RSA launches Risk & Cybersecurity Practice

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that helps operationalize Business-Driven Security™ architecture by helping to reduce business risk through systematic and continuous enablement for clients to manage identity, protect their assets,...

Read More
Forcepoint launches new businesses

Global cybersecurity leader Forcepoint has established four market-centric business units. Forcepoint’s businesses – Cloud Security, Network Security, Data & Insider Threat Security and Global Governments – will drive innovation across each product portfolio, while teaming to...

Read More
Gemalto unveils robust encryption solutions

New SafeNet Luna HSM and 100 Gbps high-speed encryptors provide the industry’s fastest speeds and performance to encrypt data.

Read More
Cloud and security top the CIO agenda for 2017

Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.

Read More
NEWS
Cyber security readiness study finds widespread shortcomings

International study of 3,000 businesses shows widespread variations in cyber security readiness.

Read More
NEWS
IoT boom and GDPR raise the stakes of a cyber-security breach

Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR)...

Read More
NEWS
Greater risk to civil and military global navigation applications in 2017

Spirent Communications has warned of the increased likelihood of disruptions this year to a wide...

Read More
Hyper-realistic cybersecurity training and simulation centre for Japan

Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...

Read More
Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...

Read More
Enabling IoT hardware security testing

Metasploit becomes first general-purpose penetration testing tool to link directly to hardware to...

Read More
Law firms break cybercrime silence

Databarracks, a provider of award winning business continuity services,...

Read More
Confidential information at greatest risk in new businesses

Bad information management practices leave fledgling business over exposed to risk.

Read More
Beware innovation and IoT threat

Arbor Networks has released its 12th Annual Worldwide Infrastructure Security Report...

Read More
The struggle to find security 'talent'

Trustwave and Osterman Research have released results of a new study on cybersecurity resource...

Read More

Videos

Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...

Expert Opinions

By Jamie Woodhall, UK Technical and Innovations Manager at Rentokil Specialist Hygiene.
By Anna Marie Clifton, Director of Product, AI and Agents, at Zapier.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Dan Bridges, Technical Director, Dropzone AI.