NEWS
Westcon-Comstor forms EMEA distribution agreement with Noname Security

Leading technology distributor strengthens cloud security and DevSecOps offering with new vendor signing.

Read More
NEWS
European travel industry faces mounting cybersecurity threat

Post-lockdown recovery threatened for businesses vulnerable to increasing rate of cyberattacks across the region.

Read More
NEWS
Cybersecurity priorities hampered by 'lack of fundamentals'

57% of organizations are prioritizing secure cloud migrations and 48% are looking to implement Zero Trust; however, the majority are still held back by lack of visibility and challenged with measuring the progress of their security program.

Read More
NEWS
Partnership to address the quantum security threats to networks

Arqit Quantum Inc. and Juniper Networks have signed a ‘Technology Alliance Partner Connect’...

Read More
NEWS
Palo Alto Networks introduces Prisma SASE

Includes new SD-WAN appliance with integrated 5G to accelerate branch transformation and Autonomous...

Read More
NEWS
$2 million recovery costs for financial services ransomware attacks

Sophos has published findings from its survey report, “The State of Ransomware in Financial...

Read More
NEWS
Tenable to acquire Accurics

Acquisition will deliver programmatic assessment and automated mitigation for infrastructure as...

Read More
NEWS
Survey highlights security software 'negligence'

Venafi has published survey results highlighting the challenges of improving software supply chain...

Read More
NEWS
UK businesses vulnerable as back-ups remain exposed to ransomware attacks

Osirium Technologies has released first findings from The Osirium Ransomware Index which suggests...

Read More
NEWS
Hornetsecurity launches all-in-one security and backup service for Microsoft 365

All managed via a single, central console thanks to 365 Total Protection Enterprise Backup.

Read More
NEWS
HCL Technologies delivers Advanced Cyber Recovery solutions

HCL Technologies has expanded its strategic collaboration with Dell Technologies to provide clients...

Read More
NEWS
Adversaries are accelerating targeted access to critical networks

OverWatch also exposes an uptick in targeting from China-Nexus adversaries; attacks targeting...

Read More
NEWS
Commvault Adds New Ransomware Protection and Response Services

Commvault extends its ransomware solutions with new services designed to plan for, protect, and...

Read More
NEWS
Suspicious emails likely to be phishing

Facilitating employee reporting of phishing attempts is an effective security control when teams...

Read More

Videos

Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
In this interview, Will Morey, Managing Director at Gamma, discusses the company’s Webex launch, including how a partner-led pre-launch shaped the offering, the influence of MSP demand, and how the platform...
In this interview, Aaron Watts, Chief Channel Officer at usecure, explains why people, not just technology, are now the primary target for cyberattacks. He explores how MSPs can balance automation with...

Expert Opinions

By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Matt Roberts, VP of Sales, OptiCool Technologies.
By Graham Jarvis, Freelance Business and Technology Journalist
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...