Tier-3 builds on strengths in analytics, compliance, automation and incident response

New real-time Governance, Risk and Compliance dashboards deliver live, continuous compliance and security status view for business stakeholders.

Read More
A10 Networks Thunder TPS (Threat Protection System) introduces Advanced DDoS Mitigation capabilities

Thunder TPS 3.1 provides security professionals with programmatic policy control, advanced DDoS...

Read More
UK organisations must address new security risks from wearables at work

Trend Micro study reveals UK businesses’ approach and attitudes to wearables.

Read More
76 per cent of UK IT pros rank their security above average

SolarWinds has released the results of its Information Security Confidence Survey, which explored...

Read More
You’ve got malware: free, 60 day trial

Infoblox Inc. has introduced a free DNS-based evaluation product to help find malware carefully...

Read More
Encryption-as-a-Service offering

SafeNet, Inc. has announced ProtectV for Service Providers, an encryption solution that lets...

Read More
New generation of WatchGuard firewalls

Dramatic increase in security horsepower vaults WatchGuard’s new Firebox® M400 and M500...

Read More
Verizon identifies key enterprise technology trends for 2015

Strategic network investments will be a major focus point for savvy CIOs in 2015, as companies seek...

Read More
One third of UK businesses are doing IT right

New Telstra research of 200 IT decision-makers in the United Kingdom has identified a superior...

Read More
Industry leaders discuss rapidly changing IT landscape

Smart Cities, Big Data and the changing role of the CIO among key discussion points at Amsterdam...

Read More
Retailers are number one target for cybercriminals

Research shows retailer sites hit by 48% of all web application attacks.

Read More
Report identifies new patterns in advanced target attacks

Analysis of firsthand experiences of the world’s most renowned cybersecurity forensics teams...

Read More

Videos

Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...

Expert Opinions

By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.
By Chris Carreiro, Chief Technology Officer, Park Place Technologies.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...