NEWS
Surviving the digital innovation deficit in the manufacturing sector

Manufacturers are facing an unenviable sea of challenges as they bid to realise the opportunities of Industry 4.0. The businesses achieving the greatest gains in productivity, growth and inventory control are those that are successfully leveraging data-driven insights, adopting digital platforms...

Read More
NEWS
Taming unruly Broadband connections

Many who deliver network and application services have a love, hate relationship with broadband. We spoke to Martin Saunders about the role of broadband and why his company, Highlight, is focused on mending both perceptions and experiences through improved broadband monitoring and reporting.

Read More
NEWS
Three ways to maximise the value of cloud ERP

While there’s a general shift towards the cloud, when it comes to ERP many businesses are still reluctant. There’s still a misconception that the switch can be an overwhelming task that will be disruptive and costly for business processes. Indeed, a report from Gartner found that companies...

Read More
NEWS
Enhancing enterprise security and improving performance through software code analysis

Enterprises across the globe write and re-write billions upon billions of lines of software code in their day-to-day business, and a basic flaw in their coding could have major repercussions on data security, operational inefficiencies and lost revenue. By Oege de Moor, Chief Executive Officer of...

Read More
NEWS
Mapping modern IT – build and maintain dynamic visibility across all your assets

A map is a useful tool. It can help you understand where you are, where you are planning to be and...

Read More
NEWS
How Cognitive Bias Leads to Reasoning Errors in Cybersecurity

Forcepoint’s Dr Margaret Cunningham shares insight on how human bias can impact decision making...

Read More
NEWS
Living on a network that must not die

The network is the backbone of almost every organisation today. When it is not available...

Read More
NEWS
How combatting the skills gap will aid digital transformation

Digital is now profoundly important to businesses, with 80% of businesses in the process of digital...

Read More
NEWS
Building digital transformation with security in mind

Enterprises face both external and internal threats to their data, network and IT assets....

Read More
NEWS
Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs...

Read More
NEWS
Moving with the times: Emerging tech is revolutionising our world

According to data from the International Telecommunication Union, 51.2 per cent of the global...

Read More
NEWS
Empowering the Manufacturing Industry Through Decentralised AI

Artificial intelligence (AI) is making its presence felt in every aspect of our daily lives—from...

Read More

Videos

Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
DCW Asia 2025 - Part 3 of 3
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

News

Yubico updates YubiKey as a Service with self-service features for easier passkey management.
With AI adoption accelerating, cloud security faces unprecedented challenges. This article explores some of the key factors complicating contemporary cybersecurity strategies.
BCS Consultancy expands its offerings with a new Sustainability Service, led by James Rogers Jones, embedding eco-conscious principles across project, cost, and technical management.
A recent survey uncovers the high stress levels experienced by UK IT and cyber professionals, highlighting the fear of job loss following a breach.