NEWS
HP threat research shows attackers exploiting zero-day vulnerability before enterprises can patch

HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools.

Read More
NEWS
SonicWall offers hybrid choice

Company’s virtual offerings, cloud services match with on-premises deployments to solve real-world security challenges for SMBs, enterprises, governments and MSSPs.

Read More
NEWS
Partnership costs: third party incidents became most costly enterprise data breaches in 2021

The latest edition of Kaspersky’s annual IT Security Economics report reveals the growing severity of cybersecurity incidents affecting businesses through suppliers that they share data with. The average financial impact of such an event for an enterprise reached $1.4million globally in 2021...

Read More
NEWS
Integrated visibility and automation needed to combat threats

The ISMG Cybersecurity Complexity Study sponsored by ReliaQuest suggests enterprises are adopting tool unification to boost visibility and automation as managed services growth overcomes skills shortage to enhance threat detection and response capabilities.

Read More
NEWS
One in five companies has suffered a ransomware attack

The study on ransomware, conducted by cybersecurity experts at Hornetsecurity, also found that...

Read More
NEWS
Research finds remote technical staff at SMEs leave a window for cybercriminals to exploit

New research from data centre specialists ServerChoice shows remote working is leading to increased...

Read More
NEWS
CompTIA ISAO comes to the UK

CompTIA, the nonprofit association for the global information technology (IT) industry, has...

Read More
NEWS
Qualys offers free Ransomware Risk Assessment & Remediation Service

New service, leveraging analysis from Qualys researchers, delivers a ransomware focused,...

Read More
NEWS
Zero Trust Trend

Trend Micro Zero Trust Risk Insights reveals and prioritizes risks for better decision making.

Read More
NEWS
Clavister introduces subscription-based pricing model

Clavister shifts to fully subscription-based model, making the unique Clavister cybersecurity...

Read More
NEWS
Report highlights trends and challenges of automating IT security systems

ThreatQuotient has released the State of Cyber Security Automation Adoption in 2021, new research...

Read More
NEWS
Akamai to acquire Guardicore

Akamai Technologies has entered into a definitive agreement to acquire Tel Aviv, Israel-based...

Read More
NEWS
Armis and Gigamon team up

Leading agentless device security platform provider Armis, and cloud visibility and analytics...

Read More
NEWS
The larger the SMB, the larger the remote working security headache

Avast research finds over half of SMB IT Decision Makers are more concerned about cyber security...

Read More
NEWS
Securing customer data is top priority

41% of IT leaders say content sprawl is increasing the risk of data breaches and leaks.

Read More

Videos

Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...
Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...

Expert Opinions

By Anna Marie Clifton, Director of Product, AI and Agents, at Zapier.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...