Veritas forms technology alliance with AWS

Veritas 360 Data Management accelerates data migration to the cloud, boosts application performance for cloud workloads and orchestrates disaster recovery to AWS.

Read More
Cloud-based virtual network security
  • Published in

Huawei has released what it says is the industry’s first terabit-level cloud integrated security gateway, USG9000V. This product is designed to provide high-performance, easy-to-manage, and comprehensive software-based virtual network security protection in order to meet the needs of...

Read More
European companies are 'too slack' in preventing cybercrime

Cybersecurity threat list for 2017 from Fujitsu Security Operations Center highlights critical enterprise vulnerabilities.

Read More
Absence of BYOD policies putting data at risk

FoI request finds that 42 per cent of council districts in England do not have a BYOD policy in place.

Read More
Growing IT delivery gap is impacting productivity worldwide

Businesses are embracing API-led connectivity strategies to address digital transformation and...

Read More
Addressing massive scale storage challenges

IBM and Hortonworks have announced the planned availability of Hortonworks Data Platform (HDP®)...

Read More
Nexsan names Ron Bienvenu as CEO

Robert Fernander named Chairman Emeritus.

Read More
Cisco, Dell and Nutanix earn top customer ratings for servers and converged infrastructure

451 Research’s latest Voice of the Enterprise: Servers and Converged Infrastructure indicates...

Read More
NGD appoints Bill McHenry as Non-Executive Director

JP Morgan Chase global IT head to aid NGD post-Brexit trade drive.

Read More
Google security support

nShield HSM “bring your own key” now available for Google customers supplying keys.

Read More
Tenable expands partner Ecosystem

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other...

Read More
NEWS
Databarracks reveals the cost of IT downtime

Service provider launches new initiative to put a figure on the cost of downtime.

Read More

Videos

Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.