Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Essentials v3.3: How MSPs can address their biggest concerns

While it is not technically required, the Cyber Essentials 3.3 set of standards is quickly becoming a necessity for organizations that need to ensure public sector contract, insurance and supplier assurance in the U.K. That’s good news for managed service providers (MSPs), who now have an opportunity to build both trust and revenue by guiding clients toward Cyber Essentials certification. Acronis recently surveyed U.K. partners about Cyber Essentials.

Acronis Email Security - Dashboard and Visibility

Discover how to monitor and manage email security threats across all your clients using the Acronis Email Security dashboard. This video guides you through centralized visibility, incident analytics, and efficient response workflows for MSPs. What you’ll learn: Like, comment, and subscribe for more Acronis tutorials!

Acronis Email Security - Platform Overview

Discover how Acronis Email Security empowers MSPs! This video demonstrates integrating Email Security into the Acronis Cyber Protect Cloud, managing alerts, responding to threats, and onboarding Microsoft 365 and Google Workspace clients - all with streamlined access and expert support. What you’ll learn: Become a partner and start selling: Like, comment, and subscribe for more Acronis tutorials!

Trilio Joins Oracle Partner Network to Deliver Cloud-Native Data Protection on OCI

Trilio has officially joined the Oracle Partner Network (OPN), marking a significant step in expanding cloud-native data protection capabilities for enterprises using Oracle Cloud Infrastructure. This collaboration enables organizations to seamlessly protect Kubernetes workloads running on Oracle Cloud, ensuring stronger resilience, scalability, and operational continuity.

How to Expand Disk Partitions in Linux VMs

Insufficient virtual disk space can lead to issues, including poor performance. For example, you set up a virtual disk, create partitions, and install a guest OS on one of those partitions. Then you find that you have insufficient disk space. In this case, you should extend the disk size. VMware provides flexible configuration options for virtual hardware like CPUs, memory, and disks, allowing you to extend the size of an existing virtual disk.

How to Extend Windows VM Partitions

When a virtual disk on a virtual machine is full, you need to increase the virtual disk size. However, partitions located on the virtual disk do not expand automatically and should be expanded manually. Learn how to increase the virtual disk size and extend Windows partitions using different methods and combine these methods for different scenarios. NAKIVO for VMware vSphere Backup Complete data protection for VMware vSphere VMs and instant recovery options.

12 Cloud Outages With Catastrophic Effects

There’s no infrastructure that’s always on and immune to all kinds of threats. Even the top providers leave a tiny margin in their Service Level Agreements (SLA), stating 99.999% uptime at most. The cloud, advertised as the universal cure for the problems of legacy on-premises setups, also turned out vulnerable. The most obvious and impactful manifestations of cloud vulnerability are cloud outages.

Why QR Code Phishing Is the New 2026 Security Blind Spot

QR code phishing is a social engineering attack that embeds malicious URLs inside QR code images delivered through email. Because the payload lives inside an image — not in a clickable link or plain text — legacy secure email gateways (SEGs) never see it. The email passes inspection. The user scans the code with their phone. And the attack moves from a protected corporate desktop to an unmanaged mobile device outside your security perimeter.

Explainable AI in Email Security: From Black Box to Clarity

Generative AI and sophisticated social engineering have reshaped the cybersecurity landscape in 2026. Traditional "castle-and-moat" defenses centered on the Secure Email Gateway (SEG) are increasingly pressured by machine-scale attacks designed to bypass static filters. As organizations shift toward Integrated Cloud Email Security (ICES) models, a new technical and psychological barrier appears: the "black box" problem of defensive AI.