Security

What is Change Management in Cyber Security? System Integrity

In this blog, we will explore the concept of change management in cyber security and its importance in maintaining system integrity. Change management is a structured process that organizations implement to handle system or service changes related to information security. By effectively managing these changes, businesses can mitigate security risks, adapt to new cyber threats, and ensure the smooth implementation of cybersecurity initiatives.

Your Cybersecurity Shield - Why Every Business Needs Proactive IT Support

As technology improves and your business adapts to every change no matter how big or small, it’s important to be fully aware of the relentless threat of the constant growth of cyber threats. These online dangers go toe-to-toe with your business and cyber criminals closely follow every improvement you make when it comes to cybersecurity.

The year in review: What we worked on in 2023

In 2023 many things happened at Wire: We added much expertise to our management team, delivered federated and highly secure messaging to our customers and completely rebuilt our Android app for better performance and security. Let’s take a closer look! In April we were happy to welcome Juan Perea Rodriguez as our new General Manager and Chief Commercial Officer.

Wire co-founds CODE-initiative to unleash innovation through open standards

Wire, the secure messaging platform from Berlin, joins industry heavyweights like Google, Meta and Qualcomm in a new initiative aimed at unleashing innovation through open digital ecosystems. Named ‘Coalition for Open Digital Ecosystems’ (CODE), the group will work with actors from academia, policymakers and other companies with an initial focus on the implementation of the EUs ‘Digital Markets Acts’ (DMA).

Navigating the Evolution of Wire for Android: An Interview with Leen Rehawi

Earlier this year, we relaunched our Android-App on a completely new codebase and switched to a new underlying development framework to enhance stability, performance, and security for our users. Due to this step, some features had to be removed for a while – but they are all coming back.

Top Cloud Security Threats and How to Prevent Them

Cloud hosting is becoming the norm due to its efficiency, accessibility, flexibility, and scalability. Not only that, but it also optimizes IT expenses and encourages collaboration. However, with the rise of digitalization comes a surge of cloud security risks. With such threats, business leaders must be attentive to the cloud security of their businesses.

Elevating Trust and Security in B2B SaaS with Vivantio's SOC 2 Compliance

In an era where data security is paramount, Vivantio, a leading B2B SaaS Service Management Platform, proudly announces the successful completion of its SOC 2® assessment. This achievement underlines our unwavering commitment to providing secure and reliable service management solutions to our customers.

FINED! How Financial Services Can Avoid Paying Millions for Using Unsecured Messaging Apps

💰 FINED: The use of unsecured messaging apps cost American financial firms over $500M in fines – Don't be next! Wells Fargo and other major players in the Financial industry were hit with the biggest penalties by the Securities and Exchange Commission and the Commodity Futures Trading Commission. 🤔The reason? Employees were exchanging messages in non-compliant apps such as WhatsApp, iMessage, and Signal.

Network Overhead, Latency with Secure Access Service Edge (SASE)

Digital Experience Monitoring (DEM) has become an area of focus for Secure Access Service Edge (SASE) vendors. As businesses adopt SASE or security-as-a-service technology for compliance and security, they must consider the overall employee digital experience. SASE architectures add network overhead and impact performance, response times, and latency. In this article, we will delve into.