State-sponsored attacks: The worst has yet to come

Survey reveals that hacking landscape will get much worse and IT security professionals cannot even confirm whether or not their network has already been breached.

Read More
‘Revolutionising’ SAP security

Onapsis has released the Onapsis Security Platform (OSP), featuring two software-based solutions and an advanced threat protection subscription-based service to holistically secure SAP business-critical applications.

Read More
Lancope strengthens Cisco pxGrid support

Lancope, Inc. is providing tight product integration with the new Cisco Identity Services Engine (ISE) 1.3, unveiled this week at Interop New York as part of the Cisco Cyber Threat Defense (CTD) Solution 2.0. Cisco ISE is a powerful and flexible attribute-based access control solution that provides...

Read More
Kaseya Release 8 delivers ‘leading’ security and compliance management

Kaseya has announced the availability of Release 8 of its product portfolio. In addition to...

Read More
Human resources and training departments key to securing the human

Security awareness training must be given more importance as likelihood of human error leading to a...

Read More
Majority of organisations not confident in ability to protect data after a breach

74 per cent of IT decision-makers believe perimeter security is effective at keeping out security...

Read More
Multi-terabit per second mitigation capacity expansion

Arbor Networks, Inc. has announced a significant capacity expansion program for the Arbor CloudSM...

Read More
Dell and Oracle help customers deploy Oracle Business Intelligence Applications

Dell Integrated Systems for Oracle Business Analytics dramatically speeds deployment, management...

Read More
Lack of IT policy on devices putting companies at risk

New research from data recovery specialists, Kroll Ontrack, reveals how companies that don’t...

Read More
Large number of UK companies still in the dark on security

Nearly 10% of UK companies don’t know how many security breaches they have suffered in the...

Read More
CIOs should be kept awake at night by growing the top line

A recent survey has revealed that CIOs are twice as likely to focus on delivering IT services to...

Read More
£2.5 million to recognise and reduce cyber-attack threats to critical infrastructure

New research co-funded by the Engineering and Physical Sciences Research Council (EPSRC) will focus...

Read More
The Logic Group Maximises payment security

Point-to-Point Encryption reduces merchants’ vulnerability to a data breach or failed audit.

Read More
SignNow appliance brings Cloud Workflow Management to organisations

Barracuda Networks, Inc. has announced the general availability of Barracuda SignNow version 4.0...

Read More

Videos

Zeki Turedi, CrowdStrike Field CTO Europe, discusses the findings of the company’s 2026 Global Threat Report, which reveals that AI is accelerating the adversary and expanding the enterprise attack surface....
Katie Coulson, Executive Vice President and General Manager, Skanska Advanced Technology, discusses the many factors which need to be considered when delivering a data centre design and build, including the...
Data Centre World Frankfurt 2026
Carlson Choi, COO of Slide, outlines how Slide is rebuilding backup and disaster recovery for modern MSPs, moving away from legacy systems toward a platform built for security, speed, and scale. He discusses...

Expert Opinions

Implemented a phased replacement and migration of Hill Dickinson’s Wide Area Network (WAN) and security infrastructure.
By: Brian Kreidler, Team Leader Project Engineering, ZIEHL-ABEGG Inc.
By Sham Arora, Chief Technology Officer at Tech Mahindra.
In this Q&A, Jamil Valliani, Head of Product for AI at Atlassian, discusses the company’s approach to AI, the role of context in enterprise workflows, and how tools like Rovo and Teamwork Graph are evolving.