NEWS
Tenable reveals OT asset discovery engine for cyber exposure management

Tenable has released a new OT asset discovery tool designed to support organisations in identifying and managing cyber-physical systems with reduced operational overhead.

Read More
NEWS
Trust and resilience: the cornerstones of AI and data security

Data resilience is increasingly viewed as important for organisations operating in the AI era, as executive concern over outages continues to grow.

Read More
NEWS
Observability focus increasing in UK IT as infrastructure complexity grows

As UK IT leaders face increasing pressure from complex AI-driven infrastructure, many plan to enhance observability spend and consolidate tools for better efficiency.

Read More
NEWS
Ransomware activity: mixed signals amidst global tensions and technological shifts

Despite a decrease in ransomware incidents, evolving technologies and global tensions signal a complex risk landscape for organisations in February 2026.

Read More
NEWS
AI advances in N-able's SOC solutions

N-able introduces AI-driven detection features for its security operations centre (SOC) aimed at...

Read More
NEWS
Backing up for the future: insights from the Keepit annual data report 2026

The Keepit Annual Data Report 2026 highlights shifts in data recovery practices as companies rely...

Read More
NEWS
WatchGuard expands network detection and response capabilities

WatchGuard Technologies introduces expanded NDR solutions for enhanced threat detection, offering...

Read More
NEWS
LevelBlue & SentinelOne forge alliance for enhanced security operations

LevelBlue has partnered with SentinelOne to deliver AI-driven security solutions, aimed at...

Read More
NEWS
Cisco introduces new AI security strategies

Cisco has introduced security strategies at RSA Conference 2026 aimed at addressing AI-related...

Read More
NEWS
The fragile state of trust in cybersecurity vendors: a 2026 insight

A recent global study explores the role of trust in cybersecurity and its influence on risk and...

Read More
NEWS
Inside the Race: Insights from Pax8’s Mission Briefing

From Red Bull Racing HQ, Pax8’s Mission Briefing explored a channel under pressure, where rising...

Read More
NEWS
Mid-market CFOs: embracing change for financial reporting efficiencies

As pressure mounts, CFOs are rethinking financial reporting to enhance decision-making and...

Read More
NEWS
Sectigo launches multi-tenant partner platform for certificate management

Sectigo reveals multi-tenant partner platform, aiming for seamless, automated certificate...

Read More
NEWS
CybaVerse rebrands to strengthen cyber operations

CybaVerse pivots from consultancy-led defence to platform-driven operations with its rebrand,...

Read More
NEWS
AI and Cybersecurity: the future of phishing defence

2025 marked a turning point in cybersecurity, as AI transformed both phishing techniques and the...

Read More

Videos

Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Data Centre World 2026
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...

Expert Opinions

By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.
By Robert Hannigan, Chairman of International Business at BlueVoyant.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...