Logo
Varonis says leaky apps and cloud data insecurities are the new corporate norm
  • Published in

Commenting on a New York Times story about the governance issues that portable devices and their leaky apps create for companies, Varonis Systems says that mobile access to cloud-based data - and replication to the device itself - has become the new corporate norm. “Organisations are losing...

Read More
IT-Manager verlassen sich nicht länger nur auf Tape zur Datensicherung

Umfrage von Acronis: Unternehmen setzen zunehmend auf Cloud-Storage, da Bandsicherungen oft zu fehlerhaft sind

Read More
Infoblox adds control and security to Azure Cloud
  • Published in

With Infoblox Actionable Network Intelligence customers can automatically provision and manage DNS infrastructure regardless of where the application lives - in Azure or on-premises - from a single system.

Read More

Videos

Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...
Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...
Rob Coupland, CEO at Pulsant, discusses the company’s £10 million investment in its Milton Keynes data centre to provide high-density, sovereign compute capacity to support AI transformation, with plans to...
Alex Adamopoulos, Chairman and CEO of Emergn, discusses the results of the company’s new research, which reveals that enterprise leaders now expect measurable returns from AI investments within months, not...

Expert Opinions

By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.
By Graham Jarvis, Freelance Business and Technology Journalist
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...