NEWS
How to navigate intellectual property risk in blockchain projects

It’s been well over a decade since blockchain technology first burst onto the scene. And although that initial use case was supporting the public ledger of pioneering digital currency Bitcoin, the intervening years have seen countless new innovations. By Christopher Smith, Senior Associate at...

Read More
NEWS
Why openness means better cyber security

The Open XDR movement is gaining traction. By Brian Foster, Vice President of Product Management at ReliaQuest.

Read More
NEWS
How to develop and maintain an effective DevSecOps culture

Every increment in understanding and collaboration around the stack, delivery, governance and empowerment is a positive step forward in realising DevSecOps and safer applications. By Patrick Debois, Director of Market Strategy, Snyk.

Read More
NEWS
A three-pronged approach to government security

The increase of ransomware attacks over recent years has cast a spotlight on the need for governments to adopt a risk-based approach to cybersecurity. By Adam Vincent, Co-Founder and CEO at ThreatConnect.

Read More
NEWS
Delivering deep-link analysis

How you can harness the power of graph analytics to achieve a 360 customer view without rebuilding...

Read More
NEWS
How QKD is combatting the increased sophistication of today’s cyber-attacks?

As global economises digitalise at speed, our collective success depends on the trust of secure and...

Read More
NEWS
Debunking the Top 5 Data Warehouse Myths and Misconceptions

By Simon Spring, Account Director EMEA, WhereScape.

Read More
NEWS
The key to cloud choice is consistency, not complexity

By Hervé Renault, Vice President Cloud, EMEA, VMware.

Read More
NEWS
Many organisations get cloud migration wrong – here’s how to get it right

By Randy Randhawa, Senior Vice President of Product Development at Virtana.

Read More
NEWS
The hybrid future is all about digital trust

By Edwin Weijdema, Global Technologist, Product Strategy, Veeam.

Read More
NEWS
Better late than never? Not for data

By James Fisher, Chief Product Officer, Qlik.

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Will Morey, Managing Director at Gamma, explains why PSTN migration is a scale problem for MSPs, not a technical one. He shows how structured journeys, partner support, and integrated platforms turn forced...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Lottie Tollman, Head of Data Centres Advisory, EMEA and Gonzalo Martín, Head of Data Centres Capital Markets, EMEA, both at Colliers, the international property adviser, explain why data centres are no longer...

News

The International AI Safety Report advocates for strengthened AI governance and highlights potential risks related to misuse and cognitive offloading.
Emerge research finds that AI investments are now under stricter timelines, compelling leaders to deliver substantial returns rapidly as organisational expectations escalate.
With identity fraud impacting UK businesses, Signicat appoints Ray Ryan to lead its operations in a key market.
Red Hat collaborates with the UK MOD to provide centralised cloud-native platforms aimed at improving efficiency, interoperability, and security across its operations.