Teams | Collaboration | Customer Service | Project Management

January 2025

Ben & Charles take you inside the Pydio acquisition

Last month, our CEOs Benjamin Schilz and Charles du Jeu, ex-CEO of Pydio and now Head of Engineering for the Wire Cells product, sat down to talk about the Pydio acquisition. Join Ben & Charles for an entertaining and informative chat. The conversation ranges from why Pydio was a perfect fit for Wire to acquire to their shared vision for the upcoming Wire Cells product.

Top Cybersecurity Trends for 2025

The digital world is at a crossroads. Cybersecurity threats are evolving faster than ever. Consumer expectations around privacy are skyrocketing. And governments are introducing stricter and stricter data sovereignty laws. Furthermore, for a fourth year out of five, cybersecurity tops the list of risk management professionals’ concerns, according to the 2025 Allianz Risk Barometer.

Secure Communication with FINRA-Compliant Messaging Apps

Compliance in financial services is not a choice – it is a commitment. Every trade, every client call, and every internal chat has to be done by the book, especially in terms of documentation and communication. Under FINRA regulations, making sure all communications across teams are compliant means making sure each message sent on team messaging platforms-even those innocent-when-sent-in-a-hurry chats-is just as compliant.

DOD-Approved Messaging Apps for Enhanced Communication Security

In today’s hyper-connected world, secure communication is more than a luxury-it’s a necessity. Sharing sensitive information via everyday messaging apps highly exposes organizations to data breaches, cyberattacks, and compliance violations. In industries like defense and government, or for high-stakes business operations, that margin for error is paper-thin. Yet not all messaging applications are created equal, though.

The Salt Typhoon Hack is a Giant Wake-Up Call

Recent revelations have shaken the U.S. telecommunications industry to its core. According to reports from major news outlets like the New York Times and Wall Street Journal, as well as confirmations from U.S. government agencies, a highly skilled group of hackers known as Salt Typhoon - believed to be backed by the Chinese government - has breached key components of the U.S. communications infrastructure. The group’s target?

Wire acquires Pydio to create breakthrough secure workspace solution

We’ve got big news! Wire has acquired French document sharing company, Pydio. The vision behind this acquisition is to create an innovative, unified workspace solution that eliminates the tradeoff between security and productivity. Imagine a single app that allows you to video call like Zoom, chat like Slack, and collaborate on documents like Google Drive all without putting your data at risk - and we’re already hard at work making this vision a reality.

Pioneering Threat Intelligence with AI-Driven Next-Generation Firewalls

Firewalls have been a cornerstone of network security for decades, acting as digital sentinels to safeguard sensitive data and organizational assets. These protective barriers have continuously evolved, adapting to the growing complexity of cyber threats. However, as cyberattacks become more sophisticated, traditional firewalls are increasingly unable to provide the level of defense required to protect modern networks.

Modern Business and the Importance of Secure Communication

In this fast-paced digital age, businesses of all sizes rely heavily on robust communication systems to maintain efficiency, streamline operations, and foster collaboration. Such systems are essential for fostering cooperation. Technology has not only brought about a revolution in how teams interact with one another, but it has also brought about challenges, such as the need to comply with regulations and ensure data security.

AT&T and Verizon China Hack: End-to-End Encryption is Critical But Not Enough

The recent revelations of China’s hack of western telecommunications providers across multiple countries are a red flag for corporate and government leaders who care about their sensitive data. The exfiltration of massive amounts of Internet data from western mobile and fixed line networks tells us that end-to-end encryption of internal data is table stakes, and that data protection requires a zero-trust, zero-knowledge, and post-quantum-friendly approach.