IT-Automatisierung beseitigt menschliche Fehlerquellen - Von Jonathan Crane, Chief Commercial Officer bei IPsoft in New York City

Mit schnelleren Netzwerken, einer höheren Verfügbarkeit und einem verbesserten Performance-Management ist die IT heute besser aufgestellt als noch vor einigen Jahren. Allerdings gibt es nach wie vor ein Problem, das die IT-Performance negativ beeinflusst und bisher in aller Regel noch...

Read More
Trustwave acquisition bolsters data protection

Trustwave has announced the acquisition of data security provider Application Security, Inc. The company’s automated database security scanning technologies strengthen Trustwave’s ability to help organisations protect high-value data, reduce security risks and achieve compliance with...

Read More
F5 delivers 'most comprehensive' DDoS protection

New hardware-accelerated solution safeguards applications and the network while delivering superior...

Read More
Stonesoft NGFW 5.6 update introduces API and enhanced virtualisation support

The cyber security expert Stonesoft, A McAfee Group Company, releases version 5.6 of its visionary...

Read More
Thales helps secure Microsoft’s next-generation cloud service

Innovative bring your own key (BYOK) capability allows businesses to retain control of critical...

Read More
Information security and risk management holding back UK business innovation

Concerns over security and risk stop project or business ideas progressing in nearly half of all...

Read More
HyTrust acquires HighCloud Security

Integrating administrative visibility and control with encryption and key management offers...

Read More
72% of employees stuck with unauthorized file sharing services

With 81% of employees now accessing documents outside the office, companies must provide a safe way...

Read More
DiskShred warns of rising PCI-DSS data destruction issues for UK corporates

DiskShred has warned UK companies that process credit card transactions - which accounts for almost...

Read More
Vaultive Extends ‘Encryption-In-Use’

In response to customer demand for additional cloud enablement and risk mitigation capabilities,...

Read More
Outsourcery and Dell join forces

Outsourcery plc is working with Dell to design and deploy the compute, storage and networking...

Read More
Softcat climbs the ranks with Check Point Software Technologies Platinum accreditation

Softcat has reached the top level of the Check Point Software Technologies’ partner hierarchy...

Read More
Fujitsu strengthens its global solutions portfolio

Fujitsu and Check Point Software Technologies to jointly market Check Point Integrated Appliance...

Read More

Videos

Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Data Centre World 2026
Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...

Expert Opinions

By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Robert Hannigan, Chairman of International Business at BlueVoyant.