Achieving compliance objectives

BeyondTrust has introduced the latest version of the company’s privileged password and privileged session management solution, PowerBroker Password Safe 5.7. Users of Password Safe 5.7 will have access to session review enhancements so they can reduce security risks and achieve compliance...

Read More
Odin launches odin.cloud portal for Microsoft CSP partners

Domain delivers Microsoft CSP information to help partners accelerate program participation and go-to-market with Odin Service Automation.

Read More
Explore search appliance for turnkey Big Data analytics

ExtraHop has introduced the fifth generation of its platform. The company’s latest innovation positions ExtraHop as a pioneer in real-time stream analytics for all data-in-motion with market-leading dynamic discovery and universal observation capabilities. These features, when paired with the new...

Read More
NEWS
Singapore deploys Gemalto's authentication solution

Gemalto has deployed its Coesys eGov Authentication Server in Singapore, which provides Two-Factor Authentication (2FA) and end-to-end encryption of passwords to secure Singapore Personal Access (SingPass) logins. The authentication solution helps to provide better security for SingPass users...

Read More
NEWS
6.4 billion connected 'things' will be in use during 2016

Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30...

Read More
Digital business means platform business

CIOs expect digital revenue will grow from 17 percent in 2015 to 38 percent of total private...

Read More
NEWS
Indian data centre infrastructure market to reach $2 billion in 2016

The Indian data center infrastructure market will total $2 billion in 2016, a 5.2 percent...

Read More
Cannon chosen as 'Company of the Year'

Based on its recent analysis of the modular data center market, Frost & Sullivan recognizes...

Read More
Actifio additions

Copy data virtualisation company names five key additions in core markets.

Read More
NEWS
Dell launches 'future-ready' servers

Dell expands 13th generation PowerEdge portfolio to include new entry-level rack and tower...

Read More
Perfecto receives digital experiences funding

New round of funding, strengthened executive management team and strong product development...

Read More
The Alan Turing Institute and Intel form partnership

The Alan Turing Institute and Intel have agreed to form a long term strategic partnership to...

Read More

Videos

Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...

Expert Opinions

By Graham Jarvis, Freelance Business and Technology Journalist
By Chris Carreiro, Chief Technology Officer, Park Place Technologies.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...