Mobility spurs major changes in enterprise governance strategies

Enterprise mobility and the proliferation of endpoints are driving profound changes in how organisations handle information governance, according to a Forrester Consulting survey commissioned by Druva. Companies are planning significant increases in governance-related spending, accelerated...

Read More
Number of victims of targeted attacks more than doubles in 2014

Kaspersky Lab has undertaken a master review of the key events that defined the threat landscape in 2014. Among a range of security incidents, targeted attacks and malicious campaigns stand out, particularly in terms of their scale and impact on businesses, governments, public and private...

Read More
Data analytics important to nearly two-thirds of European companies

Senior executives and business decision-makers across Europe say data analytics are important to...

Read More
Nutanix brings web-scale simplicity to IT environments

Nutanix has announced added security capabilities for its Virtual Computing Platform, including a...

Read More
Trustwave report reveals security deficiencies

A report from Trustwave reveals many businesses still struggle with information security...

Read More
Belden acquires Tripwire

Belden has announced an agreement to purchase cybersecurity leader Tripwire for $710M. Belden is a...

Read More
McAfee Labs™ report previews 2015 developments in exploits and evasion

McAfee Labs dubs 2014 “Year of shaken trust”; predicts 2015 trends in Internet trust...

Read More
Advanced 365 offers top tips for ensuring compliance with new EU data security legislation

UK businesses found guilty of breaking new data laws could face fines of up to £780,000.

Read More
DocuSign Global Trust network expands

DocuSign will open three new data centres in Germany, the Netherlands and a third E.U. location...

Read More
Critical data at risk from employees

Despite a growing number of data breaches occurring under the glare of the public spotlight, 71...

Read More
Difference between knowing about access risk and ability to fix it

97% aware of risk created by misused or stolen credentials, but only 29% confident of...

Read More
British companies at risk of becoming cyber-dominoes

New research from Radware shows a fifth of companies are now under constant attack.

Read More
Smart connected devices market continues to grow in Western Europe

The smart connected device (SCD) market posted another quarter of growth in Western Europe, driven...

Read More

Videos

Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.