DataDirect Networks stages bid to acquire Tintri’s assets

DataDirect Networks has entered into a non-binding letter of intent agreement with Tintri, Inc. (Tintri) to acquire substantially all the assets of Tintri. 

Read More
Backup and recovery for free

Paragon Software Group has released new Paragon Backup & Recovery Free – an easy-to-use, set-and-forget data management tool with all the essential backup and recovery functionality to fulfill the needs of PC users.

Read More
Plutora goes all-in with Amazon Web Services

Following rapid growth, Plutora Migrates Entire Platform to AWS to provide enhanced efficiency, speed, and quality for globally dispersed enterprise customers.

Read More
InAuth unveils next generation of fraud fighting tools

InAuth has enhanced its InExchange® solution, a global digital intelligence network, to provide businesses with advanced insights to help them make smarter security decisions.

Read More
NEWS
100 percent of corporate networks highly vulnerable to insider attacks

During penetration testing performed as an internal attacker, Positive Technologies researchers...

Read More
Voyager Solutions partners with UiPath

UiPath’s RPA solution to help Voyager Solutions customers complete core operations more...

Read More
NEWS
Half of businesses ignore future cyber threats

More than half of businesses (51 per cent) are focused on today’s cyber threats at the expense of...

Read More
Building risk awareness and aligning with business strategy are top priorities

MetricStream’s latest survey on the state of internal audit finds auditors focused on...

Read More
BeyondTrust grows its ecosystem of technology alliance partners with Thales

BeyondTrust and Thales provide customers comprehensive security to control passwords, protect...

Read More
Veeam delivers hyper-availability for Nutanix AHV

New joint solution provides businesses with simplified IT operational management, lower costs and...

Read More
SolarWinds acquires Trusted Metrics

SolarWinds has acquired Trusted Metrics, a provider of real-time threat monitoring and management...

Read More
Fujitsu enables Blockchain proof of business in just a week

Fujitsu launches new, extremely rapid blockchain productisation framework for customers seeking...

Read More

Videos

In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...

Expert Opinions

By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Brett Candon, VP International, Dropzone AI.
By Michael Vallas, Global Technical Principal, Goldilock Secure.