Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ultimate Guide to Vulnerability Assessment: What, Why & How (2026 Edition)

If you’re an IT MSP, vulnerability assessment has grown from a river to a flood over the last couple of years. In 2020, there were 18,000 recorded common vulnerabilities and exposures (CVEs). By 2024, that number had more than doubled, eclipsing 40,000. And 2025 is showing no signs of reversing the trend. The rise of vulnerabilities means that manual vulnerability assessment is no longer possible.

OT resilience demands rapid recovery: Rethinking traditional backup

Industrial organizations face a stark reality: Downtime is costly, disruptive and cannot be entirely prevented. Whether it’s a cyberattack, hardware failure or simple data corruption, operational technology (OT) environments must be ready to recover quickly. In a recent podcast, Stephen Nichols, Country Manager for Canada at Acronis, shared his perspective on why rapid recovery is now a fundamental pillar of industrial resilience and how modern backup strategies are evolving to meet the challenge.

A banner year for Acronis: A look at industry recognition and test results in 2025

It’s evident that the cybersecurity industry took notice of the remarkable growth and maturation Acronis achieved in 2025. Through comprehensive analyst evaluations, rigorous third-party testing and user reviews, leading organizations across the cybersecurity spectrum have validated the development of Acronis as a comprehensive leader in cyber protection. A complete list of analyst reports and user review recognitions, as well as test results Acronis accumulated in 2025, includes.

Response to "Principles for the Secure Integration of Artificial Intelligence in OT"

This new guidance amounts to leading Western governments telling OT users (industrial businesses in manufacturing, energy, power, logistics, critical infrastructure, and the like), “Yes, you can use AI in OT, but only if you’re prepared for it to fail and you can recover quickly when it does.”

When cyberthreats meet the farm: Protecting OT in food and agriculture

The systems that grow, process and deliver our food operate in a world most of us never see: legacy equipment, air-gapped networks and decades-old operating systems quietly controlling the machinery that keeps supply chains moving. What happens when modern cyber threats collide with this aging infrastructure? The answer is more urgent than most people realize.

Lessons from the Jaguar Land Rover outage: How plant managers and OT engineers can prepare

Industrial plant managers and operational technology (OT) engineers have been closely following the August 2025 cyberattack on Jaguar Land Rover, which brought down its production lines for months and is expected to eventually cost the U.K. automaker billions of dollars in losses. It is a timely reminder that cybercriminals are actively targeting manufacturers and other industrial concerns that rely on OT, and merely the latest in a series of similar attacks, including.

MITRE ATT&CK Evaluations: Acronis achieves high efficiency, low noise, big impact for MSPs

In the latest independent MITRE ATT&CK Evaluations, Acronis Cyber Protect Cloud with EDR / XDR demonstrated the performance MSPs value most: proven detection without high-volume noise, helping teams scale services efficiently while protecting clients against advanced real-world threats.

AI at the inflection point: Reclaiming human creativity and productivity

Artificial intelligence is changing how businesses work and compete. In every corner of the market, organizations expect more productivity. The question facing today’s business leaders is no longer whether to embrace artificial intelligence but how to harness its full potential to drive meaningful and sustainable transformation.

Another Acronis award in 2025: Info-Tech SoftwareReviews Emotional Footprint Award for EDR

Acronis once again received recognition from Info-Tech SoftwareReviews, this time in the form of an Emotional Footprint Award for extended detection and response (EDR). The latest accolade highlights Acronis’ growing leadership in cybersecurity and its dedication to delivering solutions that managed service providers (MSPs) love.

Dharma (CrySiS) Ransomware: Technical Analysis, Context and Mitigation

Dharma, also known as CrySiS, is a long running ransomware family first observed in 2016. It operates as ransomware as a service, where developers lease the malware to affiliates who deploy it. A variant discovered in March 2021 appends the ".biden" extension to encrypted files. This article provides a technical analysis of Dharma, outlines its infection vector, describes its encryption workflow, and offers guidance for mitigation.