K3 Hosting forms channel partnership with Webroot

Global consultancy K3 Hosting has boosted its Managed Services offering by becoming a Webroot channel partner. The collaboration further strengthens K3 Hosting’s offering of cloud and managed services to companies globally.

Read More
2015 predictions

Skyhigh Networks’ founder and CEO, Rajiv Gupta, outlines his top cyber security and cloud predictions for 2015.

Read More
Businesses face new security challenge from the Internet of Things

By Wieland Alge, VP & GM of EMEA at Barracuda Networks.

Read More
Invu’s predictions for 2015

These predictions for 2015 are from Stuart Evans, Chief Technology Officer, at Invu.

Read More
2015 prediction - courtesy of Rackspace

Nigel Beighton, VP Technology, Rackspace – predictions for 2015.

Read More
How data security dominated the data recovery conversation in 2014

Data security, business continuity and mobile devices were among the biggest trends impacting the...

Read More
New challenges and risk mitigation drive changes to IT security

Michael Fimin, CEO of Netwrix shares his list of top security trends for 2015.

Read More
Perforce announces technology predictions for 2015

The year ahead will see other industries and disciplines adopt software development technology and...

Read More
ExtraHop predicts an IT security shakeup

ExtraHop has announced its top predictions for enterprise IT in 2015. Based on insight from...

Read More
Six enterprise IT predictions for 2015

By David Gibson, VP at Varonis Systems.

Read More
E-Commerce and Retail

As we're nearing the end of 2014, Stephen Coty, chief security evangelist at Alert Logic, takes...

Read More
One third of European businesses to introduce wearable technology to the workplace in 2015

However, over three quarters of businesses in the UK, France and Germany admit they have no policy...

Read More
Why a different approach towards data security is needed

By Phil Holmes, UK Channel Director, SafeNet.

Read More

Videos

Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...

Expert Opinions

By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.
By Dan Bridges, Technical Director, Dropzone AI.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...