWiki, about the company’s journey as a European Libre Software provider. Dan shares how XWiki and CryptPad deliver secure, open source tools for collaboration and knowledge management. From powering corporate intranets and documentation hubs to enabling encrypted real-time teamwork, XWiki’s mission is to strengthen digital sovereignty in Europe.