Majority of Duo customers prioritise securing Microsoft Office 365

Duo Security has announced integration of its flagship two-factor authentication (2FA) product with Microsoft Azure Active Directory (Azure AD), offering thousands of Azure AD Premium customers another way to quickly secure critical cloud applications such as Microsoft Office 365.

Read More
NEWS
Trustonic underpins Korean National Certification Platform

Korean Accredited Certification Authority Koscom protects financial services with hardware-based PKI certificates to simplify how millions of Korean citizens access high value services.

Read More
SGN relies on CA Technologies

Leading UK gas distribution company enhances protection across its cloud infrastructure with CA Privileged Access Management.

Read More
Beware the insider threat

Organisations report that 42% of IT security incidents occur as a result of their employees actions, and 74% originate from their extended enterprise (employees, customers, suppliers).

Read More
Identity theft and poor internal security practices take a toll

164% increase in stolen, lost or compromised records.

Read More
Strong cyber security helps business success

A new cyber security report from Vodafone, Cyber Security: The Innovation Accelerator, highlights...

Read More
The deadly sins that add to security woes

Despite prioritizing privileged access management, a majority of enterprises fail to prevent the...

Read More
NEWS
BYOD is the biggest blind spot

Least effective security measures are password-protected documents, facial recognition, and access...

Read More
NEWS
Digital defence dejection?

68% of IT organisations have no to modest confidence to manage digital threats, despite a...

Read More
Report highlights poor security hygiene

Fortinet has published the findings of its latest Global Threat Landscape Report.

Read More
Mid-market businesses continue to neglect cyber-security

25% of mid-market companies don’t even have basic anti-virus protection.

Read More
NEWS
Information security spending to reach $86.4 billion in 2017

Worldwide spending on information security products and services will reach $86.4 billion in...

Read More
'Frictionless' security

One Identity Safeguard 2.0 is first in the industry to offer “Approval Anywhere,” a...

Read More
Fuzz tests focus on IoT and industrial vulnerabilities

Synopsys has released its fuzzing report, which provides deep analysis on potential zero-day...

Read More

Videos

Omer Wilson, Chief Marketing Officer of the Start Campus, explains why Start Campus and EDP have signed a strategic partnership marking their shared intention to accelerate next-generation, renewable-powered...
In this interview, Will Morey, Managing Director at Gamma, discusses the company’s Webex launch, including how a partner-led pre-launch shaped the offering, the influence of MSP demand, and how the platform...
In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...
In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...

Expert Opinions

By Robert Hannigan, Chairman of International Business at BlueVoyant.
By Dan Bridges, Technical Director, Dropzone AI.
By Matt Roberts, VP of Sales, OptiCool Technologies.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...