Red Hat expands routes to market for storage portfolio

Red Hat Ceph Storage and Red Hat Gluster Storage solutions now available to Red Hat business partners, embedded partners, and cloud and service providers.

Read More
VMware Ready™ status for NFV

The Brocade® Virtual Evolved Packet Core has achieved VMware Ready™ status for Network Functions Virtualization (NFV). This designation indicates that after a detailed validation process, the Brocade Virtual Evolved Packet Core has achieved VMware’s highest level of endorsement, and...

Read More
NEWS
Cloud Price Index reveals a 74% saving by using multiple cloud providers

New report gives buyers and sellers insight into the savings that can be made by shopping around for the cheapest services for each part of a Web application.

Read More
NEWS
Harness the power of disruption or become obsolete

CA Technologies' CEO Mike Gregoire opened CA World ’15 by focusing on the changing timescales of innovation in the business landscape, and called on companies to harness software as a basic organising principle of their businesses to stay relevant in a fast changing world.

Read More
CA Technologies strengthens identity-centric security portfolio

CA Technologies has launched new product releases in its identity-centric security portfolio that...

Read More
CloudEndure teams with Google

CloudEndure delivers live migration into Google Cloud Platform without any data loss or downtime.

Read More
Exploit kit activity up 75 percent

Infoblox has revealed that creation of DNS infrastructure by cybercriminals to unleash exploit...

Read More
Pulse opens online education centre

Training platform empowers customer development, increases time-to-productivity.

Read More
NEWS
Fujitsu enables Schneider Electric’s digital workplace transformation

Fujitsu will provide workplace services to Schneider Electric for Europe, Middle-East, Africa and...

Read More
Telef?nica and Huawei sign a strategic MoU

Define the requirements of future 5G networks.

Read More
Datto closes $75 million Series B round

Announces plans for continued growth and three new board members.

Read More
NEWS
University of Warsaw selects Cray supercomputer for modelling

Cray has been awarded a contract to provide a Cray® XC40™ supercomputer to the...

Read More

Videos

Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Data Centre World 2026
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...

Expert Opinions

By Brett Candon, VP International, Dropzone AI.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...