K3 Hosting forms channel partnership with Webroot

Global consultancy K3 Hosting has boosted its Managed Services offering by becoming a Webroot channel partner. The collaboration further strengthens K3 Hosting’s offering of cloud and managed services to companies globally.

Read More
2015 predictions

Skyhigh Networks’ founder and CEO, Rajiv Gupta, outlines his top cyber security and cloud predictions for 2015.

Read More
Businesses face new security challenge from the Internet of Things

By Wieland Alge, VP & GM of EMEA at Barracuda Networks.

Read More
Invu’s predictions for 2015

These predictions for 2015 are from Stuart Evans, Chief Technology Officer, at Invu.

Read More
2015 prediction - courtesy of Rackspace

Nigel Beighton, VP Technology, Rackspace – predictions for 2015.

Read More
New challenges and risk mitigation drive changes to IT security

Michael Fimin, CEO of Netwrix shares his list of top security trends for 2015.

Read More
How data security dominated the data recovery conversation in 2014

Data security, business continuity and mobile devices were among the biggest trends impacting the...

Read More
Six enterprise IT predictions for 2015

By David Gibson, VP at Varonis Systems.

Read More
Perforce announces technology predictions for 2015

The year ahead will see other industries and disciplines adopt software development technology and...

Read More
ExtraHop predicts an IT security shakeup

ExtraHop has announced its top predictions for enterprise IT in 2015. Based on insight from...

Read More
E-Commerce and Retail

As we're nearing the end of 2014, Stephen Coty, chief security evangelist at Alert Logic, takes...

Read More
One third of European businesses to introduce wearable technology to the workplace in 2015

However, over three quarters of businesses in the UK, France and Germany admit they have no policy...

Read More
Why a different approach towards data security is needed

By Phil Holmes, UK Channel Director, SafeNet.

Read More

Videos

In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Dan Bridges, Technical Director, Dropzone AI.
By Brett Candon, VP International, Dropzone AI.