Financial apps - secure or not?

Two thirds of online banks still have at least one critical vulnerability, even as the numbers decline.

Read More
NEWS
Global cybercriminal revenues hit $1.5 trillion

Ground-breaking study, commissioned by Bromium, highlights emergence of Platform Criminality, exposing cybercriminal links to drug production, human trafficking and terrorism.

Read More
Thunder defeats cyber attacks

A10 Networks says that a global tier-1 Cloud Service Provider has selected and deployed Thunder TPS (Threat Protection System) with A10’s Non-stop DNS solution across multiple data centres to ensure resilience from escalating cyber-attacks and scale its mission critical DNS services.

Read More
Security orchestration across major Cloud platforms

As they struggle to deal with the speed of business process automation and the exponential growth of corporate data, 66 per cent of enterprises and 49 per cent of SMBs are planning to expand their hybrid cloud infrastructures. At the same time, every second company feels it cannot fully...

Read More
Tripwire expands Cloud Security capabilities

New functionality tackles publicly exposed cloud data; core secure configuration functionality now...

Read More
Helping to validate Microsoft Azure DDoS Protection Service defences

BreakingPoint Cloud delivers realistic attack simulations and quantifiable test results to...

Read More
Employees responsible for 35% of ICO data security incidents since 2015

New analysis has found that over the last three years, 35% of all major data breaches were caused...

Read More
Legacy email systems - a significant security risk?

Mimecast has published its quarterly Email Security Risk Assessment (ESRA), a report of tests...

Read More
A10 Networks introduces One-DDoS Protection

A10 Networks has introduced A10 One-DDoS Protection, featuring software enhancements to its...

Read More
Millions of applications risk exposing personal data due to 3rd party code

While analysing popular dating apps, Kaspersky Lab researchers have found that some transmit...

Read More
Individual DDoS attacks can cost enterprises US$ 50,000

DDoS attacks can cost enterprises $50,000 per attack – but lost revenue is still only...

Read More
NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers...

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a...

Read More
Citrix Analytics Service addresses security threats

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour,...

Read More
AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in...

Read More

Videos

Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...
Data Centre World 2026
Data Centre World 2026
Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...

Expert Opinions

By Brett Candon, VP International, Dropzone AI.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
In an exclusive conversation with Devang Mehta of Infrassist, the focus is on how MSPs can move beyond reactive firefighting and build for sustainable growth. Mehta explains how MSPs must rethink how they...