Pulse Secure signs Arrow  

Announces distribution agreement with Arrow in Europe.

Read More
CA Technologies to acquire Xceedium

CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a provider of privileged identity management solutions that protect on-premise, cloud and hybrid IT environments. Terms of the agreement were not disclosed. The transaction is expected to close within the...

Read More
Blue Coat launches Endpoint Alliance Ecosystem

Blue Coat Systems has unveiled its Alliance Ecosystem of Endpoint Detection and Response (EDR) partners. Blue Coat developed this ecosystem to allow actionable intelligence gathered from endpoint security solutions to be shared with the entire Blue Coat security portfolio, enhancing...

Read More
Hacks proliferate, while financial institutions bank on data protection to limit exposure in the cloud

CipherCloud has released its Q2 2015 Global Cloud Data Security Report. This quarter's report...

Read More
Disjointed technologies as biggest challenge facing UK IT security pros

Lack of qualified staff named second biggest challenge with user access and vulnerability...

Read More
Exposing hidden threats in encrypted mission-critical enterprise applications

Delivers industry’s first visibility solution that includes stateful SSL decryption to...

Read More
Sophisticated cyberattacks are defining the innovation race between adversaries and defenders

Findings underscore the need for retrospective analysis to reduce Time to Detection.

Read More
Sophos research reveals state of IT security in local government organisations

Two thirds of local government organisations adopt a shared services approach to cut IT costs but...

Read More
Firewalls deliver secure, high-speed 802.11ac wireless network performance

Dell’s high-performance wireless network security solutions are easy to install and manage,...

Read More
Huawei establishes an Open Platform Ecosystem for the finance industry

Huawei will partner with eleven of the world’s leading banking IT solution providers to...

Read More
BeyondTrust introduces first commercial least privilege solution for Apple desktops in the enterprise

BeyondTrus has released PowerBroker for Mac to address security and compliance concerns among the...

Read More
Network access control - changed for the better

Christian Buecker, CEO, macmon secure gmbh, says network access control (NAC) is needed now more...

Read More
Vormetric appoints Louise Bulman as Vice President of EMEA

Vormetric, a leader in enterprise data security for physical, virtual, big data and cloud...

Read More
Gigamon’s Security Delivery Platform wins support from FireEye

Gigamon's GigaSECURE Security Delivery Platform fully supports and interoperates with the...

Read More

Videos

Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...

Expert Opinions

By Robert Hannigan, Chairman of International Business at BlueVoyant.
By Matt Roberts, VP of Sales, OptiCool Technologies.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...