Nexenta broadens executive team

Nexenta has announced the appointment of Phil Underwood as Chief Operating Officer.

Read More
ISS signs 9-year deal with Canopy for cloud backup

Canopy, an Atos company powered by EMC2 and VMware, has announced details of an expanded nine-year partnership with ISS, the global facility service provider. Atos already provides ISS with Data Centre services and user support, the new contract expands into cloud backup to run alongside the...

Read More
Gambling with DR policy during the recession

By James Carnie, Head of Solutions Architecture, Adapt.

Read More
Unified Communications is much more than a set of communication tools

Three ways UC delivers ROI through optimised business processes.

Read More
The future of virtualisation: automation, orchestration and even more on demand

By Alex Moore, director of technology and engineering, NTT Europe.

Read More
Bag a cable installation solution

HellermannTyton introduces Cable Scout+.

Read More
Space saving 24-fiber MPOptimate system

Future proofing for the next three generations of data center hardware.

Read More
AWS encryption

SafeNet, Inc. has announced key enhancements to SafeNet ProtectV that allow customers to encrypt...

Read More
Handy power handbook

Uninterruptible Power Supplies Ltd, a Kohler company, has announced the launch of the fourth...

Read More

Videos

Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...
Data Centre World 2026
Data Centre World 2026

Expert Opinions

By Roy Azoulay, Co-founder, Chief Information & AI Officer at Cynomi.
By Dan Bridges, Technical Director, Dropzone AI.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...