Intelisecure acquires Pentura

InteliSecure now protects the critical assets of more than 500 enterprise customers worldwide with anticipated 2015 revenues in excess of $35M; forecasts a 50 percent annual sales growth rate in the next three consecutive years.

Read More
Infoblox enhances carrier-grade DNS protection to block more attacks against service providers

Infoblox has announced enhancements to its carrier-grade DNS solution portfolio to block more types of attacks against service providers and deliver a better subscriber experience. These attacks can reduce network performance or even disrupt subscriber services, damaging brand reputation and...

Read More
Peace of mind for Frogmore

Varonis Systems has detailed how its broad portfolio of solutions is helping Frogmore’s UK workforce secure their sensitive data while simultaneously making it easier for employees and business partners to collaborate.

Read More
Clavister Solutions deployed by Malaysian Government Ministry

Eagle and Wolf series firewalls to secure agency’s hosted cloud application.

Read More
Data centre security – Do you understand your risk?

By John Hall, Sales and Marketing Director, at Infinity SDC.

Read More
Dell extends end-to-end security offerings

Continued innovation and integration around security solutions provide customers with...

Read More
Telco Systems launches cyber-protection solution

New cyber-security solution also available as a virtualized service.

Read More
Enhanced security and administration for cloud-based deployments

Capabilities provide significant time and cost savings for nShield and payShield customers with...

Read More
Senior management have unrealistic expectations about IT downtime

Report identifies gap between IT and senior management expectations.

Read More
British Crime Survey reveals the true scale of fraud and cyber crime

The results for the British Crime Survey for the first time show that fraud and cyber...

Read More
Research reveals 2016's top IT challenges

Global survey of 2,685 IT pros highlights the biggest challenges IT teams face in the battle...

Read More
NEWS
Report reveals the dangers of the Dark Web

Hidden Data Economy report exposes price points for stolen data bought and sold in cybercriminal...

Read More
Centrify joins Cloud Security Alliance

Centrify joins Cloud Security Alliance as a corporate member, brings expertise in strengthening...

Read More
Cyber London seeks out Europe’s brightest security start-ups

Cyber London has started its second programme to support the brightest new European security...

Read More

Videos

In this interview, Aaron Watts, Chief Channel Officer at usecure, explains why people, not just technology, are now the primary target for cyberattacks. He explores how MSPs can balance automation with...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...

Expert Opinions

By Michael Vallas, Global Technical Principal, Goldilock Secure.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
Neal Griffiths, Chief Experience Officer at Matrix Booking explores how human-centred design, underpinned by evidence and empathy, is redefining how organisations create flexible, inclusive and high-performing...