China Telecom expands European presence with TelecityGroup

TelecityGroup customers to enjoy wide connectivity and peering options through expanded global network.

Read More
Skyhigh Networks delivers enhanced cloud security capabilities with Palo Alto Networks integration

Skyhigh Networks has announced an agreement with Palo Alto Networks to deliver data visibility, security, and governance capabilities for SaaS-based applications operating within the public cloud. This integrated solution incorporates new risk-based policies generated by Skyhigh Discover and...

Read More
Brocade acquires Vistapointe visibility and analytics solutions

Brocade enhances software networking portfolio to address growth in data networking over mobile handsets.

Read More
Kroll Ontrack demonstrates successful data recoveries with multiple helium-filled hard drives

Proactive research and development advances data recovery toolkit for latest storage technology.

Read More
Arbor Cloud and Pravail Availability Protection System ‘revolutionise’ enterprise DDoS defence

Arbor Networks, Inc. has announced significant enhancements to both the on-premise and cloud...

Read More
StorMagic names Amanda Jobbins to Board of Directors

Renowned marketer – along with expanded sales force – to help drive continued corporate...

Read More
AMD creates ready-to-deploy OpenStack Private Cloud in a Box

AMD has announced a new collaboration with Canonical® that provides one of the industry’s...

Read More
EMEA security appliance market returns to growth

According to IDC's Europe, Middle East, and Africa Quarterly Security Appliance Tracker, 2Q14...

Read More
AIT builds data centre in The Shard

AIT Partnership Group Ltd, UK integrator of Data Centre & Infrastructure Management Software...

Read More
Dyn releases Internet Intelligence solution providing an ‘unprecedented’ view of Internet performance

The world’s largest Internet sensor grid facilitates Internet monitoring, analysis, and...

Read More
Linux monitoring

Halcyon Software has announced the immediate availability of a new Linux on Power agent that runs...

Read More

Videos

Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Data Centre World 2026
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...

Expert Opinions

By Robert Hannigan, Chairman of International Business at BlueVoyant.
By Dan Bridges, Technical Director, Dropzone AI.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...