SAI Global deploys Tenable security

SAI Global has implemented the Tenable SecurityCenter enterprise security solution and Nessus®, the industry’s most widely-deployed vulnerability and configuration assessment product. The deployment provides SAI Global with a dashboard view of all security vulnerabilities, configuration...

Read More
Cybersecurity approaches to APTs are often 10 years out of date

Many of today’s most destructive advanced persistent threats (APTs) were conceived a decade ago, so enterprises that rely on most traditional approaches to cybersecurity are unlikely to succeed against the next generation of attacks. This is one of the cautions in a new book published by...

Read More
Simplexo recognised for driving secure search technology to the forefront of cloud computing

Simplexo, a British pioneer of security search technology has been shortlisted in two categories of...

Read More
ZTE provides for APEC CEO Summit 2013

ZTE Corporation has worked exclusively with Indonesia Telkom to provide comprehensive, premium GPON...

Read More
Encrypted and still searchable

Encrypted data out in a cloud service may be safe, but is unusable to the business until decrypted,...

Read More
DataCore stellt Weiterentwicklungen für SANsymphony-V vor

DataCore Software, führender Anbieter für Speichervirtualisierungssoftware,...

Read More

Videos

Data Centre World 2026
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...

Expert Opinions

By Scott Ashenden, Head of Security and Infrastructure at Team Matrix.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...