Thales announces support for F5 Synthesis Architecture

F5 BIG-IP support for Thales hardware security modules offers customers highest levels of security and reduces risk.

Read More
Dell Software expands Dell One Identity

Integration of Dell’s identity governance and privileged management solutions provides a complete offering that governs access for all users, regardless of their role or the level of access they need.

Read More
Lancope announces Global Secure Partner Program

Program enables reseller partners to capitalise on rapidly growing market demand for Lancope’s award-winning StealthWatch security monitoring system.

Read More
Databarracks disrupts the channel with launch of Databarracks Partner (de)Programme

Databarracks has announced the launch of its new reseller network, the Databarracks Partner...

Read More
Organisations see Public Cloud sharing tools as primary security risk

Survey of more than 600 IT professionals highlights dangers of public cloud services such as...

Read More
Trend Micro evolves mobile security solutions

Company’s CEO unveils comprehensive mobile security offerings at Mobile World Congress.

Read More
Zscaler SHIFT advances Internet security

Intelligent routing automatically applies adaptive security policy to dynamic Internet threats;...

Read More
NTT Com Security and Palo Alto Networks sign global Managed Security Services agreement

NTT Com Security and Palo Alto Networks have entered into a global managed security services...

Read More
Trend Micro SafeSync keeps data safe end-to-end for Calligo’s offshore cloud customers

Trend Micro is pleased to announce a new partnership with Jersey-based cloud provider Calligo,...

Read More
Beware of suspect devices

Two recent incidents show that attacks involving the Internet of Things are becoming a reality....

Read More
Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for...

Read More
Bit9 partners with Check Point Software Technologies

Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the...

Read More
More than 575 million data records lost or stolen in 2013

Over 1.5 million data records were lost or stolen every day in 2013.

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity...

Read More

Videos

Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Dan Bridges, Technical Director, Dropzone AI.
By Scott Ashenden, Head of Security and Infrastructure at Team Matrix.