Businesses must tackle cyber security in 2016

The Cyber Streetwise Forum says that proactivity in tackling cyber crime must be a key business strategy for the year ahead.

Read More
Cyber London cyber security accelerator appoints Kirsten Connell as Managing Director

Kirsten Connell has joined Cyber London as Managing Director and will oversee the second Cyber London start-up programme, running from next month.

Read More
NEWS
Insurers told cyber assessment critical to exposure management and pricing

Underwriters and brokers have been warned the vast majority of UK businesses are unprepared to...

Read More
Cogmotive introduces EU Data Hosting for Office 365 Reporting Solutions

Cogmotive says that EU data hosting is now available to its customers to protect their privacy...

Read More
NEWS
2016 - the year of cloud security?

2016 will be the year of cloud security and ROI, a year when CISOs finally get the recognition they...

Read More
NEWS
Governments come under cyberattack

The third quarter of 2015 has seen information and IT systems of different security agencies and...

Read More
More rigorous standards must be applied to the supply chain to ensure cyber security

Cyber Essentials should become de facto standard for doing business in the UK, says APMG.

Read More
NEWS
Global cybersecurity - could do better

International survey of information security professionals identifies cloud, mobile devices and...

Read More
NEWS
Security heads 2016 agenda

Ipswitch set out to uncover the biggest issues facing IT departments as 2016 approaches. The...

Read More
NEWS
Threat Intelligence identified as 2016 investment priority

Study finds performance, skills, and costs remain biggest hurdles to true data-driven security.

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce...

Read More
Research examines real-world networks’ exposure to credential theft attacks

Research provides insights into cyber attacks that abuse hijacked privileged credentials to...

Read More
The future of security under scrutiny

Intel® Security has released its McAfee Labs Threats Predictions Report, which predicts key...

Read More

Videos

Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...

Expert Opinions

By Graham Jarvis, Freelance Business and Technology Journalist
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.