New threats subverting digital signature validation

McAfee Labs has released the McAfee Labs Threats Report: Third Quarter 2013, which found new efforts to circumvent digital signature app validation on both PCs and Android-based devices. The McAfee Labs team identified a new family of mobile malware that allows an attacker to bypass the digital...

Read More
Visibility into Cloud applications, user risk, and attacker methodologies

Rapid7 has announced the general availability of its cloud application and user risk management solution, Rapid7 UserInsight, as well as several enhancements to its information-driven security analytics portfolio. With these innovations, Rapid7 is the first and only security analytics provider to...

Read More
CloudSigma offers infrastructure-level firewalls

CloudSigma has announced the general availability of advanced network policy management across all its cloud locations. With this new feature, customers can create, manage and apply enterprise-grade networking policies in relation to their cloud infrastructure in a fully integrated way. By removing...

Read More
Temporary workers still require adequate data protection training, warns ICO

The Information Commissioner’s Office (ICO) is warning employers about the importance of...

Read More
United Kingdom ranks high for ‘Compulsive Clickers’

90% of workers in Britain cannot resist clicking on a web link, according to a survey conducted on...

Read More
Fighting evolving targeted attacks

Symantec bolsters targeted attack protection portfolio with new Disarm technology for Symantec...

Read More
Capgemini is awarded three framework agreements

Capgemini Deutschland GmbH has been awarded three framework agreements with the Data Processing and...

Read More
Palo Alto Networks and VMware ‘transform’ Cloud deployments

Palo Alto Networks® and VMware, Inc. have announced a partnership backed by a new...

Read More
LSI 12Gb/s-SAS-MegaRAID-Controllerkarten und Expander beschleunigen führende Rechenzentren weltweit

LSI erweitert ihr branchenweit erstes 12Gb/s-SAS Portfolio um End-to-End-Speicherlösungen...

Read More
CipherCloud launches Data Discovery and Monitoring solution

Expands cloud information protection offerings to discover data violations, monitor user activities...

Read More
Intermedia appoints Ed Macnair Managing Director EMEA

Global leader in SMB cloud IT services bolsters its management team and expands its worldwide...

Read More
Privileged threat analytics

First-in-kind solution helps businesses stop advanced, external and insider cyber attacks before...

Read More
Powering the Cloud celebrates in style

Continues to be the must-attend pan-European event for storage, virtualisation, big data, cloud and...

Read More

Videos

Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
Data Centre World 2026
Data Centre World 2026
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...

Expert Opinions

By Graham Jarvis, Freelance Business and Technology Journalist
By Chris Carreiro, Chief Technology Officer, Park Place Technologies.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...