Dell helps Radboud University gain control of provisioning and access governance

Dell One Identity Manager enabled the university to simplify governance by merging multiple roles into a single identity.

Read More
‘Dramatically’ reducing the time taken to detect and mitigate DdoS attacks

Arbor Networks, Inc. has announced a significant breakthrough in DDoS attack detection and mitigation response capabilities within its Peakflow® platform. With Peakflow 7.0, service providers can now detect Fast Flood DDoS attacks in as little as one second and initiate mitigation in less than...

Read More
CyberArk expands privileged account security solution

Single, integrated platform protects customers from cyber attackers and malicious insiders.

Read More
Delivering virtualized firewall and routing network functions for telecom networks

New apps run over CloudMetro™ platform’s virtualized engine, simplifying VNF execution and management.

Read More
NTT Com Security wins prestigious UK and EMEA Partner awards from Palo Alto Networks

NTT Com Security has been named as both UK Partner of the Year and EMEA Reseller of the Year by...

Read More
Imperva introduces high-throughput appliances

Imperva Inc. has announced the SecureSphere X8510 and SecureSphere X10K, its newest generation of...

Read More
PCCW Global acquires Crypteia Networks

Companies can no longer go it alone on cyber security.

Read More
Dell SonicWALL firewalls help International Relief and Development

$1 million in operational costs saved through fast and reliable connection and data delivery.

Read More
Soonr to launch regional data centres in the UK

Soonr, a leading provider of secure file sharing and collaboration services for business, has...

Read More
Silos cause security threat

IT team spending too long looking for, and addressing, threats.

Read More
Third-party hosting and maintenance used to manage virtualization

Less than one-third of businesses keep their virtualisation servers on-premises and managed...

Read More
Delays to digital transformation projects create concern for CIOs and CFOs

Canopy’s research finds 75% of CFOs fear their businesses will fall behind if they...

Read More
DDoS protection is a high priority

Corero Network Security, in conjunction with leading European technology sector market intelligence...

Read More
Exostar and BTG upgrade relationship

Alliance will enable secure collaborative research environments in the cloud for Life Sciences...

Read More

Videos

Data Centre World 2026
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...

Expert Opinions

By Anna Marie Clifton, Director of Product, AI and Agents, at Zapier.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Iain Bowes, Head of Management Systems Assurance for TÜV SÜD Business Assurance, a global provider of auditing and certification services that help organisations to gain in-depth insights of how corporate...