Exein and Mesh Systems partner to strengthen cybersecurity

Exein announced a strategic partnership with Mesh Systems. Together, the companies will help manufacturers strengthen security at the source, starting with firmware security assurance before devices ship, while supporting readiness for EU cybersecurity regulations, including the Cyber Resilience Act (CRA)…

Nozomi Networks enters next phase of growth

Nozomi Networks announced that Mitsubishi Electric Corporation has completed its acquisition of the company. Originally announced on 9th September, the transaction marks the start of a new phase of growth for Nozomi Networks while preserving the company’s independent operations, vendor neutral…

Experts warn weak passwords and poor security standards for IoT leave businesses exposed ahead of Data Privacy Day

Experts are warning that weak passwords and poor security standards for IoT devices are leaving businesses and consumers increasingly exposed, ahead of Data Privacy Day tomorrow (28th January). The warning comes amid a massive data leak this week, which revealed…

Security in IoT: Report finds that half of IoT manufacturers offer no way to report flaws

More than half of all consumer IoT manufacturers provide no method for security researchers to report flaws, leaving millions of connected devices potentially exposed, a new report has found. The 2025 Copper Horse study, now in its eighth year, analysed…

What are the biggest IoT security challenges of 2026?

Global cyber risks tied to connected devices and autonomous systems are emerging as one of the most pressing near-term threats heading into 2026, according to the World Economic Forum. The WEF’s Global Cybersecurity Outlook, released last week, warns that criminals…

What is microsegmentation and will it work on my IOT fleet?

With organisations under increasing pressure to secure growing numbers of connected devices, cybersecurity firms are deploying an increasingly sophisticated arsenal to protect them. One such measure, microsegmentation – isolating devices and limiting communication to reduce the impact of breaches –…

Telent lands strategic contract to support the RAF’s increasing demand for digital capability

Telent has been entrusted with one of the RAF’s most strategically important technical responsibilities, transforming how IT and communication infrastructure changes are approved and delivered across 244 sites, including all military air traffic control infrastructure.  The contract, awarded to the…

E2e-assure grows customer base as sovereignty becomes a business driver

e2e-assure reveals that demand for sovereign cyber security solutions has driven 18 new customers and several million in increased revenue. In order to continue to meet the specific needs of highly regulated UK organisations, e2e-assure has brought Richard Groome on…

ETSI releases standard for securing AI 

ETSI announces the publication of its new standard, ETSI EN 304 223, that provides baseline cybersecurity requirements for AI models and systems. Building on the foundational work set out in its recent Technical Specification, it is a first globally applicable…

Cloud Strategy for 2026: the year of repatriation, resilience, and regional rebalancing

This year is set to be a pivotal year for Cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing focus on data sovereignty, writes Rob Coupland, Chief Executive…