Ericsson to power majority of Virgin Media O2’s UK RAN network through major partnership extension

Posted in Commentary with tags on March 31, 2026 by itnerd

Ericsson will become Virgin Media O2’s primary radio access network (RAN) partner in a five-year partnership extension that will see Ericsson power the majority of the UK service provider’s nationwide UK radio network. Through securing the majority of the radio network-focused element of Virgin Media O2’s latest Mobile Transformation Plan, the partnership extension will earn Ericsson several hundred million Euros across the five years.

Virgin Media O2’s Mobile Transformation Plan will deliver faster, more reliable mobile connectivity across the UK.

With Virgin Media O2’s mobile traffic more than doubling in the last five years alone, a key element of the network enhancement will focus on maximizing the capabilities of additional 5G mid-band spectrum acquired by Virgin Media O2 in 2025, to strengthen the service provider’s UK leadership in 5G Standalone (SA) connectivity.

The partnership extension is the latest development in Virgin Media O2’s Mobile Transformation Plan – with 2026 investments aimed at improving reliability, boosting capacity and widening coverage across its nationwide network.

The upgrade will feature the deployment of a wide range of Ericsson Radio System products, including advanced and energy-efficient multiband Massive MIMO radios – such as the AIR 3229 and the triple-band Radio 4486 – at both new and existing locations.

Ericsson AI and machine learning-based software will also be deployed to intelligently optimize network performance and efficiency in real time.

Network programmability and intelligence will help Virgin Media O2 to utilize the full capabilities of its 5G SA network, supporting advanced differentiated services through network slicing for application, enterprise and industry use cases.

The network upgrade will enable Virgin Media O2 to move more of its customer base to its 5G SA network, which is already available to 87 percent of the UK population. The partnership is also structured to support Virgin Media O2’s evolution to Cloud RAN and to scale into future 5G-Advanced.

The 2026 enhanced Ericsson-VMO2 partnership is the latest development in a productive longstanding relationship between the companies – which included the 2025 investment tranche of the Mobile Transformation Plan.

That scope included performance and capacity improvements through additional spectrum, network densification and small‑cell deployments, targeted upgrades at network hot spots (like stadiums and transport hubs), and extended coverage along railways, major roads, and previously underserved rural and coastal areas.

Hammerspace Announces FIPS 140-3 Validation

Posted in Commentary with tags on March 31, 2026 by itnerd

Hammerspace today announced support for FIPS 140-3 validated cryptography, enabling the Hammerspace Data Platform to be configured to meet the U.S. government standard for cryptographic security. This milestone positions Hammerspace to support deployments in federal, defense, healthcare, finance and other highly regulated environments. Integration into the Hammerspace Data Platform is planned for an upcoming release by the end of 2026.

By supporting FIPS 140-3 validated cryptography, Hammerspace meets key requirements for secure data protection in regulated environments and is advancing the integration of these capabilities into the Hammerspace Data Platform.
 

Security Enforced at the Data Layer for Consistent Control, Compliance and Data Sovereignty

Hammerspace delivers consistent, policy-driven orchestration, governance and protection across distributed environments, providing consistent control in multi-site and hybrid-cloud architectures. With the integration of FIPS 140-3 validated cryptography, the platform is designed to provide:
 

  • End-to-End Encryption with FIPS-Validated Security: Support for encrypting data in-flight and at-rest using FIPS 140-3 validated cryptographic modules, aligning with federal security requirements.
  • Built-In Data Protection and Ransomware Resilience: Immutable snapshots, clones and WORM capabilities to enable rapid recovery and protect against unauthorized modification or deletion.
  • Consistent Security Enforcement Across a Global Namespace: Centralized policy enforcement across the global namespace, ensuring consistent protection across sites, clouds and storage systems.
  • Unified Access Controls Across Protocols and Environments: Consistent access policies across file and object data, spanning NFS, SMB and S3.
  • Policy-Driven Data Governance Sovereignty and Orchestration: Metadata-driven data placement policies to control where data resides, how it moves and how it is used in real time.


The Federal Information Processing Standards (FIPS) 140-3 is defined by the National Institute of Standards and Technology (NIST), and establishes stringent requirements for the design, implementation, and validation of cryptographic modules used to protect sensitive data. Validation requires independent testing by accredited laboratories and is mandatory for systems used by U.S. federal agencies and organizations operating under stringent compliance mandates.

Learn more about Hammerspace solutions for the public sector at https://hammerspace.com/public-sector/.

NordLayer launches NordLayer Browser

Posted in Commentary with tags on March 31, 2026 by itnerd

NordLayer has officially launched the NordLayer Browser — an enterprise-grade solution tailored to small and medium-sized businesses (SMBs). To safeguard company operations, it integrates browser-native security, enhanced observability, and access management and control into a single platform, delivering a familiar and intuitive experience for users with effortless deployment and management for businesses.

Leading research and advisory firm Gartner predicts that by 2028, 25% of organizations will deploy at least one secure enterprise browser technology to address specific gaps in their cybersecurity strategy. Gartner also predicts that by 2030, enterprise browsers will be the core platform for workforce productivity and security software on managed and unmanaged devices for a seamless hybrid work experience. These predictions are a direct response to cybercriminals frequently targeting employees via web-based and SaaS-use related attacks, like phishing, malicious browser extension campaigns, and account takeovers, that call for an additional layer of control and visibility within the browser.

The lack of dedicated IT staff, coupled with limited cybersecurity budgets, makes SMBs an attractive target for cybercriminals. A report from NordStellar, a threat exposure management platform, revealed that SMBs — companies with up to 200 employees and revenues up to $25 million — bore the brunt of all ransomware attacks last year.

Key solutions of the NordLayer business browser include:

  • Shadow IT management. The browser provides visibility into SaaS usage and helps mitigate shadow IT activity through web activity monitoring, browser extension tracking, domain blocking, and a comprehensive activity log.
  • Browser data loss prevention (DLP) elements. DLP elements restrict camera, microphone, file downloads, and clipboard access to prevent data capture and exfiltration on untrusted websites. This helps organizations limit uncontrolled data movement and reduce the risk of data leaks.
  • Secure browsing capabilities. The browser enhances security through IP anonymization to hide the user’s address as well as web threat protection that blocks malicious or deceptive websites before they load. Category-based DNS filtering further restricts access to websites based on predefined categories for safer browsing.
  • SaaS access control. The NordLayer Browser secures access through single sign-on (SSO) and multi-factor authentication (MFA) to prevent unauthorized access and maintain compliance. A dedicated IP feature enables IP-based control for internal and SaaS applications, while administrators can configure access to internal websites via a private gateway with a fixed, allowlisted IP address for secure connectivity.
  • Zero-trust browsing. The browser securely manages how the browser traffic flows and what users can access. It routes traffic through approved gateways, provides secure tunnels to private resources, and enables security administrators to allow or block connections to internal and cloud services.

The NordLayer Browser is now available to all organizations. For more information, visit https://nordlayer.com/browser/.

Priced to Move: The Underground Markets of Modern Cyberattacks 

Posted in Commentary with tags on March 31, 2026 by itnerd

Abstract’s ASTRO research team just released a new report: Priced to Move: The Underground  Markets of Modern Cyberattacks.

The ASTRO team offers these critical threats for the remainder of 2026:

The ecosystem demonstrated remarkable resilience despite law enforcement successes: BreachForums returned months after its April 2025 takedown, and 57 new ransomware groups emerged to fill gaps left by disrupted operations. Intelligence assessments predict 2026 will mark the first year that non-Russian ransomware actors will outnumber those within Russia. An alarming trend of ransomware groups recruiting corporate insiders further blurs the line between external and internal threats. 

The Priced to Move: The Underground  Markets of Modern Cyberattacks report goes in-depth into:

  • The Broker: Three Weeks of Silence
  • What just happened: The IAB Model
  • The IAB Marketplace
  • Meet the Brokers: A Field Guide
  • How They Get In
  • Twelve Months Inside One Operation
  • The Pipeline in Action
  • When the Broker Gets Caught
  • Detection and Defense
  • Impact and Trends
  • Law Enforcement and Policy

You can read the report here: https://www.abstract.security/reports/priced-to-move

World Cloud Security Day exposes the overlooked gap in cloud security: Outbound communication

Posted in Commentary with tags on March 31, 2026 by itnerd

Exclaimer today announced a reminder for organizations to prioritize email communications governance. On World Cloud Security Day, most organizations are focused on securing access to their cloud systems. But far fewer are asking a more difficult question: what happens after a user hits send? According to Exclaimer, one of the most under-governed areas of enterprise communication is outbound email.

Email continues to sit at the center of modern business operations, yet it is also one of the most widely used and least consistently governed communication channels. According to IBM’s Cost of a Data Breach Report 2025, the average data breach in the US now costs $10.22 million, and it takes organizations an average of 258 days to identify and contain an incident. These findings highlight how gaps in visibility and control persist across the enterprise, including in how communication is created and sent.

Cloud security has matured significantly when it comes to controlling access to systems, but governance of communication within those systems hasn’t kept pace. Governance often breaks down at the point of execution, where individual users, manual processes, and fragmented tools create inconsistency and reduce control. Findings from Exclaimer’s State of Business Email 2025 report reinforce how widespread this gap has become, with 83% of organizations reporting issues related to email misuse, inconsistency, or risk.

A shift from access risk to communication risk

Exclaimer, recently named for its leadership in SaaS and cloud workplace culture at the 2025/26 Cloud Awards, says this highlights a broader issue in how businesses approach cloud security.

When 83% of organizations are already experiencing email-related challenges, this shows the issue is no longer awareness, but how consistently organizations can apply control. And control breaks down quickly when critical elements like disclaimers, branding, and compliance messaging are left to individual users to manage and implement. As communication scales, this challenge is only intensifying. IBM’s research shows that one in six data breaches now involve AI-driven attacks, underscoring how quickly the volume and complexity of communication is increasing.

The governance gap in enterprise communication

Findings from Exclaimer’s State of Business Email 2025 report reveal a growing gap between how organizations secure access and how they control communication. While investment in platforms like Microsoft 365 and Google Workspace continues to rise, only 41% have fully integrated email into their broader security and compliance stack.

In regulated industries, this can introduce real exposure, where missing or inconsistent information may fall short of legal or industry-specific requirements. Even outside of compliance risk, inconsistent outbound communication can erode trust, particularly when customers expect accuracy, professionalism, and clarity in every interaction.

Security at scale requires real-time control

As email volumes increase and communication becomes more distributed across users, devices, and AI-assisted tools, ensuring consistency can’t depend on manual action, it requires policy-driven enforcement that operates in real time, across the entire organization.

Learn more at www.exclaimer.com

RAMP: Inside a Ransomware Marketplace that the FBI Just Took Down

Posted in Commentary with tags on March 31, 2026 by itnerd

CloudSEK has analysed the rise and takedown of RAMP, a ransomware-friendly forum seized by the FBI in January 2026, offering a rare inside look at how modern cybercrime ecosystems operate.

Unlike typical reports, this research draws from internal conversations, operational data, and user interactions, revealing how ransomware groups, access brokers, and affiliates coordinated on a single platform. It shows how access to government networks, enterprise systems, and critical infrastructure was traded, and how these operations functioned more like organised businesses than isolated attacks.

The report also captures what followed the takedown. Instead of slowing down ransomware activity, the ecosystem has fragmented into smaller, harder-to-track communities, creating new challenges for law enforcement and organisations alike.

Key insights include:

  • How ransomware marketplaces operate as structured supply chains
  • Internal chats revealing recruitment, negotiations, and disputes
  • The role of access brokers in enabling large-scale breaches
  • Why the FBI takedown has led to fragmentation, not decline

You can read the full report here:
https://www.cloudsek.com/blog/the-rise-and-fall-of-ramp-inside-the-forum-where-ransomware-was-always-welcome

Bitdefender Launches Complimentary Internal Attack Surface Assessment

Posted in Commentary with tags on March 31, 2026 by itnerd

Bitdefender, a global cybersecurity leader, today announced the Bitdefender Attack Surface Assessment, a complimentary evaluation that helps organizations identify and reduce hidden internal cyber risk caused by unnecessary user access to applications, tools, and operating system utilities commonly exploited in modern attacks. The assessment gives organizations a clear, data-driven view of their internal attack surface and provides actionable guidance to help prioritize and remediate exposure.

Businesses face growing challenges defending against Living-Off-the-Land (LOTL), fileless, and other non-malware attack techniques, which leverage legitimate operating system tools and trusted applications to breach systems and evade detection while blending into normal activity.

Analysis of more than 700,000 real-world security incidents found that legitimate tools and LOTL techniques are involved in more than 84% of major attacks. Cybercriminals increasingly exploit widely available utilities such as PowerShell, WMIC, and others to gain access, escalate privileges and move laterally within environments undetected. As a result, organizations are being forced to shift toward a prevention-first security posture to proactively close attack paths before they can be exploited.

The Bitdefender Attack Surface Assessment addresses this critical security gap through a guided engagement that helps organizations uncover this largely invisible internal exposure, assess its impact on overall risk and identify practical steps for remediation. Organizations enroll and immediately begin assessing and monitoring their environment with no disruption to employees or daily operations.

The program is powered by Bitdefender GravityZone PHASR (Proactive Hardening and Attack Surface Reduction), a first-to-market endpoint security innovation that combines dynamic, behavior-based security hardening with real-time threat intelligence. It helps identify excessive user access and restrict or block unnecessary applications and tools without impacting business operations.

Key Benefits of the Attack Surface Assessment include:

  • Quantify internal risk at the user level – Gain precise visibility into attack surface exposure down to each user, including access to applications, tools and utilities, mapped against their baseline behavior and real-time threat intelligence.
  • Identify shadow IT and unauthorized tools – Uncover shadow IT and unauthorized tools, including unusual network activity, access to non-approved binaries, and unrecognized applications attempting to access company resources.
  • Reduce the attack surface using actionable insights – Receive actionable recommendations to focus mitigation and begin hardening the internal attack surface, with the option to apply controls manually or automatically with Bitdefender guidance. Organizations can reduce their attack surface by up to 95%, significantly lowering exposure to modern attack techniques.  

Availability

The Bitdefender Attack Surface Assessment is a complimentary, 45-day turnkey program that requires minimal effort and is available now for organizations with 250 or more employees. To learn more or enroll, visit here.

Survey data Recast Highlights pain points in Windows deployments 

Posted in Commentary with tags on March 31, 2026 by itnerd

According to modern application and endpoint management provider Recast, the results suggest the industry is in a transitional moment: while organizations are moving toward modern management platforms like Microsoft Intune, many still rely on traditional operating system deployment workflows, including tools that have recently been retired.

You can look at the results here: https://www.recastsoftware.com/?p=10926

Cyber Threat Trends During the Winter Olympics 2026 From Bfore AI

Posted in Commentary with tags on March 31, 2026 by itnerd

Bfore AI’s PreCrime Labs has some extensive research looking into scams and impersonation attacks leveraging the “Winter Olympics” and looking ahead to “Summer Olympics”. There is 6 months of data, preemptively warning users of what to expect with activities associated with LA28 Olympics. 

PreCrime Labs, the research division of BforeAI, observed a total of 1623 suspicious domains, majority used keywords highly relevant to the event, (e.g., “olympic”, “olympics”, “la28”, “milanocortina”). Alongside, several hundred domains, from legacy .com/.org to newer TLDs (“.shop”, “.store”, “.ai”, “.world”, “.app”, “.cloud”, “.top”, “.xyz”, “.games”, “.global”) were seen.

You can look at the research here: https://bfore.ai/report/cyber-threat-trends-winter-olympics-2026/

Today Is World Backup Day

Posted in Commentary on March 31, 2026 by itnerd


World Backup Day was created in 2011 by Ismail Jadun, a digital strategy and research consultant. The idea came from a Reddit post from someone who lost their hard drive and said they wished someone had reminded them to back up their data. Jadun turned that idea into a global awareness campaign and set the date as March 31, the day before April Fool’s Day, with the message: “Don’t be an April Fool. Backup your data.” More info. on World Backup Day can be found here: https://www.worldbackupday.com/en/.

Several top figures in tech had this to say about this important day:

Larry O’Connor, Founder and CEO, Other World Computing (OWC) (https://www.owc.com/):

“World Backup Day is a good reminder that hoping your data is safe and actually protecting it are two very different things. If everything lives in one place, whether that’s a laptop or a single cloud account, you’re one mistake or outage away from losing something that might have taken years to create. The smartest approach we see people taking today is a mix of on-prem storage, cloud, and reliable backups so their work exists in more than one place. When your storage is fast and dependable, backing up just becomes part of the workflow instead of something you keep meaning to get around to.”

Don Boxley, CEO and Co-Founder, DH2i (www.dh2i.com): 

“World Backup Day comes around every year for a reason. We all need an occasional reminder of the proactive actions we should be taking to protect the sensitive data our organizations are responsible for. Unfortunately, it’s still easy for this critical task to get pushed to the bottom of the list. Most organizations don’t think much about backups until the day something breaks. A drive fails, a server crashes, someone accidentally deletes the wrong thing. Suddenly, everyone realizes those files weren’t just data sitting somewhere. They were customer records, financial systems, months of work, sometimes years of it. When that disappears, it’s not just an IT problem. The business feels it immediately.

What’s changed over the last few years is just how dependent companies have become on their data being available all the time. Databases are running across Windows, Linux, containers, and multiple clouds, and everything is moving faster than it used to. Backups are still incredibly important… but they can’t be the whole strategy anymore. Businesses need systems that keep running even when something fails. And they need to know quickly when something is starting to go wrong. At the end of the day… backup is really about peace of mind. It’s about knowing that when something inevitably goes sideways, you’re not starting from zero trying to rebuild your business from scratch.”

Richard Copeland, CEO, Leaseweb USA (https://www.leaseweb.com/en/):

“World Backup Day provides a great reminder that protecting data isn’t just about copying files, and moving them somewhere else. It’s really about knowing exactly where your data lives and who has true control of it. Today’s backup strategies must respect data sovereignty, while adhering to the fundamentals that have always worked, like 3-2-1. That is, keep at least 3 copies of your data, on at least 2 unique storage devices, and store at least one copy offsite. Just as important is working with a provider that actually knows your environment and treats your data like it matters. When something goes wrong, you don’t want to feel like your business is one small account lost in a massive system. You want real expertise, real people, and a partner who understands that your data is the heartbeat of your organization.”

Roger Brulotte, CEO, Leaseweb Canada (https://www.leaseweb.com/en/): 

“World Backup Day is an ideal reminder that a good backup strategy still comes down to common sense. You want to maintain multiple copies of your data across different storage mediums, local and remote – because when something fails, and something always does – you can recover quickly without your business operations grinding to a halt. The next common sense strategy is, given today’s dynamic business environment and geopolitical tensions, to truly understand where your data physically resides, and under whose legal jurisdiction, in order to ensure you maintain full data accessibility while enforcing strict access control. And, when storing your data offsite, whether it is to protect it or increase business capabilities, make sure you’re not just a number in a massive system… that the provider truly understands your business and your unique data requirements, and provides the kind of hands-on, white-glove service you deserve.”

Jason Lohrey at Arcitecta

Conventional backup strategies were designed for a world of megabytes and gigabytes, not today’s environments where enterprises routinely managetens or even hundreds of petabytes and billions of files.Traditional backup assumes data grows slowly and that organizations can tolerate hours or even days before recovery begins. But for modern data-driven businesses, those assumptions are no longer realistic.

On a massive scale, the idea of simply backing up everything becomes unrealistic: traditional systems cannot move hundreds of terabytes per hour or scan billions of files fast enough to keep up with modern data growth.

As data volumes explode across hybrid infrastructures, from on-prem storage and cloud environments to distributed teams, the challenge isn’t simply making copies of data. Organizations must be able to recover the right data instantly when something goes wrong, whether due to ransomware, accidental deletion, or system failure.

To do this, data protection must become an integral part of the data platform itself. Organizations need to move beyond traditional backup strategies toward continuous data availability, where every change to data is recorded in real time and where data can be instantly restored to any point in time. By embedding protection directly into the data path, every file change — such as writes, deletions, or renames — can be captured as it happens, ensuring an organization can always recover its data quickly and effectively.

Mark Christie, Senior Director, Technical Services, StorMagic

“One shift we’re seeing in backup is how recovery expectations are changing as environments become more distributed. In the past, backup strategies were built around centralized systems and assumed that data could be restored back into the same environment. That assumption doesn’t always hold anymore.

For organizations running multiple sites or operating in environments with limited connectivity, the question is no longer just where data is backed up, but how quickly systems can be brought back online locally. If recovery depends on pulling large volumes of data from a central location, that can introduce delays at exactly the moment uptime matters most.

As a result, more teams are looking at backup and recovery together rather than separate processes. That includes keeping recent copies of data closer to where it’s used, validating recovery workflows across sites, and making sure critical applications can continue running even if the primary environment is unavailable.

World Backup Day is a good reminder that backup strategies need to reflect how systems are actually deployed. It’s not just about having a copy of the data. It’s about whether the business can keep operating when something goes wrong.”

Jimmy Tam, CEO, Peer Software

World Backup Day is a useful reminder, but the conversation has moved well beyond backup. In today’s always-on environment, organizations can’t rely on legacy data protection models built around backup windows—they need continuous availability. Business continuity now depends on redundant, active environments across locations, ensuring operations don’t stop even when infrastructure fails.

Backup was designed for a different era, where recovery time was acceptable. Today, recovery isn’t fast enough—availability is the priority. Whether it’s a regional outage, cloud disruption, or broader geopolitical risk, organizations need active-active architectures that keep data accessible and operations running without interruption.

Modern enterprises can no longer assume failure is acceptable as long as data can be restored. Resilience now means real-time redundancy and continuous access. Recent events have underscored that even large-scale cloud infrastructure isn’t immune to disruption, and backup alone doesn’t address that reality. Organizations need geographically distributed systems that ensure data is always available—because today, downtime isn’t just inconvenient, it’s unacceptable.