NEWS
The future of fan engagement: how blockchain is transforming the sports industry

Recently, the news emerged that Cyprian football team Apollon FC used fan tokens leveraging blockchain technology to allow supporters to vote on the team’s lineup and formation for an upcoming match. It seemed that fans really did know best — the team won their match. By Lars Rensing, CEO of...

Read More
NEWS
Bad security hinders productivity, Good security enables it

For a long time many have thought of identity security as a necessary burden. All those passwords, all those access denials, all that budget drained away from the profit centres of the enterprise - that's how many business leaders view this aspect of IT instead of recognising its benefits. The...

Read More
NEWS
Trusted Cloud: overcoming the tension between sovereignty and innovation

In a world where 80% of businesses depend on globalised supply chains and with an irreversible march towards the cloud, organisations and governments alike are faced with a dilemma. How can we protect our intellectual property at an international level? By Cédric Prévost, Orange Business...

Read More
NEWS
Cybersecurity – the journey from confusion to collaboration

In an interview sponsored by Kaspersky, security practitioner Naveen Vasudeva, MD and Co-Founder of CISO International, addresses the current disjoint which exists between cybersecurity vendors and their customers. Naveen believes that, as end users wrestle with the complexities of security in the...

Read More
NEWS
Fieldside Assistance: The agricultural vehicles embracing IoT to fix themselves

When you’re responsible for feeding the nation, there’s no time to lose. Every farm has a tight...

Read More
NEWS
Using hyper-automation to navigate the new normal

It’s no understatement to say businesses are currently navigating one of the most difficult and...

Read More
NEWS
Research reveals the impact of lockdown on business and IT

As the COVID-19 crisis took effect, businesses rushed to deploy technology that would help their...

Read More
NEWS
COVID-ushered digital transformation makes companies adaptable and resilient

COVID has triggered a massive digital shift, encouraging more businesses to migrate their...

Read More
NEWS
How to get AI into production

You know you need AI. You have already committed to delivering AI, and you’re working to build...

Read More
NEWS
What it really means to become 'Cloud Native'

Dave Chapman, Head of Strategy and Professional Services at Cloudreach, looks at the accelerated...

Read More
NEWS
Getting your data analytics in order, no matter where your data lives

In order to survive and thrive in the “new normal” of 2020 almost all businesses have had to...

Read More
NEWS
The Future of WANs: How will their performance improve?

Going back to the latter months of last year, it would have been incomprehensible to know what...

Read More

Videos

DCW Asia 2025 - Part 2 of 3
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...

News

Pax8 has been named a Strategic Partner in the UK Government’s AI Skills Boost programme, which aims to provide AI training to ten million workers by 2030.
CultureAI launches a partner program to support organisations in adopting AI safely and managing associated risks.
Corning and Meta Platforms announce a $6 billion agreement to supply optical fibre and connectivity solutions for US data centre development.
With AI adoption accelerating, cloud security faces unprecedented challenges. This article explores some of the key factors complicating contemporary cybersecurity strategies.