A10 Networks Thunder TPS (Threat Protection System) introduces Advanced DDoS Mitigation capabilities

Thunder TPS 3.1 provides security professionals with programmatic policy control, advanced DDoS mitigation, comprehensive detection, and significant visibility enhancements.

Read More
76 per cent of UK IT pros rank their security above average

SolarWinds has released the results of its Information Security Confidence Survey, which explored IT professionals' confidence in their organisations' security measures and processes. The survey found that while confidence is notably high, likely the result of several key factors,...

Read More
You’ve got malware: free, 60 day trial

Infoblox Inc. has introduced a free DNS-based evaluation product to help find malware carefully hidden by cybercriminals inside enterprise networks. The Infoblox DNS Firewall Virtual Evaluation (www.infoblox.com/catchmalware) provides 60 days of malware detection through downloadable software that...

Read More
Verizon identifies key enterprise technology trends for 2015

Strategic network investments will be a major focus point for savvy CIOs in 2015, as companies seek...

Read More
Industry leaders discuss rapidly changing IT landscape

Smart Cities, Big Data and the changing role of the CIO among key discussion points at Amsterdam...

Read More
Retailers are number one target for cybercriminals

Research shows retailer sites hit by 48% of all web application attacks.

Read More
One third of UK businesses are doing IT right

New Telstra research of 200 IT decision-makers in the United Kingdom has identified a superior...

Read More
Encryption-as-a-Service offering

SafeNet, Inc. has announced ProtectV for Service Providers, an encryption solution that lets...

Read More
New generation of WatchGuard firewalls

Dramatic increase in security horsepower vaults WatchGuard’s new Firebox® M400 and M500...

Read More
Don’t let security leave with your staff

By Barry Scott, CTO, EMEA at Centrify.

Read More
ExtraHop integrates with FireEye to defend against advanced persistent threats

ExtraHop has announced an integration of the ExtraHop wire data analytics platform with the FireEye...

Read More
Fortinet joins Equinix Cloud Exchange

Fortinet® has formed an alliance with Equinix, Inc., joining the Equinix Cloud Exchange™...

Read More
KEMP ships Application Firewall Pack

Load balancing with integrated WAF provides scalable and secure application delivery.

Read More
Report identifies new patterns in advanced target attacks

Analysis of firsthand experiences of the world’s most renowned cybersecurity forensics teams...

Read More

Videos

Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Brett Candon, VP International, Dropzone AI.
By Dan Bridges, Technical Director, Dropzone AI.