NEWS
Global cybersecurity report reveals misaligned incentives

Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented.

Read More
Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to...

Read More
NEWS
Predicting people - the future of security

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.

Read More
Tenable expands partner Ecosystem

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other launch partners .

Read More
NEWS
IT departments find it hard to keep the Cloud safe

Trust now outnumbers distrust for public clouds by more than 2-to-1.

Read More
RSA launches Risk & Cybersecurity Practice

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that...

Read More
Forcepoint launches new businesses

Global cybersecurity leader Forcepoint has established four market-centric business units....

Read More
Cloud and security top the CIO agenda for 2017

Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.

Read More
NEWS
Cyber security readiness study finds widespread shortcomings

International study of 3,000 businesses shows widespread variations in cyber security readiness.

Read More
NEWS
IoT boom and GDPR raise the stakes of a cyber-security breach

Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR)...

Read More
Hyper-realistic cybersecurity training and simulation centre for Japan

Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...

Read More
Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...

Read More
Law firms break cybercrime silence

Databarracks, a provider of award winning business continuity services,...

Read More
Confidential information at greatest risk in new businesses

Bad information management practices leave fledgling business over exposed to risk.

Read More
Beware innovation and IoT threat

Arbor Networks has released its 12th Annual Worldwide Infrastructure Security Report...

Read More

Videos

Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...

Expert Opinions

By Dan Bridges, Technical Director, Dropzone AI.
By Sean Tilley, Senior Director of Sales EMEA at 11:11 Systems.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Graham Jarvis, Freelance Business and Technology Journalist