Sophisticated hackers slipping under the radar of IT managers

A new industry study has revealed that a shocking 46 per cent of IT managers are not aware of PBX phone fraud – a malicious practice which leaves businesses at risk of footing huge phone bills from fraudulently made calls.

Read More
Panda Security launches Panda Cloud Fusion

Panda Cloud Fusion is an integrated solution to protect, manage and support all devices on the IT network, including smartphones and tablets.

Read More
Total and Databarracks to provide cloud services in new partnership

With over 25 years of experience between them, service providers Total Ltd and Databarracks are joining forces to provide the latest cloud backup and disaster recovery services. Stuart Baikie, managing director from Total commented on the similarities between the two organisations’ ethos:...

Read More
Veracode partners with Imperva

Technology integration simplifies compliance and enables faster vulnerability mitigation,...

Read More
Three-quarters of consumers say organizations don’t care about protecting their data

Most consumers just don’t believe that the personal and financial data they submit to...

Read More
Steria survey reveals that overconfidence threatens the security of UK's enterprises

Steria has revealed that 96% of UK’s enterprises believe they are capable of dealing with a...

Read More
Check Point collaborates with VMware

Check Point automates network security for VMware virtualization and cloud environments.

Read More
Sophos delivers Advanced Threat Protection for the small and mid-market

Sophos has announced an extensive update to its award winning Unified Threat Management solution,...

Read More
Tech Data Europe appoints SVO, Operations

Johan Vandenbussche will report to Néstor Cano, President Europe.

Read More
Cybercrime strikes more fear than NSA spying

Despite the NSA and Snowden controversy dominating news headlines and sparking a serious privacy...

Read More
NTT Com Security appoints John Theobald as Global CISO

Global information security and risk management company, NTT Com Security (formerly Integralis) has...

Read More
Dell SonicWALL threat researchers uncover nearly 80 billion incidents of post infection malware activity

Threat researchers discover trends in attack strategies and explore vulnerabilities in top industry...

Read More
Dell SecureWorks adds two services to its security awareness training solutions portfolio

Dell SecureWorks is adding two new services to its portfolio of Security Awareness Training...

Read More
2014 sees rise of aggressive cyber attacks

CryptoLocker attack shows why SMEs need to protect themselves now more than ever, says Databarracks.

Read More

Videos

Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...

Expert Opinions

By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Matt Roberts, VP of Sales, OptiCool Technologies.
Neal Griffiths, Chief Experience Officer at Matrix Booking explores how human-centred design, underpinned by evidence and empathy, is redefining how organisations create flexible, inclusive and high-performing...
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...