NEWS
Infosecurity Europe 2026 announces first wave of keynote speakers

Infosecurity Europe 2026 unveils keynote speaker line-up, linking military, sport, and tech expertise with the advancing cyber security sector.

Read More
NEWS
Keepit forms partnership with Hammer Distribution

Keepit teams up with Hammer Distribution to enhance data protection and recovery in the UK and Ireland, focusing on cloud resilience and data sovereignty.

Read More
NEWS
Graeme Ventris appointed Regional Vice President for EMEA at Ping Identity

Ping Identity appoints Graeme Ventris to lead EMEA channel and alliances, enhancing growth through strategic partnerships in the digital identity sector.

Read More
NEWS
Alteryx One: scaling AI and automation for enterprises

Alteryx One aims to enable enterprises to scale AI and automation by providing governed, repeatable workflows, trusted data, and integrated analytics for operational decision-making.

Read More
NEWS
The battle against identity-related cyber threats in 2026

Sophos’ latest report highlights the rise of identity-related cyberattacks, emphasising the need...

Read More
NEWS
ANSecurity supports cyber resilience programme for UK racing and leisure organisation

ANSecurity enhances cyber resilience for a UK racing and leisure organisation, ensuring security...

Read More
NEWS
Adapt or perish: SMBs and AI-driven cybersecurity challenges

AI is reshaping the cyber threat landscape for SMBs, with N-able's report Cybersecurity in the Age...

Read More
NEWS
Modernising government IT systems: addressing technical debt amidst AI growth

UK government faces technical debt challenges as AI adoption grows, demanding modernisation and...

Read More
NEWS
Telecoms and AI: a people-first approach

Exploring the impact of AI in telecoms, Colt's report underlines the necessity for a people-first...

Read More
NEWS
Navigating the AI-cybersecurity paradox: a deep dive into budget dynamics

Exabeam's recent report highlights the complex relationship between AI investments and...

Read More
NEWS
Forescout launches VistaroAI to introduce Agentic AI into cybersecurity operations

Forescout Technologies has introduced VistaroAI, an AI-based cybersecurity platform designed to...

Read More
NEWS
Arctic Wolf enhances security operations with Sevco Security acquisition

Arctic Wolf's acquisition of Sevco Security aims to strengthen proactive security measures and...

Read More
NEWS
AI adoption: balancing innovation and governance in the UK

Logicalis' annual report highlights the ascent of AI in organisations, underlining the need for...

Read More
NEWS
The evolving role of CISOs in the AI era

A survey of 650 global CISOs examines how security leaders are navigating AI adoption, expanding...

Read More
NEWS
AI vs. human: assessing cybersecurity performance

Hack The Box’s report examines the impact of AI on cybersecurity task performance, analysing...

Read More

Videos

In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
In this interview, Will Morey, Managing Director at Gamma, discusses the company’s Webex launch, including how a partner-led pre-launch shaped the offering, the influence of MSP demand, and how the platform...

Expert Opinions

By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...