Imperva acquires data security assets from Camouflage Software

Acquisition enables Imperva customers to increase user access to sensitive data assets while reducing risk.

Read More
Lastline upgrades

Lastline has introduced its latest enhancements to Lastline Enterprise for Global 5000 companies. The Spring 2017 Release adds capabilities to detect and eliminate browser based-attacks, speed incident investigation for security professionals, and provide early warning of unusual or...

Read More
NEWS
IoT boom and GDPR raise the stakes of a cyber-security breach

Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR) creates more transparency on cyber-security.

Read More
Nordic pioneers join forces

Sofigate and 3gamma, the biggest IT management consulting companies in the Nordics, are joining forces. As Sofigate acquires 3gamma, the joint company will have offices in four countries: UK, Denmark, Sweden and Finland. By 2020, the company is aiming to grow into the leading IT management...

Read More
Aspire stops DDoS attacks

Aspire Technology Solutions has deployed Flowmon Networks' anti-DDoS intelligence to defend...

Read More
NEWS
Greater risk to civil and military global navigation applications in 2017

Spirent Communications has warned of the increased likelihood of disruptions this year to a wide...

Read More
RedSeal extends digital resilience platform

RedSeal has introduced enhancements and new integrations for its market leading network modeling...

Read More
Hyper-realistic cybersecurity training and simulation centre for Japan

Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...

Read More
NEWS
F5 introduces comprehensive application security solutions for the digital economy

New solutions give customers the protection and intelligence required to keep applications and user...

Read More
Secure Cloudlink appoints former HPE VP, Lee Hughes, as Chief Sales and Marketing Officer

Cyber security specialist, Secure Cloudlink has appointed former Hewlett Packard Enterprise (HPE)...

Read More
Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...

Read More
Certificate-related outages affect 79 percent of businesses

New study from Venafi finds inadequate cryptographic controls significantly impact reliability...

Read More
Enabling IoT hardware security testing

Metasploit becomes first general-purpose penetration testing tool to link directly to hardware to...

Read More
Intelligent malware prevention just got smarter

Wedge Networks adds cloud-based malware analyzer option to the AI powered Wedge Advanced...

Read More

Videos

Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...

Expert Opinions

By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Roy Azoulay, Co-founder, Chief Information & AI Officer at Cynomi.
By Jamie Woodhall, UK Technical and Innovations Manager at Rentokil Specialist Hygiene.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...