Teams | Collaboration | Customer Service | Project Management

January 2025

Ben & Charles take you inside the Pydio acquisition

Last month, our CEOs Benjamin Schilz and Charles du Jeu, ex-CEO of Pydio and now Head of Engineering for the Wire Cells product, sat down to talk about the Pydio acquisition. Join Ben & Charles for an entertaining and informative chat. The conversation ranges from why Pydio was a perfect fit for Wire to acquire to their shared vision for the upcoming Wire Cells product.

Top Cybersecurity Trends for 2025

The digital world is at a crossroads. Cybersecurity threats are evolving faster than ever. Consumer expectations around privacy are skyrocketing. And governments are introducing stricter and stricter data sovereignty laws. Furthermore, for a fourth year out of five, cybersecurity tops the list of risk management professionals’ concerns, according to the 2025 Allianz Risk Barometer.

The Salt Typhoon Hack is a Giant Wake-Up Call

Recent revelations have shaken the U.S. telecommunications industry to its core. According to reports from major news outlets like the New York Times and Wall Street Journal, as well as confirmations from U.S. government agencies, a highly skilled group of hackers known as Salt Typhoon - believed to be backed by the Chinese government - has breached key components of the U.S. communications infrastructure. The group’s target?

Wire acquires Pydio to create breakthrough secure workspace solution

We’ve got big news! Wire has acquired French document sharing company, Pydio. The vision behind this acquisition is to create an innovative, unified workspace solution that eliminates the tradeoff between security and productivity. Imagine a single app that allows you to video call like Zoom, chat like Slack, and collaborate on documents like Google Drive all without putting your data at risk - and we’re already hard at work making this vision a reality.

AT&T and Verizon China Hack: End-to-End Encryption is Critical But Not Enough

The recent revelations of China’s hack of western telecommunications providers across multiple countries are a red flag for corporate and government leaders who care about their sensitive data. The exfiltration of massive amounts of Internet data from western mobile and fixed line networks tells us that end-to-end encryption of internal data is table stakes, and that data protection requires a zero-trust, zero-knowledge, and post-quantum-friendly approach.