Soverli Raises $2.6M Pre-Seed to Bring Secure and Convenient Digital Freedom to Every Smartphone

Posted in Commentary with tags on December 15, 2025 by itnerd

Digital sovereignty is rapidly becoming one of Europe’s defining geopolitical priorities, driving billions in investment across sovereign cloud, AI, national networks, and next-generation sovereign communication. Despite the scale of these efforts, smartphones remain the last unclaimed frontier of digital sovereignty. These devices — now central to nearly everyone’s daily life and relied upon by governments, emergency services, and critical industries — are still un-auditable Android and iOS black boxes. This not only undermines sovereignty but creates systemic fragility: a single faulty update (as seen in the CrowdStrike global outage) or hidden kill switch can take hundreds of millions of devices offline, raising serious questions about the suitability of these devices for mission-critical infrastructure. Even for individuals seeking more control, the only option today is to abandon everyday convenience to run an alternative operating system — a trade-off few can realistically make. 

Soverli, a cybersecurity company, has raised USD 2.6 million in pre-seed funding to introduce a sovereign smartphone architecture that, crucially, works alongside Android and iOS. This makes true mobile sovereignty accessible to every OEM, enterprise, government, and consumer. The pre-seed round was led by Founderful, with participation from the ETH Zurich Foundation, Venture Kick, and leading figures in cybersecurity, adding strong validation from experts in high-assurance systems and trusted computing. 

Developed over more than four years of research at ETH Zurich, Soverli’s patent-pending methodology enables multiple operating systems (OS) to run in isolation – simultaneously – on a single device. This effectively turns every commercial phone into sovereign infrastructure. For the first time, a fully sovereign, customizable, and auditable OS can run in parallel to Android — on any smartphone, with zero trade-offs: users keep the full Android experience on one OS and can switch to the sovereign OS in milliseconds at the press of a button.

As a showcase of what this can enable, Soverli demonstrated Signal running inside its bespoke sovereign OS: by reducing the attack surface by 500× and isolating the app from Android entirely, Signal’s messages remain confidential even if Android is malicious or compromised with spyware. And because Soverli requires no hardware modifications, this level of protection works on today’s commercial smartphones without impacting what people can do with them.

Soverli’s relevance has grown as Europe and other regions race to strengthen digital sovereignty and ensure business continuity for governments, mission-critical personnel, and essential industries. Today’s secure-phone solutions force a tradeoff between security and usability as they remove features, restrict apps, or require users to reboot between operating systems. Soverli eliminates that compromise entirely, delivering sovereign-grade security without sacrificing usability.

Soverli’s early prototypes, developed at ETH, quickly drew the attention of governments, public-sector stakeholders, and enterprises seeking stronger operational safety and business continuity without forcing users onto locked-down smartphones. Interest surged further when European smartphone manufacturers and integrators recognized the strategic potential of the technology. That momentum made the spin-out inevitable, leading the team to build Soverli as an independent company.

The first application is built  for mission-critical communication. Public sector pilots are underway with organizations responsible for emergency response and critical infrastructure, where high availability is essential. If Android fails because of a misconfiguration or attack, as seen recently with large-scale outages triggered by software updates, Soverli’s enabled isolated environment keeps running on its own dedicated software stack. This allows communication and essential workflows to remain operational, which is vital for teams such as police officers, firefighters, EMTs, and other first responders. The same architecture protects journalists and human rights workers by allowing secure messaging apps to run inside an isolated environment that attackers cannot see, even if the main OS has been compromised. Enterprises are exploring Soverli for secure bring-your-own-device programs, giving employees a private environment alongside a tightly controlled business workspace — achieving stronger protection for business data without requiring the privacy concessions employees face on today’s company-managed devices.

The broader context is a rapid shift toward digital sovereignty, spearheaded by Europe, where governments and enterprises are seeking infrastructure that provides both independence and state-of-the-art capability. Cloud providers have begun offering sovereign regions, yet smartphones remain a major unresolved gap. Secure communication tools, MDM systems, and hardened devices all depend on the underlying operating system remaining trustworthy. Soverli’s architecture introduces a new model in which institutions can enforce their own security posture on consumer-grade hardware without requiring custom phones or sacrificing usability.

With the new funding, Soverli will grow its engineering team, bring its techonology to more smartphone models, strengthen integrations with mobile device management systems, and scale partnerships with OEMs. Long term, the company aims to set a new standard for how software is layered on phones, making true digital sovereignty available to everyone on every commercial smartphone.

SIOS Technology Launches “Don’t Fail Me Now” Podcast

Posted in Commentary with tags on December 15, 2025 by itnerd

 SIOS Technology Corp. today announced the launch of its new podcast series, Don’t Fail Me Now. Aimed at IT leaders, system architects, and business decision-makers, the podcast delivers practical strategies for preventing downtime, improving high availability (HA) and disaster recovery (DR), and strengthening IT resilience in an always-on world.

The inaugural season of Don’t Fail Me Now features six weekly episodes, each 15–30 minutes long. SIOS experts and industry thought leaders share lessons learned from real-world deployments, discuss the latest HA/DR best practices, and explore the technologies and partnerships that help organizations keep critical applications and data continuously available.

Episodes will be released weekly, with the first episode already available on Spotify, YouTube, and Apple Podcasts.

Season 1 Lineup

  • Episode 1: HA/DR and Business Impact – Margaret Hoagland, vice president of global sales & marketing, SIOS, discusses the business risks of downtime, why HA and DR strategies must work together, and how organizations can prepare for the future of IT resilience.
  • Episode 2: Linux and LifeKeeper – Aaron West, sales engineer, SIOS, explores why Linux remains a top choice for HA deployments, how SIOS LifeKeeper supports these environments, and what IT teams need to know to get started.
  • Episode 3: ARKs and Their Use Cases – Cassius Rhue, vice president, Customer Success, SIOS, breaks down Application Recovery Kits (ARKs), their top use cases, and how they simplify HA/DR deployments across industries.
  • Episode 4: The Role of SIOS DataKeeper – Joey D’Antoni, principal consultant at Denny Cherry and Associates Consulting, explains the role of SIOS DataKeeper in enabling efficient storage replication for hybrid and multi-cloud environments and strengthening SQL Server resilience.
  • Episode 5: Common Customer Misconceptions – Greg Tucker, senior product (Windows) support engineer, SIOS, addresses common myths about HA/DR, from reliance on cloud provider uptime to SQL Server Always On, and offers practical guidance.
  • Episode 6: SIOS Partnerships – Harry Aujla, director of partner alliances, and Kelly Burke, partner alliance director, SIOS, reflect on SIOS’s long-standing partnerships with cloud providers and ISVs, the lessons learned, and the opportunities shaping the next era of resilience.

Listen and Subscribe

IT professionals can subscribe to Don’t Fail Me Now and listen on all major platforms:

Only 3 of 24 leading cryptocurrency exchanges earn an A for their cybersecurity 

Posted in Commentary with tags on December 15, 2025 by itnerd

Business Digital Index has released a research report in which our team analyzed the external cybersecurity posture of 24 leading cryptocurrency exchanges.

Some of the key findings include:

  • Only 3 of the 24 analyzed cryptocurrency exchanges earned an A grade for cybersecurity.
     
  • The top-rated exchanges — Biconomy, Toobit, and Deepcoin — exhibited almost no externally visible security weaknesses and (almost) no evidence of corporate credentials circulating on the dark web.
  •  Password reuse remains widespread, as 63% of exchanges were found to have employees who have reused their passwords across multiple services in the past.
  •  Coinbase ranked second-to-last in the analysis, with 24 unpatched vulnerabilities identified in its externally-facing systems, alongside thousands of exposed corporate credentials and numerous SSL/TLS configuration issues.
  •  LBank was flagged for particularly poor security, with 11 critical vulnerabilities left unpatched.

The full report, which includes cybersecurity scores for each analyzed cryptocurrency exchange and more, is available here:

https://businessdigitalindex.com/research/only-3-of-24-leading-cryptocurrency-exchanges-earn-an-a-for-their-cybersecurity/ 

Strada Receives Strategic Investment from OWC

Posted in Commentary with tags on December 15, 2025 by itnerd

Strada, the media collaboration start-up co-founded by brothers Michael Cioni & Peter Cioni, today announced a significant investment from Other World Computing (OWC). This investment marks a key milestone in Strada’s current fundraising program, further accelerating the Company’s product roadmap.

Strada’s peer-to-peer collaboration platform enables video content professionals to access, share, and review large video files stored on local drives anywhere in the world without needing to upload anything to the cloud. OWC provides innovative, high performance technology solutions that empower creative professionals to achieve their creative and business goals. OWC aims to create a world where technology enables imagination, offering tools from capture to collaboration to completion with minimal environmental impact.

Over the coming months, OWC and Strada will commence co-marketing initiatives, including events and social media collaboration, and will extend special incentives to customers who purchase packages of OWC and Strada products. In addition, both companies will share a booth at NAB 2026.

2026 Tech Predictions from Richard Copeland, CEO Leaseweb USA

Posted in Commentary with tags on December 13, 2025 by itnerd

I have three 2026 Predictions from Richard Copeland who is the CEO of Leaseweb USA. They are as follows:

Prediction 1: Trusted Execution Environment Technology Will Reshape Distributed Compute and Multi-Cloud Architecture

“In 2026, Trusted Execution Environment (TEE) technologies will finally move from ‘interesting concept’ to real-world game changer. We’re going to see organizations secure memory and hardware in a way that simply wasn’t practical before, which opens the door for decentralized compute in a very big way. Companies will be able to safely split compute across multiple clouds, regional providers, and even on-prem environments, instead of keeping all their workloads under one hyperscaler’s roof. This will bring a level of flexibility and resilience that hasn’t been possible until now.

What is interesting to note here is that the shift isn’t driven by budgets or hype, but by behavior. When you can secure workloads at the hardware level, you’re suddenly free to architect systems around business needs instead of who owns the data center. It unlocks more creative architectures for blockchain, AI, and high-performance computing, and gives organizations confidence that they can spread their risk without compromising security.”

Prediction 2: AI Becomes Truly Agentic – Replacing Tasks, Not People – and Drives a New Phase of Cloud Repatriation

“AI is no longer just a tool for optimization. In 2026, agentic AI starts replacing full workflows, and that shift will separate companies that understand how to use AI from those that fight it. The real impact isn’t that AI replaces jobs, but that it replaces the tasks people shouldn’t be doing in the first place – the repetitive, time-sucking operations that drain teams. Organizations that lean into agentic AI will run faster, make decisions earlier, and redirect people into work that actually moves the business. 

As AI becomes more embedded in day-to-day operations, more companies will realize that complexity and cost are pushing them away from the hyperscalers. They’re seeing outages, noisy-neighbor issues, unpredictable billing, and environments so complex that one failure cascades through the whole stack. AI workloads, especially GPU-heavy ones, run better, and more cost-effectively, when the infrastructure is simpler, more transparent, and built for their exact workloads. That’s why 2026 will be a major year for cloud repatriation back to regional providers and bare-metal platforms built for performance.”

Prediction 3: GPU Optimization and AI-Driven Attacks Will Push Companies Toward Regional Cloud Providers for Security and Stability

“GPU optimization becomes a headline topic in 2026. Today, most companies only use about 60 percent of the GPU power for which they are paying. Next-gen optimization software is going to flip that on its head, giving organizations the ability to squeeze full value out of their infrastructure. That matters not just for cost control, but for AI reliability. When your model performance becomes a competitive advantage, you can’t afford wasted compute, unpredictable throttling, or hardware carved into fractional units you can’t see. This is where optimized IaaS and regional GPU clouds start to shine. 

At the same time, attackers are getting smarter, and they’re starting to use AI too. The largest, most complex cloud environments become the biggest targets – when bad actors can spin up their own LLMs. Hyperscalers have hundreds of thousands of tenants, which means hundreds of thousands of potential attack surfaces (and pockets to pick). Regional providers have tighter vetting, cleaner environments, and fewer noisy neighbors. In 2026, security-conscious organizations will realize that the safest place to run AI and high-value workloads often isn’t the biggest cloud, it’s the one that actually keeps out the wrong people.”

LastPass Smacked Down In The UK For Being Pwned

Posted in Commentary with tags , on December 12, 2025 by itnerd

The UK ICO has fined LastPass £1.2 million following a 2022 breach that exposed personal data and encrypted password vaults belonging to up to 1.6 million UK users. Regulators found the incident stemmed from a chain of failures, beginning with the compromise of an employee’s personal device and escalating through reused credentials, third-party software vulnerabilities, and stolen cloud access keys. While LastPass’ zero-knowledge encryption remained intact, attackers were able to exfiltrate encrypted vaults and sensitive metadata, highlighting how human and personal-device risks can undermine even well-designed security architectures. The ruling reinforces regulators’ growing focus on executive access, remote work exposure, and the need to secure the human attack surface.

If you want to know more, this will help: UK fines LastPass over 2022 data breach impacting 1.6 million users

Chris Pierson, CEO, BlackCloak had this to say:

     “This case is a clear reminder that today’s most damaging breaches often begin far outside traditional enterprise controls. Attackers did not defeat encryption or zero-knowledge architecture head-on; they targeted a trusted individual, exploited a personal device, and patiently chained together small gaps until they reached high-value access. For executives and privileged users, personal and professional digital lives are inseparable, and adversaries know it. Controls within the enterprise remain critical, but they must be paired with the continuous protection of personal devices, privacy enhancements, and home network protection. Organizations that fail to secure the digital attack surface for key persons and executives in their personal lives are effectively leaving the back door open to attacks.”

The LastPass incidents (as they’ve been pwned multiple times) illustrate how important it is for organizations to close the holes that lead to this sort of thing happening. And if organizations won’t do this by default, then they need to be punished until they get the message.

Intel Serves Up An Extra Special Promotion As Part Of Their Holiday Bundle

Posted in Commentary with tags on December 12, 2025 by itnerd

This year, Intel’s Holiday Bundle promotion gives anyone who purchases a qualifying Intel-powered gaming laptop a complimentary AAA game title from 2025. Recipients get to pick one of four major titles that have each made big waves this year: the adrenaline-charged Battlefield™ 6, the zombie-packed thrill ride Dying Light: The Beast, the sweeping adventure Assassin’s Creed® Shadows, or the iconic strategy sequel Sid Meier’s Civilization® VII

With the gift of Intel’s Holiday Gaming bundle, Canadians can unwrap a powerful new laptop built for gaming and creativity alongside a blockbuster game that keeps the fun going long after the holidays. 

 You can explore the full promotion here. And if you want to see what Intel has on offer, have a look here.

CData Recognized for Second Consecutive Year in the 2025 Gartner Magic Quadrant™ for Data Integration Tools

Posted in Commentary with tags on December 12, 2025 by itnerd

 CData Software today announced that it has been recognized in the 2025 Gartner® Magic Quadrant™ for Data Integration Tools. This marks the second consecutive year that CData has been included in the report.

The company’s unified platform delivers real-time access, semantic intelligence, and comprehensive governance across diverse data sources, empowering organizations to activate their complete data landscape for use in AI, and analytics. Guided by its vision to make data more accessible and actionable for both humans and AI, CData continues to advance innovation in data integration. Ongoing investments in AI integration are focused on addressing one of today’s most critical enterprise challenges: connecting fragmented data to AI systems to enable conversational analytics and agentic platforms.

CData continues to gain industry recognition for its innovation and momentum in data integration and connectivity. Based on real customer reviews, CData positioned again in the Strong Performers quadrant in the 2025 Gartner Peer Insights™. Other recent honors include 2025 Inc. 5000 list, the Accel 2025 Globalscape Top 100 report, The Software Report’s Top 25 Data Management and Analytics Companies of 2025, and the DBTA 100 2025: The Companies That Matter Most in Data.

Access a complimentary copy of the full report here: https://www.cdata.com/lp/gartner-magic-quadrant-data-integration-2025/

Samsung Galaxy Z Fold7 Gains Nano Banana & VEO3 AI Integration

Posted in Commentary with tags on December 12, 2025 by itnerd

Samsung’s Galaxy Z Fold7 recently unlocked a major upgrade: seamless integration of Nano Banana and VEO3 AI features. The addition of these features brings an entirely new level of intelligence, personalization, and creative capability to the foldable experience.

With this collaboration, users get:

  • Video generation from text or images with VEO3
  • New generative features that let users create, edit, and transform content with Nano Banana
  • Smarter, faster on-device assistance with Google Gemini optimized for the Z Fold7’s dual-screen workflow.

Together, these features turn the Galaxy Z Fold7 into an ideal tool for content creators, multi-taskers and creatives alike.

2026 Industry Predictions from The Head of Information Security at Exclaimer 

Posted in Commentary with tags on December 12, 2025 by itnerd

Here’s some 2026 industry predictions from Karl Bagci, Head of Information Security at email signature management software provider, Exclaimer for your review. 

1. The major 2026 security shift most organizations aren’t prepared for

The biggest unacknowledged shift heading into 2026 is that the authentication layer is no longer the perimeter. Attackers aren’t breaking in, they’re logging in. Session hijacking, token theft, infostealer malware harvesting credentials at scale. Most organizations still treat successful authentication as proof of legitimacy. In 2026, that assumption will cost them. Continuous verification throughout a session, not just at login, is where we need to be and almost nobody’s there yet.

2. Where the shared responsibility model will fail next

The next fault line in the already strained shared-responsibility model will arise from AI features embedded in SaaS. Every vendor is bolting on AI capabilities, often using third-party models and often processing customer data in ways that aren’t transparent. The shared responsibility model assumes clear boundaries. AI blurs them completely. When your CRM’s AI assistant summarizes confidential deal notes and that data trains a model or leaks across tenants, whose responsibility is that? The contracts will say yours. The reality is you had no visibility or control.

3. How attacker behavior will escalate in 2026

The next evolution in attacker strategy will be AI-powered social engineering at scale. Today’s business email compromise (BEC) is still largely manual. Tomorrow’s is automated and personalized. AI scrapes LinkedIn, correlates with breached data, and generates contextually relevant messages for thousands of targets at once. Each one referencing real projects, real colleagues, real details. Attack quality goes up. Volume goes up. Current defenses are calibrated for neither.

4. Why compliance will have to extend beyond email

A major compliance shift is coming for regulated industries as regulators begin questioning why email is compliant, but other business channels are not. Organizations spent years building email retention, disclaimers, legal holds, and audit trails, then moved half their communication to Teams and Slack with none of that infrastructure. Financial services, legal, and healthcare all have strict requirements around communication records. The regulatory expectation is forming and extending compliance controls across all digital communication channels is no longer optional. I believe enforcement will follow.