‘X-Ray’ vision into firewall configurations and network traffic

Newest enhancement to WatchGuard Dimension visibility solution allows admins to see policy misconfigurations and optimise traffic.

Read More
Juniper Networks expands Spotlight Secure

Juniper Networks has announced new advancements in its security capabilities that extend the Juniper Networks® Spotlight Secure threat intelligence platform and link it with firewall policies in Juniper Networks SRX Series Services Gateways.

Read More
Trustworthy Software Initiative to be based at WMG's Cyber Security Centre

WMG's Cyber Security Centre at the University of Warwick is to host a million pound programme designed to enhance the cyber security of many of our everyday technologies and tools by ensuring that the software that underpins them is more trustworthy.

Read More
Centrify powers Samsung KNOX Enterprise Mobility Management solution

Centrify Corporation has expanded its strategic OEM partnership with Samsung Electronics Co., Ltd. to power the cloud-based identity and access management (IAM) features of the Samsung KNOX EMM (Enterprise Mobility Management) cloud-based service.

Read More
Intel unveils new developer tools for future technologies

Intel Corporation CEO Brian Krzanich kicked off Intel's annual technical conference with a...

Read More
OpenStack revenue expected to hit $3.3 billion by 2018

The market for OpenStack-related products and services will quadruple in size between the end of...

Read More
Global survey finds 85% of mobile apps fail to provide basic privacy information

A survey of over 1,200 mobile apps by 26 privacy regulators from across the world has shown that a...

Read More
Cyber attack complexity leaves many organisations exposed

As new cyber attacks continue to emerge, 48 percent of IT security professionals admit they are not...

Read More
Big business decisions driven by gut instinct as well as gigabytes

Business leaders are taking major strategic decisions about the future of their businesses based on...

Read More
Turning the tables on cyber attackers

New RSA® Advanced Security Operation Center Solution arms security teams with new tools to help...

Read More
Advancing threat analytics

Targeted data analytics provides faster time to attack detection over Big Data approach.

Read More
Biometrics can be an alternative to conventional authentication technologies in mobiles

The number of global biometrics smartphone users is expected to reach 471.11 million in 2017 from...

Read More
Rapid7 announces interoperability with HP ArcSight ESM

Rapid7 says that its innovative incident detection and response solution, Rapid7 UserInsight, is...

Read More
Cloud FUD fails to match up with experiences, says CIF

Research finds just 2 per cent of cloud users have experienced a data breach.

Read More
Tech industry veteran Mike Bennett joins AlienVault Advisory Board

AlienVault says that technology industry veteran Mike Bennett will join the company’s...

Read More

Videos

Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Data Centre World 2026
Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...

Expert Opinions

By Anna Marie Clifton, Director of Product, AI and Agents, at Zapier.
By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.
By Robert Hannigan, Chairman of International Business at BlueVoyant.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...