NEWS
Cyberfort acquires ZDL
  • Posted on 13th April 2025 in by Phil Alsop

Acquisition strengthens Cyberfort’s 'buy-and-build' strategy to significantly grow revenue and become the largest independent UK-based cybersecurity service provider within the next three years.

Read More
NEWS
Forcepoint completes Getvisibility acquisition
  • Posted on 8th April 2025 in by Phil Alsop

Forcepoint has completed its acquisition of Getvisibility, a pioneer in AI-powered Data Security Posture Management (DSPM) and Data Detection and Response (DDR). This milestone expands Forcepoint’s Data Security Everywhere platform, giving organizations real-time visibility and control over data...

Read More
NEWS
Hornetsecurity Group to acquire Altospam, a leading French email security provider
  • Posted on 5th April 2025 in by Phil Alsop

Hornetsecurity to further extend its position as a European cybersecurity champion.

Read More
NEWS
UiPath acquires Peak
  • Posted on 23rd March 2025 in by Phil Alsop

UiPath has acquired Peak, an AI-native company based in Manchester, United Kingdom. The Peak AI platform optimises product inventory and pricing for businesses of all sizes and across a wide range of industries, providing customers with tangible outcomes quickly and without the need for large,...

Read More
NEWS
Jamf to acquire Identity Automation

Identity Automation adds dynamic and automated role-based access capability to Jamf’s endpoint...

Read More
NEWS
Nokia completes acquisition of Infinera

Brings together two pioneering leaders in the optical networks market.

Read More
NEWS
ServiceNow expands AI-powered manufacturing solutions with the acquisition of Quality 360

Acquisition strengthens Manufacturing Commercial Operations, accelerating AI-driven quality...

Read More
NEWS
MongoDB acquires Voyage AI

MongoDB to integrate Voyage AI’s industry-leading embedding and reranking models, delivering...

Read More
NEWS
CyberArk acquires Zilla Security

Industry-leading identity security combined with modern IGA sets a new paradigm for compliance and...

Read More
NEWS
ITGL acquires Intuitive Systems & Networks

ITGL, part of Conscia - a digital transformation provider and Cisco Gold Partner - has acquired...

Read More
NEWS
Drata to acquire SafeBase

Drata has entered into a definitive agreement to acquire SafeBase, the leading Trust Center...

Read More
NEWS
SolarWinds to be acquired by Turn/River Capital

SolarWinds shareholders to receive $18.50 per share in cash, with a total enterprise value of $4.4...

Read More
NEWS
Sophos completes Secureworks acquisition

Sophos and Secureworks have announced the completion of Sophos’ acquisition of Secureworks. The...

Read More
NEWS
JumpCloud acquires Stack Identity

JumpCloud is continuing its identity-first momentum by acquiring Stack Identity. Stack Identity is...

Read More
NEWS
Searchlight Cyber acquires Assetnote

ASM functionality will enhance Searchlight customers’ ability to identify and respond to the...

Read More

Videos

Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...

Expert Opinions

By Ryan Davis, Channel Account Manager at CultureAI.
By Sean Tilley, Senior Director of Sales EMEA at 11:11 Systems.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...