Real time management of intelligent networks

With this project, to be implemented in all the countries where the company operates, Telef?nica is shifting the paradigm in network management evolving to a model that allows to monitor the quality of services offered to customers in real time.

Read More
Skyhigh Networkspartners with Workplace by Facebook

Skyhigh for Workplace will offer security and compliance tools for Workplace, empowering IT to enforce data loss prevention, threat protection and activity monitoring.

Read More
RF Code expands thanks to data centre success

Appointment of former Dell and Salesforce executives strengthen firm’s global reach to meet increased demand for solutions that reduce expenses while increasing data centre efficiency.

Read More
Gigamon visibility platform for AWS gains momentum

Gigamon achieves broader and more consistent visibility for better security in AWS environments.

Read More
Open source aids multi-Cloud adoption

Scality has announced immediate availability of a new open-source Scality S3 Server release,...

Read More
An 'unparalleled' combination of high performance and advanced data management

Extends expertise in large data-intensive workloads to broader range of enterprises, building on...

Read More
Zerto chosen by HBL ICT NHS to protect data of 1.5 million patients

Specialists in government healthcare technology opt for award-winning disaster recovery software...

Read More
Embedded analytics adoption reaches new high

2017 State of Embedded Analytics finds embedded analytics is adopted 3X more than...

Read More
Rapid7 launches quarterly threat intelligence report

Rapid7 has released its first threat intelligence report, an analysis of threats faced by...

Read More
Intergraph® chooses Druva to expand Cloud-based data protection

Cloud data protection and information management, coupled with self-service recovery, gives...

Read More
Customised, comprehensive plans needed to combat network intrusions

BakerHostetler’s 2017 Data Security Incident Response Report confirms that cyberthreats demand...

Read More

Videos

Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...

Expert Opinions

By Michael Vallas, Global Technical Principal, Goldilock Secure.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Chris Carreiro, Chief Technology Officer, Park Place Technologies.