Virtustream first with Intel TXT

IaaS provider says it is the first to implement the chipmaker’s Trusted Execution Technology in a cloud management platform

Read More
Gartner looks into RaaS

Recovery as a Service is seen as a category of its own in the latest Gartner research, and one of the contenders it picks, Bluelock, talks about it

Read More
The `cloudy car’ market will be huge

Market research report suggests it could be worth over $98 billion by 2018, and the potential of new applications is limitless, though some could be distractingly bad for drivers.

Read More
Tenable joins AWS

Tenable’s widely used Nessus vulnerability scanner is now available as part of Amazon’s AWS Marketplace

Read More
Amazon pumps support into the AWS partners

Remaining the `big gorilla’ in the world of providing cloud infrastructure means more than...

Read More
Securing clouds, and more, by policy

CloudSigma adds policy-based security to its IaaS offering to provide faster, cheaper and more...

Read More
HyTrust buys HighCloud for maximum strength security

By combining its security admin and control tools with HighCloud’s encryption and key...

Read More
Thales gives Microsoft Azure BYOK

Bring Your Own Key using Thales technology is a security approach that Microsoft is now using to...

Read More
Applying analytics to cloud security

Total Defense says it has put some serious big data analytics steroids into its latest...

Read More
Security against the unknown now comes as a service

Lastine, a three year old security specialist with a longer history in identifying the dangerous...

Read More
Fujitsu Forum – A humble lightbulb shows the good and bad of IoT

Fujitsu CTO, Dr Joseph Reger, used a single, IP address-publishing lightbulb to extrapolate out the...

Read More
Sophos delivers security in the cloud

Possibly one of the ultimate services a small business requires is security, and getting it...

Read More
Be careful with apps using NFC

Anyone developing new applications that use the new contactless debit/credit cards and Near Field...

Read More
Laying policy on BYOD security

The partnership between Forescout and SAP aims to make all user devices subject to policy...

Read More
Carrenza gives Oracle users a DRaaS option

Many Oracle users have a high-resilience environment but no escape route if disaster strikes, so...

Read More

Videos

In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...
Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...

Expert Opinions

By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.
By Brett Candon, VP International, Dropzone AI.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...