Cyber attack complexity leaves many organisations exposed

As new cyber attacks continue to emerge, 48 percent of IT security professionals admit they are not confident that they could detect an attacker attempting to breach their network, according to a new survey from Lieberman Software Corporation.

Read More
High density, top-of-rack switch platform

ZNYX Networks has announced the B1 top-of-rack switch platform for security and NFV (network...

Read More
Krome adds Dell certifications

Dell Premier Partner Krome Technologies has achieved two new Dell Software certifications for data...

Read More
Tech industry veteran Mike Bennett joins AlienVault Advisory Board

AlienVault says that technology industry veteran Mike Bennett will join the company’s...

Read More
The time for secure DNS?

The Domain Name System (DNS) is critical network infrastructure; without DNS the Internet...

Read More
IBM and Intel bring new security features to the cloud

SoftLayer first to offer added security down to the chip level to boost hybrid cloud deployments.

Read More
HP helps organizations realize Open Source Cloud benefits with HP Helion OpenStack® Professional Services

HP’s unmatched OpenStack technology experience enables customers to deploy OpenStack-based...

Read More
Phoenix IT appoints new head of Partner Business

Phoenix IT Group announces the appointment of Alistair Blaxill as head of its Partner Business unit...

Read More
Espion enhances its Cloud Assurance credentials

Leaders in managing and securing corporate information Espion, has further strengthened its cloud...

Read More
UK users unable to detect phishing

McAfee Labs has released the McAfee Labs Threats Report: August 2014, revealing that phishing...

Read More
Cisco and Red Hat deliver integrated infrastructure for OpenStack

Cisco and Red Hat have announced a new integrated infrastructure solution for OpenStack-based cloud...

Read More
HP strengthens UK Public Sector supply chain

New IASME security standard enables SMEs to demonstrate best practices in IT security and compete...

Read More

Videos

Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...

Expert Opinions

By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.
By Brett Candon, VP International, Dropzone AI.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...