Zscaler announces Cloud-based APT solution

Zscaler has announced Zscaler for APTs, said to be the industry’s first cloud-based security solution to address the entire advanced persistent threat (APT) and advanced targeted attack (ATA) defense lifecycle, including protection, detection and remediation. Zscaler for APTs provides...

Read More
ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new...

Read More
100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More
Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry supplying to the major retailers – including Tesco, Asda and Sainsbury's.

Read More
Strategic partnership with Ingram Micro UK

Outsourcery plc has agreed a strategic partnership with Ingram Micro UK, a division of Ingram Micro...

Read More
Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual...

Read More
Allianz partners with forensic IT experts

Cyber crime is costing the UK economy £27bn.

Read More
Lieberman Software and Qualys integration

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise...

Read More
Study reveals “big doubts” over mobile compliance

Only 18 percent of organizations are confident that their mobile policies are compliant with...

Read More
3M study reveals French concerns about shoulder surfing

Survey shows nearly half of French adults are concerned about visual data security; almost two...

Read More
Major vendors and ICT channels come together to address the surge in customer demand for managed services

IT Europa and Angel Business Communications today announced further details of the Managed Services...

Read More
Wick Hill appointed Guidance Software distributor

Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber...

Read More
Skills gap remains

New report from the UK Commission for Employment and Skills reveals that IT specialists are the new...

Read More
Five steps to prepare for a DDOS attack

By Sean Leach, Vice President of Technology for Verisign.

Read More
Mobile mayhem?

As organizations embrace digital transformation, application quality is an increasingly important...

Read More

Videos

In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
In this interview, Aaron Watts, Chief Channel Officer at usecure, explains why people, not just technology, are now the primary target for cyberattacks. He explores how MSPs can balance automation with...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...

Expert Opinions

By Scott Ashenden, Head of Security and Infrastructure at Team Matrix.
By Dan Bridges, Technical Director, Dropzone AI.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...