Thales gives Microsoft Azure BYOK

Bring Your Own Key using Thales technology is a security approach that Microsoft is now using to help manage and secure the digital rights of information and data delivered via the cloud by collaborating businesses

Read More
Applying analytics to cloud security

Total Defense says it has put some serious big data analytics steroids into its latest cloud-delivered security service, Total Defense for Business, with MSPs as much the target as direct end users

Read More
HyTrust buys HighCloud for maximum strength security

By combining its security admin and control tools with HighCloud’s encryption and key management HyTrust aims to give users the best chance of compliance

Read More
Ovum predicts global optical networks market will exceed US$17.5bn in 2018 as 100G surges

The optical networks (ON) market will exceed US$17.5bn by 2018, for a 3.1 percent CAGR from 2012, predicts global analyst firm Ovum. An exceptionally strong 2Q13 has signalled the beginning of a spending bounce-back. 2Q13 was the strongest quarter in the last six and was the 7th highest quarter in...

Read More

Videos

Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
In this interview, Will Morey, Managing Director at Gamma, discusses the company’s Webex launch, including how a partner-led pre-launch shaped the offering, the influence of MSP demand, and how the platform...

Expert Opinions

By Chris Carreiro, Chief Technology Officer, Park Place Technologies.
By Graham Jarvis, Freelance Business and Technology Journalist
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...