Report highlights data protection challenges for fostering and adoption agencies

A report published by the Information Commissioner’s Office (ICO) has highlighted the challenges independent fostering and adoption agencies are facing when looking after sensitive personal information.

Read More
Akamai Kona Site Defender erzielt bei der Erkennung von Web-Attacken eine Trefferquote von 96 Prozent

Mit der neuen Version von Kona Site Defender verbessert Akamai die Websicherheit noch einmal deutlich. Die Basis dafür bildet eine Kombination der Daten der Akamai Intelligent Platform mit denen eines umfangreichen Test-Frameworks

Read More
WeSecure helps Heemskerk save time and money

Varonis Systems, Inc. is working with the leading security integrator WeSecure to help Heemskerk dramatically reduce its expensive storage overheads. In parallel, the Netherlands municipal is streamlining its data permissions, and reducing complexities, as it prepares to upgrade to Microsoft Active...

Read More
Avnet Technology Solutions UK collaborates with international law firm

Simmons & Simmons hosts Avnet’s first FinancialPath™ University event in London.

Read More
Prolexic warns of cyber attackers targeting stock prices

Prolexic Technologies has shared an analysis of nearly a dozen global DDoS attacks that indicates...

Read More
Silver Peak counters eavesdropping on corporate networks

Silver Peak has combined the best of site-to-site VPN security and WAN optimisation to deliver...

Read More
Improvements to Akamai Kona Site Defender

Combination of data from Akamai Intelligent Platform and new testing framework improves security...

Read More
Lancope delivers operational network security and visibility

New capabilities bring users closer to the right data at the right time for vastly improved network...

Read More
Firms risk permanent damage to their reputation with security savvy public

Businesses must make data protection their top priority in 2014 in the light of high profile data...

Read More
Bitdefender’s cybersecurity predictions for 2014

With 2014 now in full swing, Catalin Cosoi, Chief Security Strategist at Bitdefender, draws on his...

Read More
Novell increases investment in ZENworks portfolio

Company to acquire full breadth of product offering through the purchase of source code from SECUDE.

Read More
BYOx threatens to disrupt the IT landscape

SolarWinds has released the results of its New IT Survey-, which sheds light on the evolving role...

Read More
WatchGuard Technologies extends real-time network security visibility tool

WatchGuard Dimension now includes unlimited scalability and availability, intuitive reporting...

Read More
Trusteer partners with California State University

Trusteer has completed a five week research study on computer malware with 10 student interns at...

Read More

Videos

Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
In this interview, Will Morey, Managing Director at Gamma, discusses the company’s Webex launch, including how a partner-led pre-launch shaped the offering, the influence of MSP demand, and how the platform...
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Brett Candon, VP International, Dropzone AI.