Spiceworks debuts security integrations

Spiceworks has announced a series of updates that simplify how more than 4 million IT professionals manage their technology environments. The new features are designed to give IT professionals access to the security and help desk tools they need to get their jobs done more efficiently, all from a...

Read More
AlienVault brings security threat insight to millions

New AlienVault Threat Alerts feature in Spiceworks 7.1 provides IT professionals with real-time, actionable information from the world’s largest crowd-sourced threat intelligence database.

Read More
Matrix Systems announces new divisions

Company to extend the reach of Frontier nationally and build a premier regional security systems integration business.

Read More
Becrypt announces distribution agreement with SYNNEX Corporation

New partnership extends Becrypt’s international footprint, opening up new markets in the USA.

Read More
2014 trends

Allied Telesis predicts that management, security and optimization of infrastructures will be the...

Read More
Orange Business Services acquires Atheos

Orange Business Services has announced the acquisition of Atheos, becoming the largest European...

Read More
Lancope’s Tom Cross named Ponemon Institute Distinguished Fellow

Fellows help Ponemon educate global organisations on improving data protection initiatives.

Read More
FireEye announces acquisition of Mandiant

FireEye has acquired privately held Mandiant, the leading provider of advanced endpoint security...

Read More
Happy Secure 2014

AppRiver's senior security analyst, Troy Gill, offers his top 10 list of security resolutions...

Read More
Five steps businesses need to take to become cyber robust in 2014

One of the biggest challenges for businesses in the New Year is to become ‘cyber...

Read More
Securing the enterprise from DDoS attack: A unique opportunity for ISPs and MSSPs

By Darren Anstee, Solutions Architect Manager for Arbor Networks.

Read More
WatchGuard's top 8 security predictions for 2014

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you...

Read More
The race to stem cybercrime using biometrics is on

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into...

Read More
Blue Coat acquires Norman Shark

Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions...

Read More

Videos

In this interview, Will Morey, Managing Director at Gamma, discusses the company’s Webex launch, including how a partner-led pre-launch shaped the offering, the influence of MSP demand, and how the platform...
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...

Expert Opinions

By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Graham Jarvis, Freelance Business and Technology Journalist
By Dan Bridges, Technical Director, Dropzone AI.