Teams | Collaboration | Customer Service | Project Management

GCP security best practices: 6 steps to building a safer cloud environment

Google Cloud Platform (GCP) powers the world’s largest companies and applications. But this kind ubiquity also brings with it greater security risks. And guaranteeing secure code — which can extend to secure data for your organization and customers — requires more than just flipping a switch. In this guide, we’ll walk through six practical GCP security best practices designed to help DevOps teams build safer, smarter cloud environments from day one.

From Vision to Reality: Redefining Secure Collaboration With MLS

At Wire, we're redefining what secure communication looks like at scale. With the launch of Message Layer Security (MLS) in our platform, we’ve taken a bold step into the future, introducing a breakthrough in secure, large-scale collaboration that no other platform has brought to market. Naturally, as with any transformative technology, this transition comes with its share of challenges. We are aware of some issues that have surfaced during the rollout.

ISO 27001 & ISO 27701 Certification: Future-Proof Enterprise Security & Compliance

Modern organizations face an expanding risk landscape, with 33% reporting three or more data breaches in the last year. Achieving ISO 27001 and ISO 27701 certifications signals a powerful commitment to cybersecurity, privacy, and operational resilience. These internationally recognized standards not only strengthen an organization’s security posture but also foster customer trust and regulatory confidence. But how do ISO 27001 and ISO 27701 differ?

Device Security Check: What It is & How to Complete it?

A smoothly running and secure device is important for a business to ensure seamless operation. Businesses depend heavily on computers and associated devices in the competitive digital arena, from daily operations to communicating with their team or clients. Robust security is a major concern to secure sensitive data and reduce the risk of malware or cyber-attacks. However, many companies overlook the importance of regular device health checks until they face major data breaches or costly incidents.

72-hour Crisis Response Plan for Cyber Incidents

In a world where resilience defines leadership, how we respond to crises often speaks louder than the crises themselves. When a data breach or other cyber incident occurs, being prepared and equipped to act decisively is critically, and in many cases existentially, important. Failing to act, reacting too slowly, or just responding ineffectively can cause serious, sometimes irreversible damage.

ISO 27001 & 27701 at Wire: Inside Our Certification Journey

Wire has officially achieved ISO 27001 and ISO 27701 certification, a major step in demonstrating our commitment to data security and privacy. But what does this really mean for our product, our customers, and our future? In this exclusive interview, Robert Kallwies, Wire’s Director of Information Security, shares how the company successfully built a world-class Information Security Management System (ISMS) and Privacy Information Management System (PIMS).

Roadmap Reveal: Secure CommsOS Edition

Rocket.Chat started, nearly 10 years ago, as an open source alternative to Slack. Today, it has evolved into a fully-fledged collaboration platform, supporting the needs of mission critical organizations around the world. We’re deployed at scale by leading organizations in defense, intelligence and critical infrastructure - an environment where there’s no room for failures. When every second matters, you need a collaboration platform that’s up to the task.

MAS migration unleashes Element X on Matrix.org

On Monday, Matrix.org (a free Matrix public server) started running Matrix Authentication Service (MAS), the next generation authentication system based on OAuth 2.0/OpenID Connect. This is a major leap forward for Element as it means that Element X users on Matrix.org can now finally benefit from all the security and usability benefits of next gen auth, paving the way for QR-code login, 2FA, MFA and more!

The Backdoor Debate: Why the Future of Digital Trust Hinges on Strong Encryption

In an increasingly digital and interconnected world, encryption has become more than just a technical feature, it is a fundamental pillar of global cybersecurity. It safeguards everything from private to business conversations and sensitive health records to critical infrastructure, financial systems, and state secrets. It enables trust, privacy, and security at scale! Yet, this pillar of strength might be under threat …